<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.ietf-homenet-front-end-naming-delegation SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-homenet-front-end-naming-delegation.xml">
<!ENTITY RFC8415 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8415.xml">
<!ENTITY RFC7858 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC7368 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7368.xml">
<!ENTITY RFC7227 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7227.xml">
<!ENTITY RFC9103 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.9103.xml">
<!ENTITY I-D.andrews-dnsop-pd-reverse SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.andrews-dnsop-pd-reverse.xml">
<!ENTITY RFC2181 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2181.xml">
<!ENTITY RFC1034 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1034.xml">
<!ENTITY RFC6672 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6672.xml">
<!ENTITY I-D.sury-dnsext-cname-dname SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.sury-dnsext-cname-dname.xml">
]>

<?rfc rfcedstyle="yes"?>
<?rfc toc="yes"?>
<?rfc tocindent="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-homenet-naming-architecture-dhc-options-23" category="std">

  <front>
    <title abbrev="DHCPv6 Options for HNA">DHCPv6 Options for Home Network Naming Authority</title>

    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>8275 Trans Canada Route</street>
          <city>Saint Laurent, QC</city>
          <code>4S 0B6</code>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <author initials="R." surname="Weber" fullname="Ralf Weber">
      <organization>Akamai</organization>
      <address>
        <email>ralf.weber@akamai.com</email>
      </address>
    </author>
    <author initials="T." surname="Mrugalski" fullname="Tomek Mrugalski">
      <organization>Internet Systems Consortium, Inc.</organization>
      <address>
        <postal>
          <street>950 Charter Street</street>
          <city>Redwood City</city>
          <code>94063</code>
          <country>US</country>
        </postal>
        <email>tomasz.mrugalski@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="October" day="23"/>

    <area>Internet</area>
    <workgroup>Homenet</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines DHCPv6 options so a Homenet Naming Authority (HNA) can automatically proceed to the appropriate configuration and outsource the authoritative naming service for the home network.
In most cases, the outsourcing mechanism is transparent for the end user.</t>



    </abstract>


  </front>

  <middle>


<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader should be familiar with <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="introduction" title="Introduction">

<t><xref target="I-D.ietf-homenet-front-end-naming-delegation"/> specifies how an entity designated as the Homenet Naming Authority (HNA) outsources a Public Homenet Zone to an DNS Outsourcing Infrastructure (DOI).</t>

<t>This document describes how a network can provision the HNA with a specific DOI.
This could be particularly useful for a DOI partly managed by an ISP, or to make home networks resilient to HNA replacement. 
The ISP delegates an IP prefix to the home network as well as the associated reverse zone.
The ISP is thus aware of the owner of that IP prefix, and as such becomes a natural candidate for hosting the Homenet Reverse Zone - that is the Reverse Distribution Manager (RDM) and potentially the Reverse Public Authoritative Servers.</t>

<t>In addition, ISPs often identify the line of the home network with a name. 
Such name is used for their internal network management operations and is not a name the home network owner has registered to.
ISPs may leverage such infrastructure and provide the home network with a specific domain name designated as per <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> a Homenet Registered Domain.
Similarly to the reverse zone, ISPs are aware of who owns that domain name and may become a natural candidate for hosting the Homenet Zone - that is the Distribution Manager (DM) and the Public Authoritative Servers.</t>

<t>This document describes DHCPv6 options that enable an ISP to provide the necessary parameters to the HNA, to proceed.
More specifically, the ISP provides the Registered Homenet Domain, necessary information on the DM and the RDM so the HNA can manage and upload the Public Homenet Zone and the Reverse Public Homenet Zone as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

<t>The use of DHCPv6 options may make the configuration completely transparent to the end user and provides a similar level of trust as the one used to provide the IP prefix - when provisioned via DHCP.</t>

</section>
<section anchor="sec-overview" title="Procedure Overview">

<t>This section illustrates how a HNA receives the necessary information via DHCPv6 options to outsource its authoritative naming service to the DOI.
For the sake of simplicity, and similarly to <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, this section assumes that the HNA and the home network DHCPv6 client are colocated on the  Customer Edge (CPE) router <xref target="RFC7368"/>.
Note also that this is not mandatory and the DHCPv6 client may instruct remotely the  HNA with a protocol that will be standardized in the future.
In addition, this section assumes the responsible entity for the DHCPv6 server is provisioned with the DM and RDM information - associated with the requested Registered Homenet Domain .
This means a Registered Homenet Domain can be associated with the DHCPv6 client.</t>

