<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC7368 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7368.xml">
<!ENTITY I-D.ietf-dhc-sedhcpv6 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dhc-sedhcpv6.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-15" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="June" day="13"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so an agnostic Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader should be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an Outsourcing DNS Infrastructure (DOI).</t>

<t>This document describes how a network can provision the HNA with a specific DOI.
This could be particularly useful for a DOI partly managed by an ISP, or to make home networks resilient to HNA replacement. 
The ISP delegates an IP prefix to the home network as well as the associated reverse zone.
The ISP is thus aware of the owner of that IP prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Manager (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, ISPs often identify the line of the home network with a name. 
Such name is used for their internal network management operations and is not a name the home network owner has registered to.
ISPs may leverage such infrastructure and provide the homenet with a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, ISPs are aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Manager (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enable an ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options may make the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix - when provisioned via DHCP.</t>

</section>
<section anchor="sec-overview" title="Procedure Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are colocated on the  Customer Edge (CE) router <xref target="RFC7368"/>.
Note also that this is not mandatory and the DHCPv6 client may instruct remotely the  HNA and the DHCPv6 either with a proprietary protocol or a protocol that will be defined in the future.
In addition, this section assumes the responsible entity for the DHCPv6 server is configured with the DM and RDM.
This means a Registered Homenet Domain can be associated to the DHCPv6 client.</t>

<t>This scenario is believed to be the most popular scenario. 
This document does not ignore scenarios where the DHCPv6 server does not have privileged relations with the DM or RDM.
These cases are discussed in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone. 
The DHCPv6 client is configured to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Distribution Manager Option (OPTION_DIST_MANAGER) and the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option codes.</t>
  <t>The DHCPv6 server responds to the HNA with the requested DHCPv6 options based on the identified homenet.
The DHCPv6 client passes the information to the HNA.</t>
</list></t>

<!--3. The HNA is authenticated (eventually by a self signed certificate (see Section 4.6 of {{I-D.ietf-homenet-front-end-naming-delegation}}) by the DM and the RDM.-->
<t><list style="numbers">
  <t>The HNA is authenticated (see Section 4.6 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>) by the DM and the RDM. 
The HNA builds the Homenet Zone (or the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary non optional parameters described in Section 14 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA may complement the configurations with additional parameters via means not yet defined.
Section 14 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that MAY take some specific non default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="DHCPv6 Option">

<t>This section details the payload of the DHCPv6 options.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated to the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD1).</t>
  <t>option-len (16 bits): length in octets of the Registered Homenet Domain field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Distribution Manager Option">

<t>The Distributed Manager Option (OPTION_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Distribution Manager Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      OPTION_DIST_MANAGER      |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                  Distribution Manager  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_DIST_MANAGER, the option code for the Distribution Manager Option (TBD2).</t>
  <t>option-len (16 bits): length in octets of the enclosed data as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Manager FQDN (variable): the FQDN of the DM encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport field of the DHCPv6 option indicates the supported transport protocols.
Each bit represents a specific transport mechanism. 
A bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/> and <xref target="sec-iana"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit Position | Transport Protocol | Reference
-------------+--------------------+-----------
      0      | DNS over TLS       | This-RFC
     1-15    | unallocated        |
]]></artwork></figure>

<t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/>.</t>

</section>
</section>
<section anchor="reverse-distribution-manager-server-option" title="Reverse Distribution Manager Server Option">

<t>The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Reverse Distribution Manager Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER   |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/              Reverse Distribution Manager FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option code for the Reverse Distribution Manager Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the RDM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a RDM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Reverse Distribution Manager FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCPv6 Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation in regards to option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCPv6 server sends the Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client includes Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of <xref target="RFC8415"/>.</t>

<t>Upon receiving a DHCPv6 option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCPv6 Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option
TBD1  OPTION_REGISTERED_DOMAIN       Yes            No
TBD2  OPTION_DIST_MANAGER            Yes            Yes
TBD3  OPTION_REVERSE_DIST_MANAGER    Yes            Yes
]]></artwork></figure>

