fbpx
Wikipedia

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.[1]

The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the server using DHCP.

DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks.[2] Many routers and residential gateways have DHCP server capability. Most residential network routers receive a unique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device.

DHCP services exist for networks running Internet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is commonly called DHCPv6.

History

The Reverse Address Resolution Protocol (RARP) was defined in RFC 903 in 1984 for the configuration of simple devices, such as diskless workstations, with a suitable IP address. Acting in the data link layer, it made implementation difficult on many server platforms. It required that a server be present on each individual network link. RARP was superseded by the Bootstrap Protocol (BOOTP) defined in RFC 951 in September 1985. This introduced the concept of a relay agent, which allowed the forwarding of BOOTP packets across networks, allowing one central BOOTP server to serve hosts on many IP subnets.[3]

DHCP is based on BOOTP but can dynamically allocate IP addresses from a pool and reclaim them when they are no longer in use. It can also be used to deliver a wide range of extra configuration parameters to IP clients, including platform-specific parameters.[4] DHCP was first defined in RFC 1531 in October 1993, but due to errors in the editorial process was almost immediately reissued as RFC 1541.

Four years later the DHCPINFORM message type[5] and other small changes were added by RFC 2131, which as of 2021 remains the core of the standard for IPv4 networks, with updates in RFC 3396, RFC 4361, RFC 5494, and RFC 6842.[6]

DHCPv6 was initially described by RFC 3315 in 2003. After updates by many subsequent RFCs,[7] it was replaced with RFC 8415, which merged in prefix delegation, and stateless address autoconfiguration.

Overview

Internet Protocol (IP) defines how devices communicate within and across local networks on the Internet. A DHCP server can manage IP settings for devices on its local network, e.g., by assigning IP addresses to those devices automatically and dynamically.[8]

DHCP operates based on the client–server model. When a computer or other device connects to a network, the DHCP client software sends a DHCP broadcast query requesting the necessary information. Any DHCP server on the network may service the request. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, domain name, the name servers, and time servers. On receiving a DHCP request, the DHCP server may respond with specific information for each client, as previously configured by an administrator, or with a specific address and any other information valid for the entire network and for the time period for which the allocation (lease) is valid. A DHCP client typically queries this information immediately after booting, and periodically thereafter before the expiration of the information. When a DHCP client refreshes an assignment, it initially requests the same parameter values, but the DHCP server may assign a new address based on the assignment policies set by administrators.

On large networks that consist of multiple links, a single DHCP server may service the entire network when aided by DHCP relay agents located on the interconnecting routers. Such agents relay messages between DHCP clients and DHCP servers located on different subnets.

Depending on implementation, the DHCP server may have three methods of allocating IP addresses:

Dynamic allocation
A network administrator reserves a range of IP addresses for DHCP, and each DHCP client on the LAN is configured to request an IP address from the DHCP server during network initialization. The request-and-grant process uses a lease concept with a controllable time period, allowing the DHCP server to reclaim and then reallocate IP addresses that are not renewed.
Automatic allocation
The DHCP server permanently assigns an IP address to a requesting client from a range defined by an administrator. This is like dynamic allocation, but the DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.
Manual allocation
This method is also variously called static DHCP allocation, fixed address allocation, reservation, and MAC/IP address binding. An administrator maps a unique identifier (a client id or MAC address) for each client to an IP address, which is offered to the requesting client. DHCP servers may be configured to fall back to other methods if this fails.

DHCP services are used for Internet Protocol version 4 (IPv4) and IPv6. The details of the protocol for IPv4 and IPv6 differ sufficiently that they may be considered separate protocols.[9] For the IPv6 operation, devices may alternatively use stateless address autoconfiguration. IPv6 hosts may also use link-local addressing to achieve operations restricted to the local network link.

Operation

 
An illustration of a typical non-renewing DHCP session; each message may be either a broadcast or a unicast, depending on the DHCP client capabilities.[10]

The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). It is implemented with two UDP port numbers for its operations which are the same as for the bootstrap protocol (BOOTP). The server listens on UDP port number 67, and the client listens on UDP port number 68.

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

The DHCP operation begins with clients broadcasting a request. If the client and server are in different Broadcast Domains, a DHCP Helper or DHCP Relay Agent may be used. Clients requesting renewal of an existing lease may communicate directly via UDP unicast, since the client already has an established IP address at that point. Additionally, there is a BROADCAST flag (1 bit in 2 byte flags field, where all other bits are reserved and so are set to 0) the client can use to indicate in which way (broadcast or unicast) it can receive the DHCPOFFER: 0x8000 for broadcast, 0x0000 for unicast.[10] Usually, the DHCPOFFER is sent through unicast. For those hosts which cannot accept unicast packets before IP addresses are configured, this flag can be used to work around this issue.

Discovery

The DHCP client broadcasts a DHCPDISCOVER message on the network subnet using the destination address 255.255.255.255 (limited broadcast) or the specific subnet broadcast address (directed broadcast). A DHCP client may also request its last known IP address. If the client remains connected to the same network, the server may grant the request. Otherwise, it depends whether the server is set up as authoritative or not. An authoritative server denies the request, causing the client to issue a new request. A non-authoritative server simply ignores the request, leading to an implementation-dependent timeout for the client to expire the request and ask for a new IP address.

For example, if HTYPE is set to 1, to specify that the medium used is Ethernet, HLEN is set to 6 because an Ethernet address (MAC address) is 6 octets long. The CHADDR is set to the MAC address used by the client. Some options are set as well.

Example DHCPDISCOVER message

Ethernet: source=sender's MAC; destination=FF:FF:FF:FF:FF:FF

IP: source=0.0.0.0; destination=255.255.255.255
UDP: source port=68; destination port=67

Octet 0 Octet 1 Octet 2 Octet 3
OP HTYPE HLEN HOPS
0x01 0x01 0x06 0x00
XID
0x3903F326
SECS FLAGS
0x0000 0x0000
CIADDR (Client IP address)
0x00000000
YIADDR (Your IP address)
0x00000000
SIADDR (Server IP address)
0x00000000
GIADDR (Gateway IP address)
0x00000000
CHADDR (Client hardware address)
0x00053C04
0x8D590000
0x00000000
0x00000000
192 octets of 0s, or overflow space for additional options; BOOTP legacy.
Magic cookie
0x63825363
DHCP options
0x350101 53: 1 (DHCP Discover)
0x3204c0a80164 50: 192.168.1.100 requested
0x370401030f06 55 (Parameter Request List):
  • 1 (Request Subnet Mask),
  • 3 (Router),
  • 15 (Domain Name),
  • 6 (Domain Name Server)
0xff 255 (Endmark)

Offer

When a DHCP server receives a DHCPDISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a DHCPOFFER message to the client. This message contains the client's client id (traditionally a MAC address), the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer. The DHCP server may also take notice of the hardware-level MAC address in the underlying transport layer: according to current RFCs the transport layer MAC address may be used if no client ID is provided in the DHCP packet.

The DHCP server determines the configuration based on the client's hardware address as specified in the CHADDR (client hardware address) field. In the following example the server (192.168.1.1) specifies the client's IP address in the YIADDR (your IP address) field.

Example DHCPOFFER message

Ethernet: source=sender's MAC; destination=client mac address

IP: source=192.168.1.1; destination=192.168.1.100
UDP: source port=67; destination port=68

Octet 0 Octet 1 Octet 2 Octet 3
OP HTYPE HLEN HOPS
0x02 0x01 0x06 0x00
XID
0x3903F326
SECS FLAGS
0x0000 0x0000
CIADDR (Client IP address)
0x00000000
YIADDR (Your IP address)
0xC0A80164 (192.168.1.100)
SIADDR (Server IP address)
0xC0A80101 (192.168.1.1)
GIADDR (Gateway IP address)
0x00000000
CHADDR (Client hardware address)
0x00053C04
0x8D590000
0x00000000
0x00000000
192 octets of 0s; BOOTP legacy.
Magic cookie
0x63825363
DHCP options
53: 2 (DHCP Offer)
1 (subnet mask): 255.255.255.0
3 (Router): 192.168.1.1
51 (IP address lease time): 86400s (1 day)
54 (DHCP server): 192.168.1.1
6 (DNS servers):
  • 9.7.10.15,
  • 9.7.10.16,
  • 9.7.10.18

Request

In response to the DHCP offer, the client replies with a DHCPREQUEST message, broadcast to the server,[a] requesting the offered address. A client can receive DHCP offers from multiple servers, but it will accept only one DHCP offer. Before claiming an IP address, the client will broadcast an ARP request, in order to find if there is another host present in the network with the proposed IP address. If there is no reply, this address does not conflict with that of another host, so it is free to be used.

The client must send the server identification option in the DHCPREQUEST message, indicating the server whose offer the client has selected.[11]: Section 3.1, Item 3  When other DHCP servers receive this message, they withdraw any offers that they have made to the client and return their offered IP address to the pool of available addresses.

Example DHCPREQUEST message

Ethernet: source=sender's MAC; destination=FF:FF:FF:FF:FF:FF

IP: source=0.0.0.0; destination=255.255.255.255;[a]
UDP: source port=68; destination port=67

Octet 0 Octet 1 Octet 2 Octet 3
OP HTYPE HLEN HOPS
0x01 0x01 0x06 0x00
XID
0x3903F326
SECS FLAGS
0x0000 0x0000
CIADDR (Client IP address)
0x00000000
YIADDR (Your IP address)
0x00000000
SIADDR (Server IP address)
0xC0A80101 (192.168.1.1)
GIADDR (Gateway IP address)
0x00000000
CHADDR (Client hardware address)
0x00053C04
0x8D590000
0x00000000
0x00000000
192 octets of 0s; BOOTP legacy.
Magic cookie
0x63825363
DHCP options
53: 3 (DHCP Request)
50: 192.168.1.100 requested
54 (DHCP server): 192.168.1.1

Acknowledgement

When the DHCP server receives the DHCPREQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is completed.

