| < draft-ietf-roll-turnon-rfc8138-14.txt | draft-ietf-roll-turnon-rfc8138-15.txt > | |||
|---|---|---|---|---|
| ROLL P. Thubert, Ed. | ROLL P. Thubert, Ed. | |||
| Internet-Draft L. Zhao | Internet-Draft L. Zhao | |||
| Updates: 8138 (if approved) Cisco Systems | Updates: 6550, 8138 (if approved) Cisco Systems | |||
| Intended status: Standards Track September 8, 2020 | Intended status: Standards Track 18 September 2020 | |||
| Expires: March 12, 2021 | Expires: 22 March 2021 | |||
| A RPL DODAG Configuration Option for the 6LoWPAN Routing Header | A RPL DODAG Configuration Option for the 6LoWPAN Routing Header | |||
| draft-ietf-roll-turnon-rfc8138-14 | draft-ietf-roll-turnon-rfc8138-15 | |||
| Abstract | Abstract | |||
| This document updates RFC 8138 by defining a bit in the RPL DODAG | This document updates RFC 8138 by defining a bit in the RPL DODAG | |||
| Configuration Option to indicate whether compression is used within | Configuration Option to indicate whether compression is used within | |||
| the RPL Instance, and specify the behavior of RFC 8138-capable nodes | the RPL Instance, and specify the behavior of RFC 8138-capable nodes | |||
| when the bit is set and reset. | when the bit is set and unset. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on March 12, 2021. | This Internet-Draft will expire on 22 March 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
| Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
| skipping to change at page 2, line 12 ¶ | skipping to change at page 2, line 12 ¶ | |||
| as described in Section 4.e of the Trust Legal Provisions and are | as described in Section 4.e of the Trust Legal Provisions and are | |||
| provided without warranty as described in the Simplified BSD License. | provided without warranty as described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.1. References . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. References . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.2. Glossary . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.2. Glossary . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2.3. Requirements Language . . . . . . . . . . . . . . . . . . 4 | 2.3. Requirements Language . . . . . . . . . . . . . . . . . . 4 | |||
| 3. The RPL DODAG Configuration Option . . . . . . . . . . . . . 4 | 3. Updating RFC 6550 . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 4. Updating RFC 8138 . . . . . . . . . . . . . . . . . . . . . . 5 | 4. Updating RFC 8138 . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 5. Transition Scenarios . . . . . . . . . . . . . . . . . . . . 5 | 5. Transition Scenarios . . . . . . . . . . . . . . . . . . . . 5 | |||
| 5.1. Coexistence . . . . . . . . . . . . . . . . . . . . . . . 6 | 5.1. Coexistence . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5.2. Inconsistent State While Migrating . . . . . . . . . . . 6 | 5.2. Inconsistent State While Migrating . . . . . . . . . . . 6 | |||
| 5.3. Rolling Back . . . . . . . . . . . . . . . . . . . . . . 6 | 5.3. Rolling Back . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 7. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8 | 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 9. Normative References . . . . . . . . . . . . . . . . . . . . 8 | 9. Normative References . . . . . . . . . . . . . . . . . . . . 8 | |||
| 10. Informative References . . . . . . . . . . . . . . . . . . . 9 | 10. Informative References . . . . . . . . . . . . . . . . . . . 9 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 1. Introduction | 1. Introduction | |||
| The design of Low Power and Lossy Networks (LLNs) is generally | The design of Low Power and Lossy Networks (LLNs) is generally | |||
| focused on saving energy, which is the most constrained resource of | focused on saving energy, which is the most constrained resource of | |||
| all. The routing optimizations in the "Routing Protocol for Low | all. The routing optimizations in the "Routing Protocol for Low | |||
| Power and Lossy Networks" [RFC6550] (RPL) such as routing along a | Power and Lossy Networks" [RFC6550] (RPL) such as routing along a | |||
| Destination-Oriented Directed Acyclic Graph (DODAG) to a Root Node | Destination-Oriented Directed Acyclic Graph (DODAG) to a Root Node | |||
| and the associated packet compression technique [RFC8138] derive from | and the associated routing header compression and forwarding | |||
| that primary concern. | technique specified in [RFC8138] derive from that primary concern. | |||
| Enabling [RFC8138] requires a Flag Day where the network is upgraded | Enabling [RFC8138] on a running network requires a Flag Day where the | |||