<t>This scenario is believed to be the most popular scenario. 
This document does not ignore scenarios where the DHCPv6 server does not have privileged relations with the DM or RDM.
These cases are discussed in <xref target="sec-scenario"/>.
Such scenarios do not necessarily require configuration for the end user and can also be zero-config.</t>

<t>The scenario considered in this section is as follows:</t>

<t><list style="numbers">
  <t>The HNA is willing to outsource the Public Homenet Zone or Homenet Reverse Zone. 
The DHCPv6 client is configured to include in its Option Request Option (ORO) the Registered Homenet Domain Option (OPTION_REGISTERED_DOMAIN), the Forward Distribution Manager Option (OPTION_FORWARD_DIST_MANAGER) and the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) option codes.</t>
  <t>The DHCPv6 server responds to the DHCPv6 client with the requested DHCPv6 options based on the identified homenet.
The DHCPv6 client passes the information to the HNA.</t>
  <t>The HNA is authenticated (see Section “Securing the Control Channel” of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>) by the DM and the RDM. 
The HNA builds the Homenet Zone (or the Homenet Reverse Zone) and proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The DHCPv6 options provide the necessary non optional parameters described in Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.
The HNA may complement the configurations with additional parameters via means not yet defined.
Appendix B of <xref target="I-D.ietf-homenet-front-end-naming-delegation"/> describes such parameters that may take some specific non default value.</t>
</list></t>

</section>
<section anchor="sec-format" title="DHCPv6 Option">

<t>This section details the payload of the DHCPv6 options following the guidelines of <xref target="RFC7227"/>.</t>

<section anchor="o_rd" title="Registered Homenet Domain Option">

<t>The Registered Domain Option (OPTION_REGISTERED_DOMAIN) indicates the FQDN associated with the home network.</t>

<figure title="Registered Domain Option" anchor="fig-rhd"><artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   OPTION_REGISTERED_DOMAIN    |         option-len            |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
/                   Registered Homenet Domain                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REGISTERED_DOMAIN, the option code for the Registered Homenet Domain  (TBD1).</t>
  <t>option-len (16 bits): length in octets of the Registered Homenet Domain field as described in <xref target="RFC8415"/>.</t>
  <t>Registered Homenet Domain (variable): the FQDN registered for the homenet encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

</section>
<section anchor="o_dm" title="Forward Distribution Manager Option">

<t>The Forward Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.
As opposed to IP addresses, the FQDN requires a DNS resolution before establishing the communication between the HNA and the DM. 
However, the use of a FQDN provides multiple advantages over IP addresses.
Firstly, it makes the DHCPv6 Option easier to parse and smaller - especially when IPv4 and IPv6  addresses are expected to be provided. 
Then the FQDN can reasonably be seen as a more stable identifier than IP addresses, as well as a pointer to additional information that may be useful, in the future, to establish the communication between the HNA and the DM.</t>

<figure title="Forward Distribution Manager Option" anchor="fig-dm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  OPTION_FORWARD_DIST_MANAGER  |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/                  Distribution Manager  FQDN                   /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_FORWARD_DIST_MANAGER, the option code for the Forward Distribution Manager Option (TBD2).</t>
  <t>option-len (16 bits): length in octets of the enclosed data as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the DM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a DM MAY indicate the support of multiple modes.
The left most bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Distribution Manager FQDN (variable): the FQDN of the DM encoded as described in Section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<t>It is worth noticing that the DHCP Option specifies the  Supported Transport without specifying any explicit port. Unless the HNA and the DM have agreed on using a specific port - for example by configuration, or any out of band mechanism -, the default port is used and must be specified. The specification of such default port may be defined in the specification of the designated Supported Transport or in any other document.
In the case of DNS over TLS <xref target="RFC7858"/>, the default port is defined by <xref target="RFC7858"/> with the following value: 853.</t>

<t>The need to associate in the DHCP Option the port value to each Supported Transport has been balanced with the difficulty of handling a list of tuples ( transport, port ) as well as the possibility to use a dedicated IP address for the DM in case the default port was already in use.</t>