The protocol expects the DHCP client to configure its network interface with the negotiated parameters.

After the client obtains an IP address, it should probe the newly received address[12] (e.g. with ARP Address Resolution Protocol) to prevent address conflicts caused by overlapping address pools of DHCP servers. If this probe finds another computer using that address, the computer should send DHCPDECLINE, broadcast, to the server.

Example DHCPACK message

Ethernet: source=sender's MAC; destination=client's MAC

IP: source=192.168.1.1; destination=192.168.1.100
UDP: source port=67; destination port=68

Octet 0 Octet 1 Octet 2 Octet 3
OP HTYPE HLEN HOPS
0x02 0x01 0x06 0x00
XID
0x3903F326
SECS FLAGS
0x0000 0x0000
CIADDR (Client IP address)
0x00000000
YIADDR (Your IP address)
0xC0A80164 (192.168.1.100)
SIADDR (Server IP address)
0xC0A80101 (192.168.1.1)
GIADDR (Gateway IP address switched by relay)
0x00000000
CHADDR (Client hardware address)
0x00053C04
0x8D590000
0x00000000
0x00000000
192 octets of 0s. BOOTP legacy
Magic cookie
0x63825363
DHCP options
53: 5 (DHCP ACK)
1 (subnet mask): 255.255.255.0
3 (Router): 192.168.1.1
51 (IP address lease time): 86400s (1 day)
54 (DHCP server): 192.168.1.1
6 (DNS servers):
  • 9.7.10.15,
  • 9.7.10.16,
  • 9.7.10.18

Information

A DHCP client may request more information than the server sent with the original DHCPOFFER. The client may also request repeat data for a particular application. For example, browsers use DHCP Inform to obtain web proxy settings via WPAD.

Releasing

The client sends a request to the DHCP server to release the DHCP information and the client deactivates its IP address. As client devices usually do not know when users may unplug them from the network, the protocol does not mandate the sending of DHCP Release.

Client configuration parameters

A DHCP server can provide optional configuration parameters to the client. RFC 2132 describes the available DHCP options defined by Internet Assigned Numbers Authority (IANA) - DHCP and BOOTP PARAMETERS.[13]

A DHCP client can select, manipulate and overwrite parameters provided by a DHCP server. In Unix-like systems this client-level refinement typically takes place according to the values in the configuration file /etc/dhclient.conf.

Options

Options are octet strings of varying length. This is called Type–length–value encoding. The first octet is the option code, the second octet is the number of following octets and the remaining octets are code dependent. For example, the DHCP message-type option for an offer would appear as 0x35, 0x01, 0x02, where 0x35 is code 53 for "DHCP message type", 0x01 means one octet follows and 0x02 is the value of "offer".

The following tables list the available DHCP options, as listed in RFC 2132[14] and IANA registry.[13]

RFC 1497 (BOOTP Vendor Information Extensions) vendor extensions[14]: Section 3 
Code Name Length Notes
0 Pad 0 octets Can be used to pad other options so that they are aligned to the word boundary; is not followed by length byte
1 Subnet mask 4 octets Client's subnet mask as per RFC 950. If both the subnet mask and the router option (option 3) are included, the subnet mask option must be first.
2 Time offset 4 octets Offset of the client's subnet in seconds from Coordinated Universal Time (UTC). The offset is expressed as a two's complement 32-bit integer. A positive offset indicates a location east of the zero meridian and a negative offset indicates a location west of the zero meridian.
3 Router Multiples of 4 octets Available routers, should be listed in order of preference
4 Time server Multiples of 4 octets Available time servers to synchronise with, should be listed in order of preference
5 Name server Multiples of 4 octets Available IEN 116 name servers, should be listed in order of preference
6 Domain name server Multiples of 4 octets Available DNS servers, should be listed in order of preference
7 Log server Multiples of 4 octets Available log servers, should be listed in order of preference
8 Cookie server Multiples of 4 octets Cookie in this case means "fortune cookie" or "quote of the day", a pithy or humorous anecdote often sent as part of a logon process on large computers; it has nothing to do with cookies sent by websites.
9 LPR Server Multiples of 4 octets A list of RFC 1179 line printer servers available to the client, should be listed in order of preference
10 Impress server Multiples of 4 octets A list of Imagen Impress servers available to the client, should be listed in order of preference
11 Resource location server Multiples of 4 octets A list of RFC 887 Resource Location servers available to the client, should be listed in order of preference
12 Host name Minimum of 1 octet Name of the client. The name may be qualified with the local domain name.
13 Boot file size 2 octets Length of the boot image in 512B blocks
14 Merit dump file Minimum of 1 octet Path where crash dumps should be stored
15 Domain name Minimum of 1 octet
16 Swap server 4 octets
17 Root path Minimum of 1 octet
18 Extensions path Minimum of 1 octet
255 End 0 octets Used to mark the end of the vendor option field
IP layer parameters per host[14]: Section 4 
Code Name Length Notes
19 IP forwarding enable/disable 1 octet
20 Non-local source routing enable/disable 1 octet
21 Policy filter Multiples of 8 octets
22 Maximum datagram reassembly size 2 octets
23 Default IP time-to-live 1 octet
24 Path MTU aging timeout 4 octets
25 Path MTU plateau table Multiples of 2 octets
IP Layer Parameters per Interface[14]: Section 5 
Code Name Length Notes
26 Interface MTU 2 octets
27 All subnets are local 1 octet
28 Broadcast address 4 octets
29 Perform mask discovery 1 octet
30 Mask supplier 1 octet
31 Perform router discovery 1 octet
32 Router solicitation address 4 octets
33 Static route Multiples of 8 octets A list of destination/router pairs
Link layer parameters per interface[14]: Section 6 
Code Name Length Notes
34 Trailer encapsulation option 1 octet
35 ARP cache timeout 4 octets
36 Ethernet encapsulation 1 octet
TCP parameters[14]: Section 7 
Code Name Length Notes
37 TCP default TTL 1 octet
38 TCP keepalive interval 4 octets
39 TCP keepalive garbage 1 octet
Application and service parameters[14]: Section 8 
Code Name Length Notes
40 Network information service domain Minimum of 1 octet
41 Network information servers Multiples of 4 octets
42 Network Time Protocol (NTP) servers Multiples of 4 octets
43 Vendor-specific information Minimum of 1 octets
44 NetBIOS over TCP/IP name server Multiples of 4 octets
45 NetBIOS over TCP/IP datagram Distribution Server Multiples of 4 octets
46 NetBIOS over TCP/IP node type 1 octet
47 NetBIOS over TCP/IP scope Minimum of 1 octet
48 X Window System font server Multiples of 4 octets
49 X Window System display manager Multiples of 4 octets
64 Network Information Service+ domain Minimum of 1 octet
65 Network Information Service+ servers Multiples of 4 octets
68 Mobile IP home agent Multiples of 4 octets
69 Simple Mail Transfer Protocol (SMTP) server Multiples of 4 octets
70 Post Office Protocol (POP3) server Multiples of 4 octets
71 Network News Transfer Protocol (NNTP) server Multiples of 4 octets
72 Default World Wide Web (WWW) server Multiples of 4 octets
73 Default Finger protocol server Multiples of 4 octets
74 Default Internet Relay Chat (IRC) server Multiples of 4 octets
75 StreetTalk server Multiples of 4 octets
76 StreetTalk Directory Assistance (STDA) server Multiples of 4 octets
DHCP extensions[14]: Section 9 
Code Name Length Notes
50 Requested IP address 4 octets
51 IP address lease time 4 octets
52 Option overload 1 octet
53 DHCP message type 1 octet
54 Server identifier 4 octets
55 Parameter request list Minimum of 1 octet
56 Message Minimum of 1 octet
57 Maximum DHCP message size 2 octets
58 Renewal (T1) time value 4 octets
59 Rebinding (T2) time value 4 octets
60 Vendor class identifier Minimum of 1 octet
61 Client-identifier Minimum of 2 octets
66 TFTP server name Minimum of 1 octet
67 Bootfile name Minimum of 1 octet

DHCP message types

This table lists the DHCP message types, documented in RFC 2132, RFC 3203,[15] RFC 4388,[16] RFC 6926[17] and RFC 7724.[18] These codes are the value in the DHCP extension 53, shown in the table above.

