Authenticated DHCP Sample Clauses

Authenticated DHCP. The DHCP protocol assigns IP addresses to new computing devices when they enter a network and refreshes the IP information at configurable intervals. It is crucial for IP guest access networks such as eduroam to provide the DHCP service, because guests would otherwise need to go through an administrative procedure of manually requesting an IP address for temporary use. The DHCP is used widely in access networks. There are some well-documented weaknesses in the protocol which apply to any access network and are not eduroam specific. In eduroam, DHCP addresses are assigned to client devices after they have authenticated to the eduroam infrastructure, i.e. only after a successful authentication. There is no possibility for a non-community adversary to abuse DHCP. There is a possibility that a properly authenticated user can try to do harm in his surroundings or has malware installed that tries to do so. This section discusses possible extensions to DHCP to deal with such authenticated adversaries who attempt to exploit one of the weaknesses of DHCP. This weakness is described in section 2. A possible extension to DHCP which can eliminate this weakness in IEEE 802.1X networks is described in section 3. Other approaches for problem mitigation are described in section 4. Section 5 provides a conclusion.