</section>
<section anchor="reverse-distribution-manager-server-option" title="Reverse Distribution Manager Server Option">

<t>The Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER) provides the HNA with the FQDN of the DM as well as the transport protocols for the communication between the HNA and the DM.</t>

<figure title="Reverse Distribution Manager Option" anchor="fig-rdm"><artwork><![CDATA[
 0                   1                        2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION_REVERSE_DIST_MANAGER   |          option-len           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Supported Transport       |                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                                               |
/              Reverse Distribution Manager FQDN                /
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>option-code (16 bits): OPTION_REVERSE_DIST_MANAGER, the option code for the Reverse Distribution Manager Option (TBD3).</t>
  <t>option-len (16 bits): length in octets of the option-data field as described in <xref target="RFC8415"/>.</t>
  <t>Supported Transport (16 bits): defines the supported transport by the RDM (see <xref target="sec-st"/>).
Each bit represents a supported transport, and a RDM MAY indicate the support of multiple modes.
The bit for DNS over TLS <xref target="RFC7858"/> MUST be set.</t>
  <t>Reverse Distribution Manager FQDN (variable): the FQDN of the RDM encoded as described in section 10 of <xref target="RFC8415"/>.</t>
</list></t>

<t>For the port number associated to the SUpported Transport, the same considerations as described in <xref target="o_dm"/> holds.</t>

</section>
<section anchor="sec-st" title="Supported Transport">

<t>The Supported Transport field of the DHCPv6 option indicates the supported transport protocols.
Each bit represents a specific transport mechanism. 
A bit sets to 1 indicates the associated transport protocol is supported.
The corresponding bits are assigned as described in <xref target="tab-st"/> and <xref target="sec-iana"/>.</t>

<figure title="Supported Transport" anchor="tab-st"><artwork><![CDATA[
Bit Position | Transport Protocol |  Mnemonic | Reference
left to right| Description        |           |
-------------+--------------------+-----------+-----------
      0      | DNS over TLS       | DoT       | This-RFC
     1-15    | unallocated        |  -        |  -
]]></artwork></figure>

<t>DNS over TLS: indicates the support of DNS over TLS as described in <xref target="RFC7858"/> and <xref target="RFC9103"/>.</t>

</section>
</section>
<section anchor="sec-dhcp-behavior" title="DHCPv6 Behavior">

<section anchor="dhcpv6-server-behavior" title="DHCPv6 Server Behavior">

<t>Sections 17.2.2 and 18.2 of <xref target="RFC8415"/> govern server operation regarding option assignment.
As a convenience to the reader, we mention here that the server will send option foo only if configured with specific values for foo and if the client requested it.
In particular, when configured the DHCPv6 server sends the Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option when requested by the DHCPv6 client by including necessary option codes in its ORO.</t>

</section>
<section anchor="dhcpv6-client-behavior" title="DHCPv6 Client Behavior">

<t>The DHCPv6 client includes Registered Homenet Domain Option, Distribution Manager Option, the Reverse Distribution Manager Option in an ORO as specified in Sections 18.2.1, 18.2.2, 18.2.4, 18.2.5, 18.2.6, and 21.7 of <xref target="RFC8415"/>.</t>

<t>Upon receiving a DHCPv6 option described in this document in the Reply
message, the HNA SHOULD proceed as described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>.</t>

</section>
<section anchor="sec-dhcp-relay" title="DHCPv6 Relay Agent Behavior">

<t>There are no additional requirements for the DHCPv6 Relay agents.</t>

</section>
</section>
<section anchor="sec-iana" title="IANA Considerations">

<section anchor="dhcpv6-option-codes" title="DHCPv6 Option Codes">

<t>IANA is requested to assign the following new DHCPv6 Option Codes in the registry maintained in: https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<figure><artwork><![CDATA[
Value Description                   Client ORO     Singleton Option  Reference
TBD1  OPTION_REGISTERED_DOMAIN       Yes            No               [This-RFC] Section 4.1
TBD2  OPTION_FORWARD_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.2
TBD3  OPTION_REVERSE_DIST_MANAGER    Yes            Yes              [This-RFC] Section 4.3
]]></artwork></figure>

</section>
<section anchor="supported-transport-parameter" title="Supported Transport parameter">

