<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY RFC7368 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7368.xml">
<!ENTITY RFC9103 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9103.xml">
<!ENTITY I-D.ietf-dhc-sedhcpv6 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-dhc-sedhcpv6.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-17" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="September" day="16"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so an Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader should be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI).</t>

<t>This document describes how a network can provision the HNA with a specific DOI.
This could be particularly useful for a DOI partly managed by an ISP, or to make home networks resilient to HNA replacement. 
The ISP delegates an IP prefix to the home network as well as the associated reverse zone.
The ISP is thus aware of the owner of that IP prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Manager (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, ISPs often identify the line of the home network with a name. 
Such name is used for their internal network management operations and is not a name the home network owner has registered to.
ISPs may leverage such infrastructure and provide the homenet with a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, ISPs are aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Manager (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enable an ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options may make the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix - when provisioned via DHCP.</t>

</section>
<section anchor="sec-overview" title="Procedure Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are colocated on the  Customer Edge (CPE) router <xref target="RFC7368"/>.
Note also that this is not mandatory and the DHCPv6 client may instruct remotely the  HNA and the DHCPv6 either with a proprietary protocol or a protocol that will be defined in the future.
In addition, this section assumes the responsible entity for the DHCPv6 server is configured with the DM and RDM.
This means a Registered Homenet Domain can be associated to the DHCPv6 client.</t>

<t>This scenario is believed to be the most popular scenario. 
This document does not ignore scenarios where the DHCPv6 server does not have privileged relations with the DM or RDM.
These cases are discussed in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone. 
The DHCPv6 client is configured to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Distribution Manager Option (OPTION_DIST_MANAGER) and the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option codes.</t>
  <t>The DHCPv6 server responds to the HNA with the requested DHCPv6 options based on the identified homenet.
The DHCPv6 client passes the information to the HNA.</t>
</list></t>

<!--3. The HNA is authenticated (eventually by a self signed certificate (see Section 4.6 of {{I-D.ietf-homenet-front-end-naming-delegation}}) by the DM and the RDM.-->
<t><list style="numbers">
  <t>The HNA is authenticated (see Section 4.6 of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>) by the DM and the RDM. 
The HNA builds the Homenet Zone (or the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary non optional parameters described in Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA may complement the configurations with additional parameters via means not yet defined.
Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that MAY take some specific non default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="DHCPv6 Option">

<t>This section details the payload of the DHCPv6 options.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated to the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD1).</t>
  <t>option-len (16 bits): length in octets of the Registered Homenet Domain field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Distribution Manager Option">

<t>The Distributed Manager Option (OPTION_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.
As opposed to IP addresses, the FQDN requires a DNS resolution before establishing the communication between the HNA and the DM. 
However, the use of a FQDN provides multiple advantages over IP addresses.
Firstly, it makes the DHCPv6 Option easier to parse and smaller - especially when IPv4 and IPv6  addresses are expected to be provided. 
Then the FQDN can reasonably be seen as a more stable identifier as well as a pointer to additional information than the IP addresses may be useful to in the future to establish the communication between the HNA and the DM.</t>

<figure title="Distribution Manager Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      OPTION_DIST_MANAGER      |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                  Distribution Manager  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_DIST_MANAGER, the option code for the Distribution Manager Option (TBD2).</t>
  <t>option-len (16 bits): length in octets of the enclosed data as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Manager FQDN (variable): the FQDN of the DM encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="reverse-distribution-manager-server-option" title="Reverse Distribution Manager Server Option">

<t>The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Reverse Distribution Manager Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER   |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/              Reverse Distribution Manager FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option code for the Reverse Distribution Manager Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the RDM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a RDM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Reverse Distribution Manager FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport field of the DHCPv6 option indicates the supported transport protocols.
Each bit represents a specific transport mechanism. 
A bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/> and <xref target="sec-iana"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit Position | Transport Protocol Description |  Mnemonic | Reference
-------------+--------------------------------+-----------+-----------
      0      | DNS over TLS                   | DoT       | This-RFC
     1-15    | unallocated                    |  -        |  -
]]></artwork></figure>

<t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/> and <xref target="RFC9103"/>.</t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCPv6 Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation in regards to option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCPv6 server sends the Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client includes Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of <xref target="RFC8415"/>.</t>

<t>Upon receiving a DHCPv6 option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCPv6 Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<section anchor="dhcpv6-option-codes" title="DHCPv6 Option Codes">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option  Reference
TBD1  OPTION_REGISTERED_DOMAIN       Yes            No               [This-RFC] Section 4.1
TBD2  OPTION_DIST_MANAGER            Yes            Yes              [This-RFC] Section 4.2
TBD3  OPTION_REVERSE_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.3
]]></artwork></figure>

</section>
<section anchor="supported-transport-parameter" title="Supported Transport parameter">

<t>IANA is requested to maintain a new registry of Supported Transport parameter in the Distributed Manager Option (OPTION_DIST_MANAGER) or the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.</t>

<t>The Name of the registry is: Supported Transport parameter</t>

<t>The registry description is:  The Supported Transport field of the DHCPv6 option is a tow byte field that indicates the supported transport protocols. 
Each bit represents a specific transport mechanism.</t>

<t>The parent grouping is Dynamic Host Configuration Protocol for IPv6 (DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<t>New entry MUST specify the bit position, the Transport Protocol Description a Mnemonic and a Reference as defined in <xref target="tab-iana"/>.</t>

<t>The initial registry is as specified in <xref target="tab-iana"/>.</t>

<t>Changes of the  format or policies of the registry is left to the IETF via the IESG.</t>

<t>Future code points are assigned under RFC Required as per <xref target="RFC8126"/>. The expert is expected to be familiar with DHCP.</t>

<figure title="Supported Transport" anchor="tab-iana"><artwork><![CDATA[
Bit Position | Transport Protocol Description |  Mnemonic | Reference
-------------+--------------------------------+-----------+-----------
      0      | DNS over TLS                   | DoT       | This-RFC
     1-15    | unallocated                    |  -        |  -
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC8415"/> are to be considered.
The use of DHCPv6 options provides a similar level of trust as the one used to provide the IP prefix.
The link between the HNA and the DHCPv6 server may benefit from additional security for example by using <xref target="I-D.ietf-dhc-sedhcpv6"/>.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter and Michael Richardson for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&RFC8415;
&RFC7858;
&RFC8126;


    </references>

    <references title='Informative References'>

&I-D.ietf-homenet-front-end-naming-delegation;
&RFC7368;
&RFC9103;
&I-D.ietf-dhc-sedhcpv6;
&I-D.andrews-dnsop-pd-reverse;
&RFC2181;
&RFC1034;
&RFC6672;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This section details various scenarios and discuss their impact on the end user.
This section is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

</section>
<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCPv6 server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for foo.example as its Registered Homenet Domain foo.example.</t>

<t>In this scenario, the DHCPv6 server, DM and RDM are managed by the ISP so the DHCPv6 server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This section considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This section still considers the ISP manages the home network and still provides foo.example as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to foo.example using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.
The only information the end user needs to know is the domain name assigned by the ISP.
Once the redirection has been configured, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this section we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCPv6 server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CPE router hosting the HNA may be the registrar and provide the CE router already configured. In other cases, the CE router may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expect to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