DHCP message types
Code Name Length RFC
1 DHCPDISCOVER 1 octet rfc2132[14]: Section 9.6 
2 DHCPOFFER 1 octet rfc2132[14]: Section 9.6 
3 DHCPREQUEST 1 octet rfc2132[14]: Section 9.6 
4 DHCPDECLINE 1 octet rfc2132[14]: Section 9.6 
5 DHCPACK 1 octet rfc2132[14]: Section 9.6 
6 DHCPNAK 1 octet rfc2132[14]: Section 9.6 
7 DHCPRELEASE 1 octet rfc2132[14]: Section 9.6 
8 DHCPINFORM 1 octet rfc2132[14]: Section 9.6 
9 DHCPFORCERENEW 1 octet rfc3203[15]: Section 4 
10 DHCPLEASEQUERY 1 octet rfc4388[16]: Section 6.1 
11 DHCPLEASEUNASSIGNED 1 octet rfc4388[16]: Section 6.1 
12 DHCPLEASEUNKNOWN 1 octet rfc4388[16]: Section 6.1 
13 DHCPLEASEACTIVE 1 octet rfc4388[16]: Section 6.1 
14 DHCPBULKLEASEQUERY 1 octet rfc6926[17]: Section 6.2.1 
15 DHCPLEASEQUERYDONE 1 octet rfc6926[17]: Section 6.2.1 
16 DHCPACTIVELEASEQUERY 1 octet rfc7724[18]: Section 5.2.1 
17 DHCPLEASEQUERYSTATUS 1 octet rfc7724[18]: Section 5.2.1 
18 DHCPTLS 1 octet rfc7724[18]: Section 5.2.1 

Client vendor identification

An option exists to identify the vendor and functionality of a DHCP client. The information is a variable-length string of characters or octets which has a meaning specified by the vendor of the DHCP client. One method by which a DHCP client can communicate to the server that it is using a certain type of hardware or firmware is to set a value in its DHCP requests called the Vendor Class Identifier (VCI) (Option 60). This method allows a DHCP server to differentiate between the two kinds of client machines and process the requests from the two types of modems appropriately. Some types of set-top boxes also set the VCI (Option 60) to inform the DHCP server about the hardware type and functionality of the device. The value to which this option is set gives the DHCP server a hint about any required extra information that this client needs in a DHCP response.

Other extensions

Documented DHCP options
Code Name Length RFC
82 Relay agent information Minimum of 2 octets RFC 3046[19]
85 Novell Directory Service (NDS) servers Minimum of 4 octets, multiple of 4 octets RFC 2241[20]: Section 2 
86 NDS tree name Variable RFC 2241[20]: Section 3 
87 NDS context Variable RFC 2241[20]: Section 4 
100 Time zone, POSIX style Variable RFC 4833[21]
101 Time zone, tz database style Variable RFC 4833[21]
114 DHCP Captive-Portal Variable RFC 8910[22]
119 Domain search Variable RFC 3397[23]
121 Classless static route Variable RFC 3442[24]
209 Configuration File Variable RFC 5071[25]
210 Path Prefix Variable RFC 5071[25]
211 Reboot Time Variable RFC 5071[25]

Relay agent information sub-options

The relay agent information option (option 82) specifies container for attaching sub-options to DHCP requests transmitted between a DHCP relay and a DHCP server.[19]

Relay agent sub-options
Code Name Length RFC
1 Agent Circuit ID Minimum of 1 octet RFC 3046[19]
2 Agent Remote ID Minimum of 1 octet RFC 3046[19]
4 Data-Over-Cable Service Interface Specifications (DOCSIS) device class 4 octets RFC 3256[26]

Relaying

In small networks, where only one IP subnet is being managed, DHCP clients communicate directly with DHCP servers. However, DHCP servers can also provide IP addresses for multiple subnets. In this case, a DHCP client that has not yet acquired an IP address cannot communicate directly with a DHCP server not on the same subnet, as the client's broadcast can only be received on its own subnet.

In order to allow DHCP clients on subnets not directly served by DHCP servers to communicate with DHCP servers, DHCP relay agents can be installed on these subnets. A DHCP relay agent runs on a network device, capable of routing between the client's subnet and the subnet of the DHCP server. The DHCP client broadcasts on the local link; the relay agent receives the broadcast and transmits it to one or more DHCP servers using unicast. The IP addresses of the DHCP servers are manually configured in the relay agent. The relay agent stores its own IP address, from the interface on which it has received the client's broadcast, in the GIADDR field of the DHCP packet. The DHCP server uses the GIADDR-value to determine the subnet, and subsequently the corresponding address pool, from which to allocate an IP address. When the DHCP server replies to the client, it sends the reply to the GIADDR-address, again using unicast. The relay agent then retransmits the response on the local network, using unicast (in most cases) to the newly reserved IP address, in an Ethernet frame directed to the client's MAC address. The client should accept the packet as its own, even when that IP address is not yet set on the interface.[11]: 25  Directly after processing the packet, the client sets the IP address on its interface and is ready for regular IP communication, directly thereafter.

If the client's implementation of the IP stack does not accept unicast packets when it has no IP address yet, the client may set the broadcast bit in the FLAGS field when sending a DHCPDISCOVER packet. The relay agent will use the 255.255.255.255 broadcast IP address (and the clients MAC address) to inform the client of the server's DHCPOFFER.

The communication between the relay agent and the DHCP server typically uses both a source and destination UDP port of 67.

Client states

 
A simplified DHCP client state-transition diagram based on figure 5 of RFC 2131.

As described in RFC 2131,[11]: Section 4.4  a DHCP client can receive these messages from a server:

  • DHCPOFFER
  • DHCPACK
  • DHCPNAK

The client moves through DHCP states depending on how the server responds to the messages that the client sends.

Reliability

The DHCP ensures reliability in several ways: periodic renewal, rebinding,[11]: Section 4.4.5  and failover. DHCP clients are allocated leases that last for some period of time. Clients begin to attempt to renew their leases once half the lease interval has expired.[11]: Section 4.4.5 Paragraph 3  They do this by sending a unicast DHCPREQUEST message to the DHCP server that granted the original lease. If that server is down or unreachable, it will fail to respond to the DHCPREQUEST. However, in that case the client repeats the DHCPREQUEST from time to time,[11]: Section 4.4.5 Paragraph 8 [b] so if the DHCP server comes back up or becomes reachable again, the DHCP client will succeed in contacting it and renew the lease.

If the DHCP server is unreachable for an extended period of time,[11]: Section 4.4.5 Paragraph 5  the DHCP client will attempt to rebind, by broadcasting its DHCPREQUEST rather than unicasting it. Because it is broadcast, the DHCPREQUEST message will reach all available DHCP servers. If some other DHCP server is able to renew the lease, it will do so at this time.

In order for rebinding to work, when the client successfully contacts a backup DHCP server, that server must have accurate information about the client's binding. Maintaining accurate binding information between two servers is a complicated problem; if both servers are able to update the same lease database, there must be a mechanism to avoid conflicts between updates on the independent servers. A proposal for implementing fault-tolerant DHCP servers was submitted to the Internet Engineering Task Force, but never formalized.[27][c]

If rebinding fails, the lease will eventually expire. When the lease expires, the client must stop using the IP address granted to it in its lease.[11]: Section 4.4.5 Paragraph 9  At that time it will restart the DHCP process from the beginning by broadcasting a DHCPDISCOVER message. Since its lease has expired, it will accept any IP address offered to it. Once it has a new IP address (presumably from a different DHCP server) it will once again be able to use the network. However, since its IP address has changed, any ongoing connections will be broken.

IPv6 networks

The basic methodology of DHCP was developed for networks based on Internet Protocol version 4 (IPv4). Since the development and deployment of IPv6 networks, DHCP has also been used for assigning parameters in such networks, despite the inherent features of IPv6 for stateless address autoconfiguration. The IPv6 version of the protocol is designated as DHCPv6.[28]

Security

The base DHCP does not include any mechanism for authentication.[29] Because of this, it is vulnerable to a variety of attacks. These attacks fall into three main categories:

  • Unauthorized DHCP servers providing false information to clients.[30]
  • Unauthorized clients gaining access to resources.[30]
  • Resource exhaustion attacks from malicious DHCP clients.[30]

Because the client has no way to validate the identity of a DHCP server, unauthorized DHCP servers (commonly called "rogue DHCP") can be operated on networks, providing incorrect information to DHCP clients.[31] This can serve either as a denial-of-service attack, preventing the client from gaining access to network connectivity,[32] or as a man-in-the-middle attack.[33] Because the DHCP server provides the DHCP client with server IP addresses, such as the IP address of one or more DNS servers,[30] an attacker can convince a DHCP client to do its DNS lookups through its own DNS server, and can therefore provide its own answers to DNS queries from the client.[34] This in turn allows the attacker to redirect network traffic through itself, allowing it to eavesdrop on connections between the client and network servers it contacts, or to simply replace those network servers with its own.[34]

Because the DHCP server has no secure mechanism for authenticating the client, clients can gain unauthorized access to IP addresses by presenting credentials, such as client identifiers, that belong to other DHCP clients.[31] This also allows DHCP clients to exhaust the DHCP server's store of IP addresses—by presenting new credentials each time it asks for an address, the client can consume all the available IP addresses on a particular network link, preventing other DHCP clients from getting service.[31]

DHCP does provide some mechanisms for mitigating these problems. The Relay Agent Information Option protocol extension (RFC 3046, usually referred to in the industry by its actual number as Option 82[35][36]) allows network operators to attach tags to DHCP messages as these messages arrive on the network operator's trusted network. This tag is then used as an authorization token to control the client's access to network resources. Because the client has no access to the network upstream of the relay agent, the lack of authentication does not prevent the DHCP server operator from relying on the authorization token.[29]

Another extension, Authentication for DHCP Messages (RFC 3118), provides a mechanism for authenticating DHCP messages. As of 2002, RFC 3118 had not seen widespread adoption because of the problems of managing keys for large numbers of DHCP clients.[37] A 2007 book about DSL technologies remarked that:

there were numerous security vulnerabilities identified against the security measures proposed by RFC 3118. This fact, combined with the introduction of 802.1x, slowed the deployment and take-rate of authenticated DHCP, and it has never been widely deployed.[38]

A 2010 book notes that:

[t]here have been very few implementations of DHCP Authentication. The challenges of key management and processing delays due to hash computation have been deemed too heavy a price to pay for the perceived benefits.[39]