<t>IANA is requested to maintain a new number space of Supported Transport parameter in the Distributed Manager Option (OPTION_DIST_MANAGER) or the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.
Future code points are assigned under Specification Required as per <xref target="RFC8126"/>.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC8415"/> are to be considered.
The use of DHCPv6 options provides a similar level of trust as the one used to provide the IP prefix.
The link between the HNA and the DHCPv6 server may benefit from additional security for example by using <xref target="I-D.ietf-dhc-sedhcpv6"/>.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter and Michael Richardson for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&I-D.ietf-homenet-front-end-naming-delegation;
&RFC8415;
&RFC7858;
&RFC8126;


    </references>

    <references title='Informative References'>

&RFC7368;
&I-D.ietf-dhc-sedhcpv6;
&I-D.andrews-dnsop-pd-reverse;
&RFC2181;
&RFC1034;
&RFC6672;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This section details various scenarios and discuss their impact on the end user.
This section is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

</section>
<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCPv6 server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for example.foo as its Registered Homenet Domain example.foo.</t>

<t>In this scenario, the DHCPv6 server, DM and RDM are managed by the ISP so the DHCPv6 server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This section considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This section still consider the ISP manages the home network and still provides example.foo as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to example.foo using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.</t>

<t>This configuration is performed once when the domain name example.com is registered.
The only information the end user needs to know is the domain name assigned by the ISP.
Once this configuration is done no additional configuration is needed anymore.
