What is DHCP churn, and what are the possible security implications of having high DHCP churn within a network...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol commonly used for (among other things) assigning dynamic IP addresses to network clients. The primary benefit of using this technology is you can take a finite amount of IP address space and partition it out to transient users as it is needed, reclaiming addresses no longer in use. The use of DHCP also saves end users and desktop administrators from manually assigning IP addresses to systems. Let’s look at how DHCP works.
When configuring DHCP, the network administrator sets a value known as the DHCP lease. This is the amount of time a system may retain an IP address without contacting the DHCP server. When the time expires, the system must reach out to the server and request a renewal of the DHCP lease. Generally speaking, DHCP leases are set to a long period of time (measured in days) on stable networks where the same systems are generally present from day-to-day. On the other hand, networks with many transient users (such as public hotspots) typically have short lease times to allow the efficient reuse of addresses.
DHCP churn is a term used to describe the fact that different systems may obtain the same IP address from a DHCP server when the first system’s lease expires. This really isn’t a problem, except in two special cases:
- You’re trying to track systems for some purpose and don’t have access to the DHCP logs. For example, if you’re maintaining a spam blacklist and a spamming system shows up on your blacklist with a DHCP-provided address, you may inadvertently block future users of that address from sending mail.
- You’re a researcher measuring the prevalence of some phenomenon across the Internet and use IP addresses to track systems. If a single system exhibits your target behavior, but has many different dynamically assigned addresses, it might skew your results.
The bottom line is, unless you’re in one of those two very special cases, DHCP churn isn’t a big deal. You should set your DHCP lease lifetime based upon your expected users needs and not worry about this issue.
Dig Deeper on Network Protocols and Security
Related Q&A from Mike Chapple
Vulnerability scanning tools are necessary to be fully compliant with PCI DSS, but the tools need to come from a PCI DSS Approved Scanning Vendor. ...continue reading
Healthcare clearinghouses like Mass HIway are a new trend in health IT, but what are the security implications? Expert Mike Chapple explains what you...continue reading
The FFIEC Cybersecurity Assessment Tool has faced harsh criticism since its 2015 release. Expert Mike Chapple reviews the tool and how it can be ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.