Architectural proposals from 2008 involve authenticating DHCP requests using 802.1x or PANA (both of which transport EAP).[40] An IETF proposal was made for including EAP in DHCP itself, the so-called EAPoDHCP;[41] this does not appear to have progressed beyond IETF draft level, the last of which dates to 2010.[42]

IETF standards documents

  • RFC 2131, Dynamic Host Configuration Protocol
  • RFC 2132, DHCP Options and BOOTP Vendor Extensions
  • RFC 3046, DHCP Relay Agent Information Option
  • RFC 3397, Dynamic Host Configuration Protocol (DHCP) Domain Search Option
  • RFC 3942, Reclassifying Dynamic Host Configuration Protocol Version Four (DHCPv4) Options
  • RFC 4242, Information Refresh Time Option for Dynamic Host Configuration Protocol for IPv6
  • RFC 4361, Node-specific Client Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4)
  • RFC 4436, Detecting Network Attachment in IPv4 (DNAv4)
  • RFC 3442, Classless Static Route Option for Dynamic Host Configuration Protocol (DHCP) version 4
  • RFC 3203, DHCP reconfigure extension
  • RFC 4388, Dynamic Host Configuration Protocol (DHCP) Leasequery
  • RFC 6926, DHCPv4 Bulk Leasequery
  • RFC 7724, Active DHCPv4 Lease Query

See also

Notes

  1. ^ a b As an optional client behavior, some broadcasts, such as those carrying DHCP discovery and request messages, may be replaced with unicasts in case the DHCP client already knows the DHCP server's IP address.[11]
  2. ^ The RFC calls for the client to wait one half of the remaining time until T2 before it retransmits the DHCPREQUEST packet
  3. ^ The proposal provided a mechanism whereby two servers could remain loosely in sync with each other in such a way that even in the event of a total failure of one server, the other server could recover the lease database and continue operating. Due to the length and complexity of the specification, it was never published as a standard; however, the techniques described in the proposal are in wide use, with open-source and several commercial implementations.

References

  1. ^ Gillis, Alexander S. "What is DHCP (Dynamic Host Configuration Protocol)?". TechTarget: SearchNetworking. Retrieved 19 February 2021.
  2. ^ Peterson, Larry L.; Davie, Bruce S. (2011). Computer Networks: A Systems Approach (5th ed.). Elsevier. ISBN 978-0123850607. Retrieved March 21, 2019.
  3. ^ Bill Croft; John Gilmore (September 1985). "RFC 951 - Bootstrap Protocol". Network Working Group. doi:10.17487/RFC0951.
  4. ^ Network+ Certification 2006 Published By Microsoft Press.
  5. ^ used for the Web Proxy Autodiscovery Protocol Web Proxy Autodiscovery Protocol (WPAD)
  6. ^ Droms, R. (March 1997). "Dynamic Host Configuration Protocol". doi:10.17487/RFC2131. Retrieved 2 December 2021. {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ RFC 4361, RFC 5494, RFC 6221, RFC 6422, RFC 6644, RFC 7083, RFC 7227, RFC 7283
  8. ^ "DHCP - Dynamic Host Configuration Protocol".
  9. ^ Droms, Ralph; Lemon, Ted (2003). The DHCP Handbook. SAMS Publishing. p. 436. ISBN 978-0-672-32327-0.
  10. ^ a b Droms, Ralph (March 1997). "Dynamic Host Configuration Protocol". tools.ietf.org. doi:10.17487/RFC2131. Retrieved 4 July 2017.
  11. ^ a b c d e f g h i R. Droms (March 1997). Dynamic Host Configuration Protocol. Network Working Group. doi:10.17487/RFC2131. RFC 2131. Draft Standard. Obsoletes RFC 1541.
  12. ^ Droms, Ralph (March 1997). "RFC2131 Dynamic Host Configuration Protocol: Dynamic allocation of network addresses". tools.ietf.org. doi:10.17487/RFC2131.
  13. ^ a b "Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters". iana.org. Retrieved 2018-10-16.
  14. ^ a b c d e f g h i j k l m n o p Alexander, Steve; Droms, Ralph (March 1997). DHCP options and BOOTP vendor extensions. IETF. doi:10.17487/RFC2132. RFC 2132. Retrieved June 10, 2012.
  15. ^ a b T'joens, Yves; De Schrijver, Peter (December 2001). DHCP reconfigure extension. IETF. doi:10.17487/RFC3203. RFC 3203. Retrieved November 13, 2020.
  16. ^ a b c d e Woundy, Rich; Kinnear, Kim (February 2006). Dynamic Host Configuration Protocol (DHCP) Leasequery. IETF. doi:10.17487/RFC4388. RFC 4388. Retrieved November 13, 2020.
  17. ^ a b c Kinnear, Kim; Stapp, Mark; Rao, D.T.V Ramakrishna; Joshi, Bharat; Russell, Neil; Kurapati, Pavan; Volz, Bernie (April 2013). DHCPv4 Bulk Leasequery. IETF. doi:10.17487/RFC6926. RFC 6926. Retrieved November 13, 2020.
  18. ^ a b c d Kinnear, Kim; Stapp, Mark; Volz, Bernie; Russell, Neil (December 2015). Active DHCPv4 Lease Query. IETF. doi:10.17487/RFC7724. RFC 7724. Retrieved November 13, 2020.
  19. ^ a b c d Patrick, Michael (January 2001). "DHCP Relay Agent Information Option". IETF Documents. IETF. doi:10.17487/RFC3046. Retrieved 22 July 2017.
  20. ^ a b c Provan, Don (November 1997). "RFC 2241 – DHCP Options for Novell Directory Services". IETF Documents. IETF. doi:10.17487/RFC3256. Retrieved 23 July 2017.
  21. ^ a b Lear, E.; Eggert, P. (April 2007). "Timezone Options for DHCP". IETF Documents. IETF. doi:10.17487/RFC4833. Retrieved 28 June 2018.
  22. ^ Kumari, Warren. "RFC 8910 - Captive-Portal Identification in DHCP and Router Advertisements (RAs)". ietf.org. IETF. Retrieved 25 March 2021.
  23. ^ Bernard, Aboba; Stuart, Cheshire (November 2002). "RFC 3397 – Dynamic Host Configuration Protocol (DHCP) Domain Search Option". IETF Documents. IETF. doi:10.17487/RFC3397. Retrieved 22 July 2017.
  24. ^ Lemon, T.; Cheshire, S.; Volz, B. (2002). "RFC 3442". doi:10.17487/RFC3442. {{cite journal}}: Cite journal requires |journal= (help)
  25. ^ a b c Hankins, David (December 2007). "RFC 5071 - Dynamic Host Configuration Protocol Options Used by PXELINUX". ietf.org. IETF. doi:10.17487/RFC5071. Retrieved 25 March 2021.
  26. ^ Doug, Jones; Rich, Woundy (April 2002). "RFC 3256 – The DOCSIS (Data-Over-Cable Service Interface Specifications) Device Class DHCP (Dynamic Host Configuration Protocol) Relay Agent Information Sub-option". IETF Documents. IETF. doi:10.17487/RFC3256. Retrieved 23 July 2017.
  27. ^ Droms, Ralph; Kinnear, Kim; Stapp, Mark; Volz, Bernie; Gonczi, Steve; Rabil, Greg; Dooley, Michael; Kapur, Arun (March 2003). DHCP Failover Protocol. IETF. I-D draft-ietf-dhc-failover-12. Retrieved May 9, 2010.
  28. ^ Weinberg, Neal (2018-08-14). "Why DHCP's days might be numbered". Network World. Retrieved 2019-08-07.
  29. ^ a b Patrick, Michael (January 2001). "RFC 3046 - DHCP Relay Agent Information Option". Network Working Group. doi:10.17487/RFC3046.
  30. ^ a b c d Droms, Ralph (March 1997). "RFC 2131 - Dynamic Host Configuration Protocol". Network Working Group. doi:10.17487/RFC2131.
  31. ^ a b c Stapko, Timothy (2011). Practical Embedded Security: Building Secure Resource-Constrained Systems. Newnes. p. 39. ISBN 978-0-08-055131-9.
  32. ^ Rountree, Derrick (2013). Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure. Newnes. p. 22. ISBN 978-1-59749-965-1.
  33. ^ Rooney, Timothy (2010). Introduction to IP Address Management. John Wiley & Sons. p. 180. ISBN 978-1-118-07380-3.
  34. ^ a b Golovanov (Kaspersky Labs), Sergey (June 2011). . Archived from the original on 25 January 2021.
  35. ^ Hens, Francisco J.; Caballero, José M. (2008). Triple Play: Building the converged network for IP, VoIP and IPTV. John Wiley & Sons. p. 239. ISBN 978-0-470-75439-9.
  36. ^ Ramirez, David H. (2008). IPTV Security: Protecting High-Value Digital Contents. John Wiley & Sons. p. 55. ISBN 978-0-470-72719-5.
  37. ^ Lemon, Ted (April 2002). "Implementation of RFC 3118".
  38. ^ Golden, Philip; Dedieu, Hervé; Jacobsen, Krista S. (2007). Implementation and Applications of DSL Technology. Taylor & Francis. p. 484. ISBN 978-1-4200-1307-8.
  39. ^ Rooney, Timothy (2010). Introduction to IP Address Management. John Wiley & Sons. pp. 181–182. ISBN 978-1-118-07380-3.
  40. ^ Copeland, Rebecca (2008). Converging NGN Wireline and Mobile 3G Networks with IMS. Taylor & Francis. pp. 142–143. ISBN 978-1-4200-1378-8.
  41. ^ Prasad, Ramjee; Mihovska, Albena (2009). New Horizons in Mobile and Wireless Communications: Networks, services, and applications. Vol. 2. Artech House. p. 339. ISBN 978-1-60783-970-5.
  42. ^ . Archived from the original on 2015-04-03. Retrieved 2013-12-12.