More specifically, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this section we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCPv6 server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CE router hosting the HNA may be the registrar and provide the CE router already configured. In other cases, the CE router may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expect to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source:
H4sIAEFsp2IAA+1cW3MbN7J+n1+BtR+OlJC0KcuyozrnbGRJiVVlXULJSWVf
UuAMSKI0HHCBGdGM7fyW/S3nl53uxmUwwyFl2d5UHpZbG4szuDT68nU30GC/
30+SUpa5OGQnr4+v7g7Y5aKUqjBsojR7reaCXYhyqfQtu+BzWUzZUVXOlJbl
KuHjsRZ33R0vjpJMpQWfw8CZ5pOyL0U56c9gwEKU/YLG6nOdzmQp0rLSop/N
0r6yY/SHzxO50Ies1JUp954+/e7pXsK14IfsrCiFhiGS5fSQ6MO/b5f1i/4J
TpekvDxkpsySVGUw1SGrYPqXSbKQhwljepKKzJQrXPdKGHhSqjT6UxaZKEr/
wChdajEx4ftq3vhaapmGxqmaA1FleCuLXBZhGmDKnC8WRBE+STixE2nCT9/9
i91ghJMBO5dTXuVleG5ZesILKfK1l0rDsKdAjTGqCE+BPiGAvpd7L56zG81B
Rse84BlnI1WVIrRLQaiH7JrLomRvOIikKHvsp+P6vcpg6v1r9vTVQfSwKkoN
/eyQ4bmYc5mD7InQwdwS+r1wtA2AS91LHg3YL2IsdGvBI55PWi9osUe3HCZq
L7W5pOYC1ihvk6xhqsESp/qe0+ibib0B+ehqynNzK1sE34Bq3na8Jaq9rrLr
lSnFHOQBSg9KJqt5D16mgzXZfff8KTuecQ392DU9a4ltJLKlUhk7RstsSuy7
/acHz9YF9va6vfJSzbn5fTD3RH8/xee0/CTp9/uMj4EenpZJcjOTBpW5Ql1n
mZiAjhuPBM6KwW4YLxifFsqUMvXWugYkbAfgYpel2LZCGqAxz/MVW2iVCpEB
XaycCQZ2o9VCS14KWEUxkdNKc5wJZskYqLJRlU6FbesGh/d3glm4YUboOwkN
EKGwEaIRKyy8DZKzgs2BUKDDCNOjBn5M7DwX6QyU2cwZrLxEK1pwNJEwmgAi
KphiYHk1l1mWC2DcY3YjNMyvcjVdIecEuxUrBpNmhj06f3t986hn/2UXl/T3
6PSnt2ej0xP8+/r10Zs34Y/Etbh+ffn2zUn9V93z+PL8/PTixHaGp6zxKHl0
fvQrvEGGPbq8ujm7vDh68wiUGVYQCxRWhlwfC3gFKrfQogQ5cJNkwqRajuEL
9Hl1fPV//xrus/fv/zb64XhvOPzu40f35eXwxT58Wc5EYWdTBQjUfgVmgfNY
LATXOAqIGni+AFnlwHYOajNTy4LNhBbASuIXIH8Gig8vqjxDqiYg0FxC/6Us
ZzjlWf9k0PAwE62Ksg8y8b4mE7mYkrp8/DhAqYARapVVKT5KkgePwcxCpHIi
Qe2BXlR0YBxqM7BITgtuGUaacY/iB801jLOrapxHtvIPVZAkYPjLSBlPLq6B
/onmYI8VuU+2c3J5tjtYt0wrL0ek13YyNrCmO2nQfojIiyPLTe5XljIYcmAH
TD3nQenBPKuca5AnqPukyskCODamt/B8Dr5gCusfr5Dws+urHkMjUfDitml2
BmRrQJRIK7xHIrRY5DwVSP6AkfhhAOZYjzyCEa+AeMCcdx4a4iGR60sBSuW4
z8HhpJLkAeGK0Eaw34GrgzA02vOsgoGXqPZqYk1/WYDG0Rde1hNaZUYlrdIZ
8AOwkcQG8gYwQkUuMpkhQiFTZgh8IK5YCUaOBpJs3w4vLaX+1YnEkGJcEbad
