This document discusses security issues with the Dynamic Host Configuration Protocol (DHCP) and proposes four approaches to address them. DHCP is vulnerable to spoofing and denial of service attacks because it lacks authentication. Attackers can send fake DHCP packets that cause clients to obtain incorrect IP addresses or default gateways. The four approaches proposed are: 1) DHCP snooping to filter unauthorized DHCP packets, 2) DHCP authentication using cryptographic keys, 3) Secure DHCP (S-DHCP) which adds digital signatures to packets, and 4) DHCP authentication via RADIUS. Each approach aims to authenticate DHCP messages to prevent spoofing and denial of service attacks. However, they differ in implementation complexity and adoption challenges.