External links

  •   Media related to Dynamic Host Configuration Protocol (DHCP) at Wikimedia Commons

dynamic, host, configuration, protocol, dhcp, redirects, here, other, uses, dhcp, disambiguation, dhcp, network, management, protocol, used, internet, protocol, networks, automatically, assigning, addresses, other, communication, parameters, devices, connected. DHCP redirects here For other uses see DHCP disambiguation The Dynamic Host Configuration Protocol DHCP is a network management protocol used on Internet Protocol IP networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client server architecture 1 The technology eliminates the need for individually configuring network devices manually and consists of two network components a centrally installed network DHCP server and client instances of the protocol stack on each computer or device When connected to the network and periodically thereafter a client requests a set of parameters from the server using DHCP DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks 2 Many routers and residential gateways have DHCP server capability Most residential network routers receive a unique IP address within the ISP network Within a local network a DHCP server assigns a local IP address to each device DHCP services exist for networks running Internet Protocol version 4 IPv4 as well as version 6 IPv6 The IPv6 version of the DHCP protocol is commonly called DHCPv6 Contents 1 History 2 Overview 3 Operation 3 1 Discovery 3 2 Offer 3 3 Request 3 4 Acknowledgement 3 5 Information 3 6 Releasing 4 Client configuration parameters 5 Options 5 1 DHCP message types 5 1 1 Client vendor identification 5 2 Other extensions 5 2 1 Relay agent information sub options 6 Relaying 7 Client states 8 Reliability 9 IPv6 networks 10 Security 11 IETF standards documents 12 See also 13 Notes 14 References 15 External linksHistory EditThe Reverse Address Resolution Protocol RARP was defined in RFC 903 in 1984 for the configuration of simple devices such as diskless workstations with a suitable IP address Acting in the data link layer it made implementation difficult on many server platforms It required that a server be present on each individual network link RARP was superseded by the Bootstrap Protocol BOOTP defined in RFC 951 in September 1985 This introduced the concept of a relay agent which allowed the forwarding of BOOTP packets across networks allowing one central BOOTP server to serve hosts on many IP subnets 3 DHCP is based on BOOTP but can dynamically allocate IP addresses from a pool and reclaim them when they are no longer in use It can also be used to deliver a wide range of extra configuration parameters to IP clients including platform specific parameters 4 DHCP was first defined in RFC 1531 in October 1993 but due to errors in the editorial process was almost immediately reissued as RFC 1541 Four years later the DHCPINFORM message type 5 and other small changes were added by RFC 2131 which as of 2021 update remains the core of the standard for IPv4 networks with updates in RFC 3396 RFC 4361 RFC 5494 and RFC 6842 6 DHCPv6 was initially described by RFC 3315 in 2003 After updates by many subsequent RFCs 7 it was replaced with RFC 8415 which merged in prefix delegation and stateless address autoconfiguration Overview EditInternet Protocol IP defines how devices communicate within and across local networks on the Internet A DHCP server can manage IP settings for devices on its local network e g by assigning IP addresses to those devices automatically and dynamically 8 DHCP operates based on the client server model When a computer or other device connects to a network the DHCP client software sends a DHCP broadcast query requesting the necessary information Any DHCP server on the network may service the request The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway domain name the name servers and time servers On receiving a DHCP request the DHCP server may respond with specific information for each client as previously configured by an administrator or with a specific address and any other information valid for the entire network and for the time period for which the allocation lease is valid A DHCP client typically queries this information immediately after booting and periodically thereafter before the expiration of the information When a DHCP client refreshes an assignment it initially requests the same parameter values but the DHCP server may assign a new address based on the assignment policies set by administrators On large networks that consist of multiple links a single DHCP server may service the entire network when aided by DHCP relay agents located on the interconnecting routers Such agents relay messages between DHCP clients and DHCP servers located on different subnets Depending on implementation the DHCP server may have three methods of allocating IP addresses Dynamic allocation A network administrator reserves a range of IP addresses for DHCP and each DHCP client on the LAN is configured to request an IP address from the DHCP server during network initialization The request and grant process uses a lease concept with a controllable time period allowing the DHCP server to reclaim and then reallocate IP addresses that are not renewed Automatic allocation The DHCP server permanently assigns an IP address to a requesting client from a range defined by an administrator This is like dynamic allocation but the DHCP server keeps a table of past IP address assignments so that it can preferentially assign to a client the same IP address that the client previously had Manual allocation This method is also variously called static DHCP allocation fixed address allocation reservation and MAC IP address binding An administrator maps a unique identifier a client id or MAC address for each client to an IP address which is offered to the requesting client DHCP servers may be configured to fall back to other methods if this fails DHCP services are used for Internet Protocol version 4 IPv4 and IPv6 The details of the protocol for IPv4 and IPv6 differ sufficiently that they may be considered separate protocols 9 For the IPv6 operation devices may alternatively use stateless address autoconfiguration IPv6 hosts may also use link local addressing to achieve operations restricted to the local network link Operation Edit An illustration of a typical non renewing DHCP session each message may be either a broadcast or a unicast depending on the DHCP client capabilities 10 The DHCP employs a connectionless service model using the User Datagram Protocol UDP It is implemented with two UDP port numbers for its operations which are the same as for the bootstrap protocol BOOTP The server listens on UDP port number 67 and the client listens on UDP port number 68 DHCP operations fall into four phases server discovery IP lease offer IP lease request and IP lease acknowledgement These stages are often abbreviated as DORA for discovery offer request and acknowledgement The DHCP operation begins with clients broadcasting a request If the client and server are in different Broadcast Domains a DHCP Helper or DHCP Relay Agent may be used Clients requesting renewal of an existing lease may communicate directly via UDP unicast since the client already has an established IP address at that point Additionally there is a BROADCAST flag 1 bit in 2 byte flags field where all other bits are reserved and so are set to 0 the client can use to indicate in which way broadcast or unicast it can receive the DHCPOFFER 0x8000 for broadcast 0x0000 for unicast 10 Usually the DHCPOFFER is sent through unicast For those hosts which cannot accept unicast packets before IP addresses are configured this flag can be used to work around this issue Discovery Edit The DHCP client broadcasts a DHCPDISCOVER message on the network subnet using the destination address 255 255 255 255 limited broadcast or the specific subnet broadcast address directed broadcast A DHCP client may also request its last known IP address If the client remains connected to the same network the server may grant the request Otherwise it depends whether the server is set up as authoritative or not An authoritative server denies the request causing the client to issue a new request A non authoritative server simply ignores the request leading to an implementation dependent timeout for the client to expire the request and ask for a new IP address For example if HTYPE is set to 1 to specify that the medium used is Ethernet HLEN is set to 6 because an Ethernet address MAC address is 6 octets long The CHADDR is set to the MAC address used by the client Some options are set as well Example DHCPDISCOVER message Ethernet source sender s MAC destination FF FF FF FF FF FFIP source 0 0 0 0 destination 255 255 255 255 UDP source port 68 destination port 67Octet 0 Octet 1 Octet 2 Octet 3OP HTYPE HLEN HOPS0x01 0x01 0x06 0x00XID0x3903F326SECS FLAGS0x0000 0x0000CIADDR Client IP address 0x00000000YIADDR Your IP address 0x00000000SIADDR Server IP address 0x00000000GIADDR Gateway IP address 0x00000000CHADDR Client hardware address 0x00053C040x8D5900000x000000000x00000000192 octets of 0s or overflow space for additional options BOOTP legacy Magic cookie0x63825363DHCP options0x350101 53 1 DHCP Discover 0x3204c0a80164 50 192 168 1 100 requested0x370401030f06 55 Parameter Request List 1 Request Subnet Mask 3 Router 15 Domain Name 6 Domain Name Server 0xff 255 Endmark Offer Edit This section does not cite any sources Please help improve this section by adding citations to reliable sources Unsourced material may be challenged and removed September 2020 Learn how and when to remove this template message When a DHCP server receives a DHCPDISCOVER message from a client which is an IP address lease request the DHCP server reserves an IP address for the client and makes a lease offer by sending a DHCPOFFER message to the client This message contains the client s client id traditionally a MAC address the IP address that the server is offering the subnet mask the lease duration and the IP address of the DHCP server making