Ey812xmdnO/S7AtVoqoRRMbdnOocNaDvGjAP3oJiAL7xLJM4aA/XbWB1MBCT
GOrIiR0LYxXPggZTnWqgcwOpXOPq8W8kHbQg8ygotUWMAnjhu1ptIHVUC2Eh
29BKoHOhSjfs+pxWBjOOSjIFngAioDMAqEbq53zFclw6DG7FIZsWQbxCHc/q
sVECbS3PwOUADhENTeMFah8OLjB0LetA9glNMkiuJSAXGY9T3VgnnVxQDYMy
LmcKGWGspsS04vqQCVYLH6SEHcrXrXRe57DFPfq1CXhaQQHNKQo+zoUDB+RE
LKdCABQarlcIJ7BQYKDx3AKA6Ln2GBoMknMFbPKiRJOwnhuHdWN62wqi8Eyw
IulF84ECKT23MYWDxZPzsH4wQAxpPFgihFrVphbVIle8wagGs8MgTWNttjGs
4V8/x68hqIFBoua0GI+qQviLZDTjJ9CfRQ58Rq2MIhvHcx/YxAaFmGesKpMR
5gQamK152MUFETK0pFtjd5/igdoNQds7yYnsAcVNVyjkDE358g5DN7Fk7x8b
AWmi+/rRaR08o3XIPK8wQi2Dv7MOJRWgqqalXLGw/byxnqoopJSl2R5SOlaR
w/zBBYQGmQ1sAT4tQNbg8K33MDEEPFjGPRuq+SWDd6vmwpmVV02vbA00detL
rbNFdEkhJE0J65yys2NgH/TR7DQDtd45Pt1lGnNEhMG/Q1j34tnBS1SzC3BB
ELiRNdC8QJEDczAJgB6lV4GK5sSohpA8EUqDaObKqh3OHpPuOgnAaqE9ZNv4
X5SEDVpBoq5yRsFH+Eb0LEERMFixeUlm41tAwwr9wqDpCTdwE4HZLEARJAKV
C+18qO+IM4R9jMIja04wF5EaIQeghouh5gJTb74ZighSxo2IxetVzEKPtSYF
GNVSIQFjAa/ubIexNTRKZhZqgbFaaEsRVQOnlbByA7dHUOoaGjROLTqWG3rM
ONgByONOgnZSdJU73x7zAFjmWCAAlii5IuXLpEkrYzzSoVn7uVHDKMKoickU
TemtV4LKaPHPSuo2lLWzMZIBpZaorcCa34VWfdvHwWXgY4rizkgwPiMKyGIQ
1yYqz9XSHCbJcMBunLFJQ/pGLla10tAulHf7au1Y0MW6TWNpqhYML4s0rzJM
ywiT7J4bjPPPSoC03dedy9Hl7navVzelJPC30emPZ9c3p5B0/nZyeX50drHb
2xwVtPqeQM/fzo8ujn48He2uObpPGWF0+vPp6Pq0NZJFYtrEwPhiz7K8qYzW
SLM4Pqi1T1u2YPTVxPYxNzXoufhXwhMHwIMOSSzAKB0wxI6jnhYo/O+/9fvP
GoqBPgNHtyi7AywpyooCd0yNYBE5uocpYlQqdEkxDCDrjhEYWVnV2x8coBd5
sKPYxTnWQ5hBv/+/LNlK5r9zdqvlOO+4knnWTJDJPnacBXcZya6PQWhf6CvE
S5GgvXJ0h6IFhoTUAgLsKC5tEOCZNtz/LJ4NAm/QSdqgjEB6LWJzEOu9WJMk
DGasr0HIXAm/PwfR8hcSGEX1lHDF8Tn63fOjX1mJUY/BwCMkWMg7IAF3gNkd
zytB+y+NYwMX2FnDaod1GXh8mVtVWfAVxdkuR23KDsd9fD/ovX+sftPZR4v+
azna/dAIos7IVixJP/x0ctHhs5u7i0nyxx9/JOwpW/8MO57tdTx7ht2H8OoZ
22fP2QF7wV6y7x7yLPm2/4X/Sz4AIZsYg0R+CORamfRzCPGjz4evRMOXfD4k
Tzqeblab9c+Tr0DDl/MBNer94WOAhb6egd7hOd7/PNqk0I9A4b/xUkGnynaG
B2wMYcTu4UaRun3w2hOHAGsLu3ZuXp0McS/ym1gJotng67TE/Rqm0lKUxlvz
5jHBPeedgI97zfvD55T7frNlgJ07CPFw0wGmD0YbbSvFZwLYTRS42vUpA4I+
dQgaE4Dosy3eQeDJ5g54QkMY+JMiq8Z+RiPQocV4RDxvb4DalF7pMmRJJiwX
TyurAsEM5x0DWglR7weHZAzi94fhF33+0iDGAo7FXHbGWdPbiWJfD8SuqwVK
BlTgJkhpjYbPBZB7R/i3AGmnAVgVXf/85YA0m3sc3WLICKX3YmmsVpthdGt6