<t>IANA is requested to maintain a new registry of Supported Transport parameter in the Distributed Manager Option (OPTION_FORWARD_DIST_MANAGER) or the Reverse Distribution Manager Option (OPTION_REVERSE_DIST_MANAGER). The different parameters are defined in <xref target="tab-st"/> in <xref target="sec-st"/>.</t>

<t>The Name of the registry is: Supported Transport parameter</t>

<t>The registry description is:  The Supported Transport field of the DHCPv6 option is a two octet field that indicates the supported transport protocols. 
Each bit represents a specific transport mechanism.</t>

<t>The parent grouping is Dynamic Host Configuration Protocol for IPv6 (DHCPv6) at https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2.</t>

<t>New entry MUST specify the bit position, the Transport Protocol Description a Mnemonic and a Reference as defined in <xref target="tab-iana"/>.</t>

<t>The initial registry is as specified in <xref target="tab-iana"/>.</t>

<t>Changes of the  format or policies of the registry is left to the IETF via the IESG.</t>

<t>Future code points are assigned under RFC Required as per <xref target="RFC8126"/>.</t>

<figure title="Supported Transport" anchor="tab-iana"><artwork><![CDATA[
Bit Position | Transport Protocol |  Mnemonic | Reference
left to right| Description        |           |  
-------------+--------------------+-----------+-----------
      0      | DNS over TLS       | DoT       | This-RFC
     1-15    | unallocated        |  -        |  -
]]></artwork></figure>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The security considerations in <xref target="RFC8415"/> are to be considered.
The trust associated with the information carried by the DHCPv6 Options described in this document is similar to the one associated with the IP prefix - when configured via DHCPv6.</t>

<t>In some cases, the ISP MAY identify the HNA by its wire line, that is to say physically which may not require to rely on TLS to authenticate the HNA. 
As TLS is mandatory to be used, it is expected the HNA is provisioned with a certificate. 
In some cases, the HNA may use a self signed certificate.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Marcin Siodelski, Bernie Volz and Ted Lemon for their comments on the design of the DHCPv6 options.
We would also like to thank Mark Andrews, Andrew Sullivan and Lorenzo Colliti for their remarks on the architecture design. The designed solution has been largely been inspired by Mark Andrews’s document <xref target="I-D.andrews-dnsop-pd-reverse"/> as well as discussions with Mark.
We also thank Ray Hunter and Michael Richardson for its reviews, its comments and for suggesting an appropriated terminology.</t>

</section>
<section anchor="contributors" title="Contributors">

<t>The co-authors would like to thank Chris Griffiths and Wouter Cloetens that provided a significant contribution in the early versions of the document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8174;
&I-D.ietf-homenet-front-end-naming-delegation;
&RFC8415;
&RFC7858;
&RFC8126;


    </references>

    <references title='Informative References'>

&RFC7368;
&RFC7227;
&RFC9103;
&I-D.andrews-dnsop-pd-reverse;
&RFC2181;
&RFC1034;
&RFC6672;
&I-D.sury-dnsext-cname-dname;


    </references>


<section anchor="sec-scenario" title="Scenarios and impact on the End User">

<t>This appendix details various scenarios and discuss their impact on the end user.
This appendix is not normative and limits the description of a limited scope of scenarios that are assumed to be representative. Many other scenarios may be derived from these.</t>

<section anchor="sec-scenario-1" title="Base Scenario">

<t>The base scenario is the one described in <xref target="sec-overview"/> in which an ISP manages the DHCPv6 server, the DM and RDM.</t>

<t>The end user subscribes to the ISP (foo), and at subscription time registers for foo.example as its Registered Homenet Domain foo.example.</t>

<t>In this scenario, the DHCPv6 server, DM and RDM are managed by the ISP so the DHCPv6 server and as such can provide authentication credentials of the HNA to enable secure authenticated transaction with the DM and the Reverse DM.</t>

<t>The main advantage of this scenario is that the naming architecture is configured automatically and transparently for the end user.
The drawbacks are that the end user uses a Registered Homenet Domain managed by the ISP and that it relies on the ISP naming infrastructure.</t>

</section>
<section anchor="scenario-2" title="Third Party Registered Homenet Domain">

<t>This appendix considers the case when the end user wants its home network to use example.com not managed by her ISP (foo) as a Registered Homenet Domain.
This appendix still considers the ISP manages the home network and still provides foo.example as a Registered Homenet Domain.</t>