the offer The DHCP server may also take notice of the hardware level MAC address in the underlying transport layer according to current RFCs the transport layer MAC address may be used if no client ID is provided in the DHCP packet The DHCP server determines the configuration based on the client s hardware address as specified in the CHADDR client hardware address field In the following example the server 192 168 1 1 specifies the client s IP address in the YIADDR your IP address field Example DHCPOFFER message Ethernet source sender s MAC destination client mac addressIP source 192 168 1 1 destination 192 168 1 100UDP source port 67 destination port 68Octet 0 Octet 1 Octet 2 Octet 3OP HTYPE HLEN HOPS0x02 0x01 0x06 0x00XID0x3903F326SECS FLAGS0x0000 0x0000CIADDR Client IP address 0x00000000YIADDR Your IP address 0xC0A80164 192 168 1 100 SIADDR Server IP address 0xC0A80101 192 168 1 1 GIADDR Gateway IP address 0x00000000CHADDR Client hardware address 0x00053C040x8D5900000x000000000x00000000192 octets of 0s BOOTP legacy Magic cookie0x63825363DHCP options53 2 DHCP Offer 1 subnet mask 255 255 255 03 Router 192 168 1 151 IP address lease time 86400s 1 day 54 DHCP server 192 168 1 16 DNS servers 9 7 10 15 9 7 10 16 9 7 10 18Request Edit In response to the DHCP offer the client replies with a DHCPREQUEST message broadcast to the server a requesting the offered address A client can receive DHCP offers from multiple servers but it will accept only one DHCP offer Before claiming an IP address the client will broadcast an ARP request in order to find if there is another host present in the network with the proposed IP address If there is no reply this address does not conflict with that of another host so it is free to be used The client must send the server identification option in the DHCPREQUEST message indicating the server whose offer the client has selected 11 Section 3 1 Item 3 When other DHCP servers receive this message they withdraw any offers that they have made to the client and return their offered IP address to the pool of available addresses Example DHCPREQUEST message Ethernet source sender s MAC destination FF FF FF FF FF FFIP source 0 0 0 0 destination 255 255 255 255 a UDP source port 68 destination port 67Octet 0 Octet 1 Octet 2 Octet 3OP HTYPE HLEN HOPS0x01 0x01 0x06 0x00XID0x3903F326SECS FLAGS0x0000 0x0000CIADDR Client IP address 0x00000000YIADDR Your IP address 0x00000000SIADDR Server IP address 0xC0A80101 192 168 1 1 GIADDR Gateway IP address 0x00000000CHADDR Client hardware address 0x00053C040x8D5900000x000000000x00000000192 octets of 0s BOOTP legacy Magic cookie0x63825363DHCP options53 3 DHCP Request 50 192 168 1 100 requested54 DHCP server 192 168 1 1Acknowledgement Edit When the DHCP server receives the DHCPREQUEST message from the client the configuration process enters its final phase The acknowledgement phase involves sending a DHCPACK packet to the client This packet includes the lease duration and any other configuration information that the client might have requested At this point the IP configuration process is completed The protocol expects the DHCP client to configure its network interface with the negotiated parameters After the client obtains an IP address it should probe the newly received address 12 e g with ARP Address Resolution Protocol to prevent address conflicts caused by overlapping address pools of DHCP servers If this probe finds another computer using that address the computer should send DHCPDECLINE broadcast to the server Example DHCPACK message Ethernet source sender s MAC destination client s MACIP source 192 168 1 1 destination 192 168 1 100UDP source port 67 destination port 68Octet 0 Octet 1 Octet 2 Octet 3OP HTYPE HLEN HOPS0x02 0x01 0x06 0x00XID0x3903F326SECS FLAGS0x0000 0x0000CIADDR Client IP address 0x00000000YIADDR Your IP address 0xC0A80164 192 168 1 100 SIADDR Server IP address 0xC0A80101 192 168 1 1 GIADDR Gateway IP address switched by relay 0x00000000CHADDR Client hardware address 0x00053C040x8D5900000x000000000x00000000192 octets of 0s BOOTP legacyMagic cookie0x63825363DHCP options53 5 DHCP ACK 1 subnet mask 255 255 255 03 Router 192 168 1 151 IP address lease time 86400s 1 day 54 DHCP server 192 168 1 16 DNS servers 9 7 10 15 9 7 10 16 9 7 10 18Information Edit A DHCP client may request more information than the server sent with the original DHCPOFFER The client may also request repeat data for a particular application For example browsers use DHCP Inform to obtain web proxy settings via WPAD Releasing Edit The client sends a request to the DHCP server to release the DHCP information and the client deactivates its IP address As client devices usually do not know when users may unplug them from the network the protocol does not mandate the sending of DHCP Release Client configuration parameters EditA DHCP server can provide optional configuration parameters to the client RFC 2132 describes the available DHCP options defined by Internet Assigned Numbers Authority IANA DHCP and BOOTP PARAMETERS 13 A DHCP client can select manipulate and overwrite parameters provided by a DHCP server In Unix like systems this client level refinement typically takes place according to the values in the configuration file etc dhclient conf Options EditOptions are octet strings of varying length This is called Type length value encoding The first octet is the option code the second octet is the number of following octets and the remaining octets are code dependent For example the DHCP message type option for an offer would appear as 0x35 0x01 0x02 where 0x35 is code 53 for DHCP message type 0x01 means one octet follows and 0x02 is the value of offer The following tables list the available DHCP options as listed in RFC 2132 14 and IANA registry 13 RFC 1497 BOOTP Vendor Information Extensions vendor extensions 14 Section 3 Code Name Length Notes0 Pad 0 octets Can be used to pad other options so that they are aligned to the word boundary is not followed by length byte1 Subnet mask 4 octets Client s subnet mask as per RFC 950 If both the subnet mask and the router option option 3 are included the subnet mask option must be first 2 Time offset 4 octets Offset of the client s subnet in seconds from Coordinated Universal Time UTC The offset is expressed as a two s complement 32 bit integer A positive offset indicates a location east of the zero meridian and a negative offset indicates a location west of the zero meridian 3 Router Multiples of 4 octets Available routers should be listed in order of preference4 Time server Multiples of 4 octets Available time servers to synchronise with should be listed in order of preference5 Name server Multiples of 4 octets Available IEN 116 name servers should be listed in order of preference6 Domain name server Multiples of 4 octets Available DNS servers should be listed in order of preference7 Log server Multiples of 4 octets Available log servers should be listed in order of preference8 Cookie server Multiples of 4 octets Cookiein this case means fortune cookie or quote of the day a pithy or humorous anecdote often sent as part of a logon process on large computers it has nothing to do with cookies sent by websites 9 LPR Server Multiples of 4 octets A list of RFC 1179 line printer servers available to the client should be listed in order of preference10 Impress server Multiples of 4 octets A list of Imagen Impress servers available to the client should be listed in order of preference11 Resource location server Multiples of 4 octets A list of RFC 887 Resource Location servers available to the client should be listed in order of preference12 Host name Minimum of 1 octet Name of the client The name may be qualified with the local domain name 13 Boot file size 2 octets Length of the boot image in 512B blocks14 Merit dump file Minimum of 1 octet Path where crash dumps should be stored15 Domain name Minimum of 1 octet16 Swap server 4 octets17 Root path Minimum of 1 octet18 Extensions path Minimum of 1 octet255 End 0 octets Used to mark the end of the vendor option fieldIP layer parameters per host 14 Section 4 Code Name Length Notes19 IP forwarding enable disable 1 octet20 Non local source routing enable disable 1 octet21 Policy filter Multiples of 8 octets22 Maximum datagram reassembly size 2 octets23 Default IP time to live 1 octet24 Path MTU aging timeout 4 octets25 Path MTU plateau table Multiples of 2 octetsIP Layer Parameters per Interface 14 Section 5 Code Name Length Notes26 Interface MTU 2 octets27 All subnets are local 1 octet28 Broadcast address 4 octets29 Perform mask discovery 1 octet30 Mask supplier 1 octet31 Perform router discovery 1 octet32 Router solicitation address 4 octets33 Static route Multiples of 8 octets A list of destination router pairsLink layer parameters per interface 14 Section 6 Code Name Length Notes34 Trailer encapsulation option 1 octet35 ARP cache timeout 4 octets36 Ethernet encapsulation 1 octetTCP parameters 14 Section 7 Code Name Length Notes37 TCP default TTL 1 octet38 TCP keepalive interval 4 octets39 TCP keepalive garbage 1 octetApplication and service parameters 14 Section 8 Code Name Length Notes40 Network information service domain Minimum of 1 octet41 Network information servers Multiples of 4 octets42 Network Time Protocol NTP servers Multiples of 4 octets43 Vendor specific information Minimum of 1 octets44 NetBIOS over TCP IP name server Multiples of 4 octets45 NetBIOS over TCP IP datagram Distribution Server Multiples of 4 octets46 NetBIOS over TCP IP node type 1 octet47 NetBIOS over TCP IP scope Minimum of 1 octet48 X Window System font server Multiples of 4 octets49 X Window System display manager Multiples of 4 octets64 Network Information Service domain Minimum of 1 octet65 Network Information Service servers Multiples of 4 octets68 Mobile IP home agent Multiples of 4 octets69 Simple Mail Transfer Protocol SMTP server Multiples of 4 octets70 Post Office Protocol POP3 server Multiples of 4 octets71 Network News Transfer Protocol NNTP server Multiples of 4 octets72 Default World Wide Web WWW server Multiples of 4 octets73 Default Finger