BDi69zk4CuCVK0xxMl7y+1GzSwmjWfzpLu1phaY1qtSBPmUOLpcvIQcYJKcc
j0kk7vQsIFfDwgjMe9ZHcQcrOApGkT7CiifF1c0hhpQQFrO5zQoRSHF4ZCce
iuHOILt5c+0W+eLl85cQttLhKuT+BnM7WHAn00lDO91Ejayf5RUeg1foYrEN
eU3p/EFXE+v2umLdVgzaJZeA9hvF4AP0uk845YZE7Yh6GNQrCGmHrRnjgHdt
SkwqA0lWSqnSLlnHnZIx7ahqGsbmv+taWvIxqRFphtUqCbIinqLFvgLqrpSh
DAjgsubalafiAwQEE3DvRSrwTL7+fNvv+MQPXWmEc3cfmrrlH2KS0gdJ28bD
/vC5fV5BQuZ3VgNKOYyxi/IY0yHzRwz0IZ7usFvUtMMfU9Vt5tYCfGK0ZUvG
HuQ46PGp0Zdu4fwnZPl6IcsWRrP/hCyf+lkLWbYqeVfU8tcIWRyeMJv91VHL
J9gsRS+fkAqu69m2bPAToALCmWefE8641hTMfGIi+HVCmtHXiWlGf0pQc78i
bwtuRluiG7M1uvFxySsx43cSSLZxTTZLF/2xe/bRpsa2ofM0vn3idyUNG74Y
7A32iGvDl/BHazY2RU4Ufu8/FJMgjZDKc23PAZx+2siCyoiSI5RQqoo7UUiM
BuriCyws64HvYdgQu7lTL3ea6qaiA0WDZ0pu8IlStqRNTtYO/0JYRXud1nFh
e6p4sdx2hwr1AYUs6Viyrq7q2cPx+PRn7fADCbqnusHZXm+bYfY+2YKJpJpo
H/g3DkrGK3dIhWFevX8eH+aE06vRpd80sUMc2yFqzeg4EbMHYObPWjIWKBZI
KRV9uZK/OOY3pKqDYc/+u+f+3Xf/Pnf/Hlgw2BsOXnQY0VuIi12dArKtVYzQ
tMZmpaY72h6JRb5K5sjsqeiFaMhVh24+MHlwfUkkrZHI+YodTWORxcaP58Er
m9xgoA//L1R8ZOEOcKlavn20bsfmOLax1ZrggahMGg9o3RmInYtygiShBtJE
6ollk4QB9vCfzm6tUi5bhw/HXistJqBiaSyWkUXJXQHBIZuV5cIcPnmyXC4H
OOdA6emTGmTME1z03UG/PhRZfzJ4Nyvn+eO15/09F63+jJDBTkhIlrb1j7MS
1En8XMOaclEqr/gJ7r5u36SHz6+w4OhzobDb3pY9sc5u8BX7PWP3RKdd/XC5
3VLzjKd61SUrqvkY0W7BU6qn6fLtgZVeig/eXX1IILMt57EHq5mcUOJZxmdk
VPZQl6REGW5dAlGilf1AhSo2wlooWbRz5arAcuhrX/UWagCkbtQtUh323oFz
04BXFVUdd1kRvemnjTduX8K/Zc237bArqhmv6ygGW+rRvl4lmZ0ll8Xt5nSw
4Tht1WQBfSHI0moeo1JYLiKSeMfxEBadWmUQO96//3uATLywBGSRLTseH6W3
hVrmIpsSJCTJL4ItqXQ6l7cu6uBA5jnHOm4wXZAw3rToAYBqCE3Yzyr/nYi+
gfW+EfO6okXqcLXIVy7YYtVNR6Fhaqp8WZv/lh0VmRZL03N/gF3lubzj9jrF
GwXa+7sCZYGHpYyoAMTmWLjtiIjvcDmKnAkIp61G5daMsJJ3jNIBWU+x6ou+
SDBhUlxgckzXf0VezrGd2zf9rDBq0V9kfVc8i9pXbyC4yqL6mBxHJX74ijXg
wAhU4HWFpcq03HOZzjjo3gj/hTjS8R2jFJhDEpvwSxABdsIWpppOhS2wRc7V
V1RA7+prH6QcYHcWUpQ2idsT69uqQtOpJcczDdD4owYsgWXYOX+x5XjHuQJM
8eW0zioyMqVpQaAAXEv9hC6Qoa1hKjxErhF/nO54Rg/cRZ8xT28JM0IBFgWv
c4Dg0gv+FJ68xQort4/pi7c2HN5j7qEqE9V04ZBOVk61mhPUF2puWqVYVApm
a3DubGltDghSGm8VwXnC8rh9h3qYQsZABZmBBOKeg1ZggC+fC4kdTTBA/IcI
lioR674WRGA6LbHwjnCkxCI3EvYrDqDn2ddiUX/ooBXrkBplfB7uWlFao+aV
vMVyBorq66dtFbJZB7reWiEiTRtq40w19vUcLiHC4XYgWdl1uWvp21h+lnIu