<t>When the end user buys the domain name example.com, it may request to redirect the name example.com to foo.example using static redirection with CNAME <xref target="RFC2181"/>, <xref target="RFC1034"/>, DNAME <xref target="RFC6672"/> or CNAME+DNAME <xref target="I-D.sury-dnsext-cname-dname"/>.
The only information the end user needs to know is the domain name assigned by the ISP.
Once the redirection has been configured, the HNA may be changed, the zone can be updated as in <xref target="sec-scenario-1"/> without any additional configuration from the end user.</t>

<t>The main advantage of this scenario is that the end user benefits from the Zero Configuration of the Base Scenario <xref target="sec-scenario-1"/>.
Then, the end user is able to register for its home network an unlimited number of domain names provided by an unlimited number of different third party providers.
The drawback of this scenario may be that the end user still rely on the ISP naming infrastructure.
Note that the only case this may be inconvenient is when the DNS servers provided by the ISPs results in high latency.</t>

</section>
<section anchor="scenario-3" title="Third Party DNS Infrastructure">

<t>This scenario considers that the end user uses example.com as a Registered Homenet Domain, and does not want to rely on the authoritative servers provided by the ISP.</t>

<t>In this appendix we limit the outsourcing to the DM and Public Authoritative Server(s) to a third party.
The Reverse Public Authoritative Server(s) and the RDM remain managed by the ISP as the IP prefix is managed by the ISP.</t>

<t>Outsourcing to a third party DM can be performed in the following ways:</t>

<t><list style="numbers">
  <t>Updating the DHCPv6 server Information. One can imagine a GUI interface that enables the end user to modify its profile parameters. Again, this configuration update is done once-for-ever.</t>
  <t>Upload the configuration of the DM to the HNA. In some cases, the provider of the CPE router hosting the HNA may be the registrar and provide the CPE router already configured. In other cases, the CPE router may request the end user to log into the registrar to validate the ownership of the Registered Homenet Domain and agree on the necessary credentials to secure the communication between the HNA and the DM. As described in <xref target="I-D.ietf-homenet-front-end-naming-delegation"/>, such settings could be performed in an almost automatic way as to limit the necessary interactions with the end user.</t>
</list></t>

</section>
<section anchor="scenario-4" title="Multiple ISPs">

<t>This scenario considers a HNA connected to multiple ISPs.</t>

<t>Suppose the HNA has been configured each of its interfaces independently with each ISPS as described in <xref target="sec-scenario-1"/>.
Each ISP provides a different Registered Homenet Domain.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs with multiple Registered Homenet Domains.
However, the HNA should be able to handle different Registered Homenet Domains.
This is an implementation issue which is outside the scope of the current document.</t>

<t>If a HNA is not able to handle multiple Registered Homenet Domains, the HNA may remain connected to multiple ISP with a single Registered Homenet Domain.
In this case, one entity is chosen to host the Registered Homenet Domain.
This entity may be one of the ISP or a third party.
Note that having multiple ISPs can be motivated for bandwidth aggregation, or connectivity fail-over.
In the case of connectivity fail-over, the fail-over concerns the access network and a failure of the access network may not impact the core network where the DM and Public Authoritative Primaries are hosted.
In that sense, choosing one of the ISP even in a scenario of multiple ISPs may make sense.
However, for sake of simplicity, this scenario assumes that a third party has been chosen to host the Registered Homenet Domain.
Configuration is performed as described in <xref target="scenario-2"/> and <xref target="scenario-3"/>.</t>

<t>With the configuration described in <xref target="scenario-2"/>,  the HNA is expected to be able to handle multiple Homenet Registered Domain, as the third party redirect to one of the ISPs servers.
With the configuration described in <xref target="scenario-3"/>, DNS zone are hosted and maintained by the third party.
A single DNS(SEC) Homenet Zone is built and maintained by the HNA.
This latter configuration is likely to match most HNA implementations.</t>

<t>The protocol and DHCPv6 options described in this document are fully compatible with a HNA connected to multiple ISPs.
To configure or not and how to configure the HNA depends on the HNA facilities.
<xref target="sec-scenario-1"/> and  <xref target="scenario-2"/> require the HNA to handle multiple Registered Homenet Domain, whereas <xref target="scenario-3"/> does not have such requirement.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