protocol server Multiples of 4 octets74 Default Internet Relay Chat IRC server Multiples of 4 octets75 StreetTalk server Multiples of 4 octets76 StreetTalk Directory Assistance STDA server Multiples of 4 octetsDHCP extensions 14 Section 9 Code Name Length Notes50 Requested IP address 4 octets51 IP address lease time 4 octets52 Option overload 1 octet53 DHCP message type 1 octet54 Server identifier 4 octets55 Parameter request list Minimum of 1 octet56 Message Minimum of 1 octet57 Maximum DHCP message size 2 octets58 Renewal T1 time value 4 octets59 Rebinding T2 time value 4 octets60 Vendor class identifier Minimum of 1 octet61 Client identifier Minimum of 2 octets66 TFTP server name Minimum of 1 octet67 Bootfile name Minimum of 1 octetDHCP message types Edit This table lists the DHCP message types documented in RFC 2132 RFC 3203 15 RFC 4388 16 RFC 6926 17 and RFC 7724 18 These codes are the value in the DHCP extension 53 shown in the table above DHCP message types Code Name Length RFC1 DHCPDISCOVER 1 octet rfc2132 14 Section 9 6 2 DHCPOFFER 1 octet rfc2132 14 Section 9 6 3 DHCPREQUEST 1 octet rfc2132 14 Section 9 6 4 DHCPDECLINE 1 octet rfc2132 14 Section 9 6 5 DHCPACK 1 octet rfc2132 14 Section 9 6 6 DHCPNAK 1 octet rfc2132 14 Section 9 6 7 DHCPRELEASE 1 octet rfc2132 14 Section 9 6 8 DHCPINFORM 1 octet rfc2132 14 Section 9 6 9 DHCPFORCERENEW 1 octet rfc3203 15 Section 4 10 DHCPLEASEQUERY 1 octet rfc4388 16 Section 6 1 11 DHCPLEASEUNASSIGNED 1 octet rfc4388 16 Section 6 1 12 DHCPLEASEUNKNOWN 1 octet rfc4388 16 Section 6 1 13 DHCPLEASEACTIVE 1 octet rfc4388 16 Section 6 1 14 DHCPBULKLEASEQUERY 1 octet rfc6926 17 Section 6 2 1 15 DHCPLEASEQUERYDONE 1 octet rfc6926 17 Section 6 2 1 16 DHCPACTIVELEASEQUERY 1 octet rfc7724 18 Section 5 2 1 17 DHCPLEASEQUERYSTATUS 1 octet rfc7724 18 Section 5 2 1 18 DHCPTLS 1 octet rfc7724 18 Section 5 2 1 Client vendor identification Edit An option exists to identify the vendor and functionality of a DHCP client The information is a variable length string of characters or octets which has a meaning specified by the vendor of the DHCP client One method by which a DHCP client can communicate to the server that it is using a certain type of hardware or firmware is to set a value in its DHCP requests called the Vendor Class Identifier VCI Option 60 This method allows a DHCP server to differentiate between the two kinds of client machines and process the requests from the two types of modems appropriately Some types of set top boxes also set the VCI Option 60 to inform the DHCP server about the hardware type and functionality of the device The value to which this option is set gives the DHCP server a hint about any required extra information that this client needs in a DHCP response Other extensions Edit Documented DHCP options Code Name Length RFC82 Relay agent information Minimum of 2 octets RFC 3046 19 85 Novell Directory Service NDS servers Minimum of 4 octets multiple of 4 octets RFC 2241 20 Section 2 86 NDS tree name Variable RFC 2241 20 Section 3 87 NDS context Variable RFC 2241 20 Section 4 100 Time zone POSIX style Variable RFC 4833 21 101 Time zone tz database style Variable RFC 4833 21 114 DHCP Captive Portal Variable RFC 8910 22 119 Domain search Variable RFC 3397 23 121 Classless static route Variable RFC 3442 24 209 Configuration File Variable RFC 5071 25 210 Path Prefix Variable RFC 5071 25 211 Reboot Time Variable RFC 5071 25 Relay agent information sub options Edit The relay agent information option option 82 specifies container for attaching sub options to DHCP requests transmitted between a DHCP relay and a DHCP server 19 Relay agent sub options Code Name Length RFC1 Agent Circuit ID Minimum of 1 octet RFC 3046 19 2 Agent Remote ID Minimum of 1 octet RFC 3046 19 4 Data Over Cable Service Interface Specifications DOCSIS device class 4 octets RFC 3256 26 Relaying EditIn small networks where only one IP subnet is being managed DHCP clients communicate directly with DHCP servers However DHCP servers can also provide IP addresses for multiple subnets In this case a DHCP client that has not yet acquired an IP address cannot communicate directly with a DHCP server not on the same subnet as the client s broadcast can only be received on its own subnet In order to allow DHCP clients on subnets not directly served by DHCP servers to communicate with DHCP servers DHCP relay agents can be installed on these subnets A DHCP relay agent runs on a network device capable of routing between the client s subnet and the subnet of the DHCP server The DHCP client broadcasts on the local link the relay agent receives the broadcast and transmits it to one or more DHCP servers using unicast The IP addresses of the DHCP servers are manually configured in the relay agent The relay agent stores its own IP address from the interface on which it has received the client s broadcast in the GIADDR field of the DHCP packet The DHCP server uses the GIADDR value to determine the subnet and subsequently the corresponding address pool from which to allocate an IP address When the DHCP server replies to the client it sends the reply to the GIADDR address again using unicast The relay agent then retransmits the response on the local network using unicast in most cases to the newly reserved IP address in an Ethernet frame directed to the client s MAC address The client should accept the packet as its own even when that IP address is not yet set on the interface 11 25 Directly after processing the packet the client sets the IP address on its interface and is ready for regular IP communication directly thereafter If the client s implementation of the IP stack does not accept unicast packets when it has no IP address yet the client may set the broadcast bit in the FLAGS field when sending a DHCPDISCOVER packet The relay agent will use the 255 255 255 255 broadcast IP address and the clients MAC address to inform the client of the server s DHCPOFFER The communication between the relay agent and the DHCP server typically uses both a source and destination UDP port of 67 Client states Edit A simplified DHCP client state transition diagram based on figure 5 of RFC 2131 As described in RFC 2131 11 Section 4 4 a DHCP client can receive these messages from a server DHCPOFFER DHCPACK DHCPNAKThe client moves through DHCP states depending on how the server responds to the messages that the client sends Reliability EditThe DHCP ensures reliability in several ways periodic renewal rebinding 11 Section 4 4 5 and failover DHCP clients are allocated leases that last for some period of time Clients begin to attempt to renew their leases once half the lease interval has expired 11 Section 4 4 5 Paragraph 3 They do this by sending a unicast DHCPREQUEST message to the DHCP server that granted the original lease If that server is down or unreachable it will fail to respond to the DHCPREQUEST However in that case the client repeats the DHCPREQUEST from time to time 11 Section 4 4 5 Paragraph 8 b so if the DHCP server comes back up or becomes reachable again the DHCP client will succeed in contacting it and renew the lease If the DHCP server is unreachable for an extended period of time 11 Section 4 4 5 Paragraph 5 the DHCP client will attempt to rebind by broadcasting its DHCPREQUEST rather than unicasting it Because it is broadcast the DHCPREQUEST message will reach all available DHCP servers If some other DHCP server is able to renew the lease it will do so at this time In order for rebinding to work when the client successfully contacts a backup DHCP server that server must have accurate information about the client s binding Maintaining accurate binding information between two servers is a complicated problem if both servers are able to update the same lease database there must be a mechanism to avoid conflicts between updates on the independent servers A proposal for implementing fault tolerant DHCP servers was submitted to the Internet Engineering Task Force but never formalized 27 c If rebinding fails the lease will eventually expire When the lease expires the client must stop using the IP address granted to it in its lease 11 Section 4 4 5 Paragraph 9 At that time it will restart the DHCP process from the beginning by broadcasting a DHCPDISCOVER message Since its lease has expired it will accept any IP address offered to it Once it has a new IP address presumably from a different DHCP server it will once again be able to use the network However since its IP address has changed any ongoing connections will be broken IPv6 networks EditThe basic methodology of DHCP was developed for networks based on Internet Protocol version 4 IPv4 Since the development and deployment of IPv6 networks DHCP has also been used for assigning parameters in such networks despite the inherent features of IPv6 for stateless address autoconfiguration The IPv6 version of the protocol is designated as DHCPv6 28 Security EditSee also DHCP snooping The base DHCP does not include any mechanism for authentication 29 Because of this it is vulnerable to a variety of attacks These attacks fall into three main categories Unauthorized DHCP servers providing false information to clients 30 Unauthorized clients gaining access to resources 30 Resource exhaustion attacks from malicious DHCP clients 30 Because the client has no way to validate the identity of a DHCP server unauthorized DHCP servers commonly called rogue DHCP can be operated on networks providing incorrect information to DHCP clients 31 This can serve either as a denial of service attack preventing the client from gaining access to network connectivity 32 or as a man in the middle attack 33 Because the DHCP server provides the DHCP client with server IP addresses such as the IP address of one or more DNS servers 30 an attacker can convince a DHCP client to do its DNS lookups through its own DNS server and can therefore provide its own answers to DNS queries from the client 34 This in turn allows the attacker to redirect network traffic through itself allowing it to eavesdrop on connections between the client and network servers it contacts