wqmpiSFyQBmOISPZHJpHje2NhDIuZOx1raCmngQVXS3x9BrVAfHxNY1w2SUT
cakT5SNApL1MEWwB3QZww5WokzsQrQopyvC5Vcd2vWcjiPAcp8XzDMC1xHpx
mqlVwRlSTldZ3MDVZh1g85YcTVpXbeerjhtphMeaL9GubSwRpgvKUFFl5hbh
dbDeLhgvEWAym+NlKGe8+NatpHktw25Fg0XrjF1BurvaMiOYjTeZvTau+CDD
qj3Wldr0tLGmJUesRp1slEKDeDEm8doIoO5Ll/0C0dSDLaAibWFMC5/AGeCN
NkdeYEZspM3rSlgSTn1CRNSyqa1zJ7+srXpcrRwURrdFosWiKyP4clE38gOG
BiecBhVscgftIaLJxkIG4TENPYMxHF8cnZ+6gvG94csh1qzbb8Onz/bx20nU
4uDgxR5gGqgs9fs2vEOHbyq9Qm8v3pV9uk0OX+C/7qZDZBXcuwYIfbGIjMo7
00glNrDC5h6eudZQ7L5OXOQZM7eARJrgEiM9j9mNazk+Sq/tZJBc0qZTJ8UZ
An4zM15rg5Oi4ReruUIT2nDrxZcOYgwOEQTosn2Od4t8cXm1yPz1prXCa3BM
H0mGEGTgZJtp8t4uvvX6UKCr9dWG4qYe9R9CY+gZz+jQueVX18gnEbr9nTAB
lrgimJOeW2GH8K5li5Bb+XjB5Z0wcSReUwdb9nZjZ/uQ/ZWEcwvCOddRmyYe
rzPJiXCdURYmNIbO98Ms3dEIY5BSE0rSXG4KWYRNUSo2D+aC287WkzYX7Oak
a5tVXpIOzeR0BiE9hKPpyu0QxfDecVc1wvVnH9u3GWJg7/RRsfluR0cbxIQL
C+gNrA7UDGze6tmy5Dhe8WgnbGxpGRxdz/W3NmxEsOXe3I7ZpW2qWE8GjbPX
ezrHd9MwMdvgpk0zYWakAe1msMLL5iIadOFyHIbUICvbm2tLvnL3I94i0PiL
h83g7KwG1wG7dNgk53yKt085+/Htmb1FOuGpU2EbjZmmNuBWkcrw6ioaMshs
InMRbbgM2NGUtKADeC0MBvxFZ4HVx31ku71s8La+0Jd2IRGwI6r+hzXZqufo
5wO8wfsex6f+NlXjTmYN2tH2I29ct2t15zkeXKyimJDmtxlKREDdo+HtWzyE
BBXZrVrTw4M7ntt7pKTgeBvXzOTi/mpNCr6nWghvZfU5QBxwwwwuvH7QuT47
+tK6/57NC4woUQrx7fZYsenSEN2iCgE3qjdZk4osP75SCOzgaVSh33KRAI3n
/rCPYDRCwv0tSGgvMsJ3mMtvksbjwNC0K2pEYFjYbIkSB4EnlyA9ScDtDAz/
zMRC0E/e4I80IN3UEkbuKitZd7mnrnW8p1f7wG3B6401E1uugzJubRJuOfnA
LGZSYQaENyVAOujh3UXB7dyyrcKjjfQBW1+rpQiJNI5a/waFjygg0Mpy8Snr
NS5TkPQjBtJf7/BRnqmEy+uhAboTb/hh44LMpNLaXtwLWzZnE7dkf5++Sdkn
LLQZPjpHspGB4QY9nTxsk6/3mIhJPdrZcDcp8RmAoKAbVIiG2xHFMc51dmip
6p8qQKLoHmjDj9YREB5O4W+4NLTAObO5Ap9KITGGhGPg2VJmuL7pVDvEoJ+v
cOyQd7Q5zGVOWzJujS4DVZMNzSyDw1dslQpduFK6FAGkkRByalvVv0fRaoMs
oFubdsfM4qeOfq6hvry5JQi50uB0tXQ3MlEMmAPRgnDnRxQoNZCTonyvxW+8
zEYwWQNWXMsQfqOB7pzTWJE50dZpx/3oZiDcuNzcDEZqeHuQGh1vzhc7gK7e
fAhFiHXcijnoLx7jmxHClnF6LJgaKvS7BeXcqgNQAic3/ppEL5TLRYypE3nV
kpjx4e3goXQ/s0n7tU0ka11xP0ERjkldLNkwwiMPE9B/5/r0eLd52w/vLlcy
LzcMRRcryfYhwSit4TQFiFvm9io9eGjATnLYxN4Gvhr/W0J/urcB+lXthBFJ
CKOLjH6ioIzfec2w7jjspeEj8NQSD2KwPqgjacfh2hrrL0hHm5qf7BF6FkFA
v5pq0Lr9TWFUdI6PTP5/dwSxs1RQAAA=

-->

</rfc>