or to simply replace those network servers with its own 34 Because the DHCP server has no secure mechanism for authenticating the client clients can gain unauthorized access to IP addresses by presenting credentials such as client identifiers that belong to other DHCP clients 31 This also allows DHCP clients to exhaust the DHCP server s store of IP addresses by presenting new credentials each time it asks for an address the client can consume all the available IP addresses on a particular network link preventing other DHCP clients from getting service 31 DHCP does provide some mechanisms for mitigating these problems The Relay Agent Information Option protocol extension RFC 3046 usually referred to in the industry by its actual number as Option 82 35 36 allows network operators to attach tags to DHCP messages as these messages arrive on the network operator s trusted network This tag is then used as an authorization token to control the client s access to network resources Because the client has no access to the network upstream of the relay agent the lack of authentication does not prevent the DHCP server operator from relying on the authorization token 29 Another extension Authentication for DHCP Messages RFC 3118 provides a mechanism for authenticating DHCP messages As of 2002 RFC 3118 had not seen widespread adoption because of the problems of managing keys for large numbers of DHCP clients 37 A 2007 book about DSL technologies remarked that there were numerous security vulnerabilities identified against the security measures proposed by RFC 3118 This fact combined with the introduction of 802 1x slowed the deployment and take rate of authenticated DHCP and it has never been widely deployed 38 A 2010 book notes that t here have been very few implementations of DHCP Authentication The challenges of key management and processing delays due to hash computation have been deemed too heavy a price to pay for the perceived benefits 39 Architectural proposals from 2008 involve authenticating DHCP requests using 802 1x or PANA both of which transport EAP 40 An IETF proposal was made for including EAP in DHCP itself the so called EAPoDHCP 41 this does not appear to have progressed beyond IETF draft level the last of which dates to 2010 42 IETF standards documents EditRFC 2131 Dynamic Host Configuration Protocol RFC 2132 DHCP Options and BOOTP Vendor Extensions RFC 3046 DHCP Relay Agent Information Option RFC 3397 Dynamic Host Configuration Protocol DHCP Domain Search Option RFC 3942 Reclassifying Dynamic Host Configuration Protocol Version Four DHCPv4 Options RFC 4242 Information Refresh Time Option for Dynamic Host Configuration Protocol for IPv6 RFC 4361 Node specific Client Identifiers for Dynamic Host Configuration Protocol Version Four DHCPv4 RFC 4436 Detecting Network Attachment in IPv4 DNAv4 RFC 3442 Classless Static Route Option for Dynamic Host Configuration Protocol DHCP version 4 RFC 3203 DHCP reconfigure extension RFC 4388 Dynamic Host Configuration Protocol DHCP Leasequery RFC 6926 DHCPv4 Bulk Leasequery RFC 7724 Active DHCPv4 Lease QuerySee also EditBoot Service Discovery Protocol BSDP a DHCP extension used by Apple s NetBoot Comparison of DHCP server software Peg DHCP RFC 2322 Preboot Execution Environment PXE Reverse Address Resolution Protocol RARP Rogue DHCP UDP Helper Address a tool for routing DHCP requests across subnet boundaries Zeroconf Zero Configuration Networking Kea an open source DHCP server developed by the Internet Systems ConsortiumNotes Edit a b As an optional client behavior some broadcasts such as those carrying DHCP discovery and request messages may be replaced with unicasts in case the DHCP client already knows the DHCP server s IP address 11 The RFC calls for the client to wait one half of the remaining time until T2 before it retransmits the DHCPREQUEST packet The proposal provided a mechanism whereby two servers could remain loosely in sync with each other in such a way that even in the event of a total failure of one server the other server could recover the lease database and continue operating Due to the length and complexity of the specification it was never published as a standard however the techniques described in the proposal are in wide use with open source and several commercial implementations References Edit Gillis Alexander S What is DHCP Dynamic Host Configuration Protocol TechTarget SearchNetworking Retrieved 19 February 2021 Peterson Larry L Davie Bruce S 2011 Computer Networks A Systems Approach 5th ed Elsevier ISBN 978 0123850607 Retrieved March 21 2019 Bill Croft John Gilmore September 1985 RFC 951 Bootstrap Protocol Network Working Group doi 10 17487 RFC0951 Network Certification 2006 Published By Microsoft Press used for the Web Proxy Autodiscovery Protocol Web Proxy Autodiscovery Protocol WPAD Droms R March 1997 Dynamic Host Configuration Protocol doi 10 17487 RFC2131 Retrieved 2 December 2021 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help RFC 4361 RFC 5494 RFC 6221 RFC 6422 RFC 6644 RFC 7083 RFC 7227 RFC 7283 DHCP Dynamic Host Configuration Protocol Droms Ralph Lemon Ted 2003 The DHCP Handbook SAMS Publishing p 436 ISBN 978 0 672 32327 0 a b Droms Ralph March 1997 Dynamic Host Configuration Protocol tools ietf org doi 10 17487 RFC2131 Retrieved 4 July 2017 a b c d e f g h i R Droms March 1997 Dynamic Host Configuration Protocol Network Working Group doi 10 17487 RFC2131 RFC 2131 Draft Standard Obsoletes RFC 1541 Droms Ralph March 1997 RFC2131 Dynamic Host Configuration Protocol Dynamic allocation of network addresses tools ietf org doi 10 17487 RFC2131 a b Dynamic Host Configuration Protocol DHCP and Bootstrap Protocol BOOTP Parameters iana org Retrieved 2018 10 16 a b c d e f g h i j k l m n o p Alexander Steve Droms Ralph March 1997 DHCP options and BOOTP vendor extensions IETF doi 10 17487 RFC2132 RFC 2132 Retrieved June 10 2012 a b T joens Yves De Schrijver Peter December 2001 DHCP reconfigure extension IETF doi 10 17487 RFC3203 RFC 3203 Retrieved November 13 2020 a b c d e Woundy Rich Kinnear Kim February 2006 Dynamic Host Configuration Protocol DHCP Leasequery IETF doi 10 17487 RFC4388 RFC 4388 Retrieved November 13 2020 a b c Kinnear Kim Stapp Mark Rao D T V Ramakrishna Joshi Bharat Russell Neil Kurapati Pavan Volz Bernie April 2013 DHCPv4 Bulk Leasequery IETF doi 10 17487 RFC6926 RFC 6926 Retrieved November 13 2020 a b c d Kinnear Kim Stapp Mark Volz Bernie Russell Neil December 2015 Active DHCPv4 Lease Query IETF doi 10 17487 RFC7724 RFC 7724 Retrieved November 13 2020 a b c d Patrick Michael January 2001 DHCP Relay Agent Information Option IETF Documents IETF doi 10 17487 RFC3046 Retrieved 22 July 2017 a b c Provan Don November 1997 RFC 2241 DHCP Options for Novell Directory Services IETF Documents IETF doi 10 17487 RFC3256 Retrieved 23 July 2017 a b Lear E Eggert P April 2007 Timezone Options for DHCP IETF Documents IETF doi 10 17487 RFC4833 Retrieved 28 June 2018 Kumari Warren RFC 8910 Captive Portal Identification in DHCP and Router Advertisements RAs ietf org IETF Retrieved 25 March 2021 Bernard Aboba Stuart Cheshire November 2002 RFC 3397 Dynamic Host Configuration Protocol DHCP Domain Search Option IETF Documents IETF doi 10 17487 RFC3397 Retrieved 22 July 2017 Lemon T Cheshire S Volz B 2002 RFC 3442 doi 10 17487 RFC3442 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help a b c Hankins David December 2007 RFC 5071 Dynamic Host Configuration Protocol Options Used by PXELINUX ietf org IETF doi 10 17487 RFC5071 Retrieved 25 March 2021 Doug Jones Rich Woundy April 2002 RFC 3256 The DOCSIS Data Over Cable Service Interface Specifications Device Class DHCP Dynamic Host Configuration Protocol Relay Agent Information Sub option IETF Documents IETF doi 10 17487 RFC3256 Retrieved 23 July 2017 Droms Ralph Kinnear Kim Stapp Mark Volz Bernie Gonczi Steve Rabil Greg Dooley Michael Kapur Arun March 2003 DHCP Failover Protocol IETF I D draft ietf dhc failover 12 Retrieved May 9 2010 Weinberg Neal 2018 08 14 Why DHCP s days might be numbered Network World Retrieved 2019 08 07 a b Patrick Michael January 2001 RFC 3046 DHCP Relay Agent Information Option Network Working Group doi 10 17487 RFC3046 a b c d Droms Ralph March 1997 RFC 2131 Dynamic Host Configuration Protocol Network Working Group doi 10 17487 RFC2131 a b c Stapko Timothy 2011 Practical Embedded Security Building Secure Resource Constrained Systems Newnes p 39 ISBN 978 0 08 055131 9 Rountree Derrick 2013 Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Newnes p 22 ISBN 978 1 59749 965 1 Rooney Timothy 2010 Introduction to IP Address Management John Wiley amp Sons p 180 ISBN 978 1 118 07380 3 a b Golovanov Kaspersky Labs Sergey June 2011 TDSS loader now got legs Archived from the original on 25 January 2021 Hens Francisco J Caballero Jose M 2008 Triple Play Building the converged network for IP VoIP and IPTV John Wiley amp Sons p 239 ISBN 978 0 470 75439 9 Ramirez David H 2008 IPTV Security Protecting High Value Digital Contents John Wiley amp Sons p 55 ISBN 978 0 470 72719 5 Lemon Ted April 2002 Implementation of RFC 3118 Golden Philip Dedieu Herve Jacobsen Krista S 2007 Implementation and Applications of DSL Technology Taylor amp Francis p 484 ISBN 978 1 4200 1307 8 Rooney Timothy 2010 Introduction to IP Address Management John Wiley amp Sons pp 181 182 ISBN 978 1 118 07380 3 Copeland Rebecca 2008 Converging NGN Wireline and Mobile 3G Networks with IMS Taylor amp Francis pp 142 143 ISBN 978 1 4200 1378 8 Prasad Ramjee Mihovska Albena 2009 New Horizons in Mobile and Wireless Communications Networks services and applications Vol 2 Artech House p 339 ISBN 978 1 60783 970 5 Draft pruss DHCP auth DSL 07 EAP Authentication Extensions for the Dynamic Host Configuration Protocol for Broadband Archived from the original on 2015 04 03 Retrieved 2013 12 12 External links Edit Media related to Dynamic Host Configuration Protocol DHCP at Wikimedia Commons Retrieved from https en wikipedia org w index php title Dynamic Host Configuration Protocol amp oldid 1146942757, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.