| and rebooted. Otherwise, if acting as a Leaf, a node that does not | network is upgraded and rebooted. Otherwise, if acting as a Leaf, a | |||
| support the compression would fail to communicate; if acting as a | node that does not support the compression would fail to communicate; | |||
| router it would drop the compressed packets and black-hole a portion | if acting as a router it would drop the compressed packets and black- | |||
| of the network. This specification enables a hot upgrade where a | hole a portion of the network. This specification enables a hot | |||
| live network is migrated. During the migration, the compression | upgrade where a live network is migrated. During the migration, the | |||
| remains inactive, until all nodes are upgraded. | compression remains inactive, until all nodes are upgraded. | |||
| This document complements [RFC8138] and dedicates a flag in the RPL | This document complements [RFC8138] and signals whether it should be | |||
| DODAG Configuration Option to indicate whether the [RFC8138] | used within a RPL DODAG with a new flag in the RPL DODAG | |||
| compression should be used within the RPL DODAG. The setting of this | Configuration Option. The setting of this new flag is controlled by | |||
| new flag is controlled by the Root and propagates as is in the whole | the Root and propagates as is in the whole network as part of the | |||
| network as part of the normal RPL signaling. | normal RPL signaling. | |||
| The flag is cleared to maintain the compression inactive during the | The flag is cleared to maintain the compression inactive during the | |||
| migration phase. When the migration is complete (e.g., as known by | migration phase. When the migration is complete (e.g., as known by | |||
| network management and/or inventory), the flag is set and the | network management and/or inventory), the flag is set and the | |||
| compression is globally activated in the whole DODAG. | compression is globally activated in the whole DODAG. | |||
| 2. Terminology | 2. Terminology | |||
| 2.1. References | 2.1. References | |||
| skipping to change at page 3, line 45 ¶ | skipping to change at page 3, line 45 ¶ | |||
| 2.2. Glossary | 2.2. Glossary | |||
| This document often uses the following acronyms: | This document often uses the following acronyms: | |||
| 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Network | 6LoWPAN: IPv6 over Low-Power Wireless Personal Area Network | |||
| 6LoRH: 6LoWPAN Routing Header | 6LoRH: 6LoWPAN Routing Header | |||
| DIO: DODAG Information Object (a RPL message) | DIO: DODAG Information Object (a RPL message) | |||
| DODAG: Destination-Oriented Directed Acyclic Graph | DODAG: Destination-Oriented Directed Acyclic Graph | |||
| LLN: Low-Power and Lossy Network | LLN: Low-Power and Lossy Network | |||
| RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks | RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks | |||
| SubDAG: Subset of a DAG that is a child of a node | SubDAG: A DODAG rooted at a node which is a child of that node and a | |||
| subset of a larger DAG | ||||
| MOP: RPL Mode of Operation | MOP: RPL Mode of Operation | |||
| RPI: RPL Packet Information | RPI: RPL Packet Information | |||
| RAL: RPL-Aware Leaf | RAL: RPL-Aware Leaf | |||
| RAN: RPL-Aware Node | RAN: RPL-Aware Node | |||
| RUL: RPL-Unaware Leaf | RUL: RPL-Unaware Leaf | |||
| SRH: Source Routing Header | SRH: Source Routing Header | |||
| 2.3. Requirements Language | 2.3. Requirements Language | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
| 14 [RFC2119][RFC8174] when, and only when, they appear in all | 14 [RFC2119][RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 3. The RPL DODAG Configuration Option | 3. Updating RFC 6550 | |||
| The DODAG Configuration Option is defined in Section 6.7.6 of | The DODAG Configuration Option is defined in Section 6.7.6 of | |||
| [RFC6550]. | [RFC6550]. Its purpose is extended to distribute configuration | |||
| information affecting the construction and maintenance of the DODAG, | ||||
| The RPL DODAG Configuration Option is typically placed in a DODAG | as well as operational parameters for RPL on the DODAG, through the | |||
| Information Object (DIO) message. The DIO message propagates down | DODAG. As shown in Figure 1, the Option was originally designed with | |||
| the DODAG to form and then maintain its structure. The DODAG | 4 bit positions reserved for future use as Flags. | |||
| Configuration Option is copied unmodified from parents to children. | ||||
| As shown in Figure 1, the DODAG Configuration Option was designed | ||||
| with 4 bit positions reserved for future use as Flags. | ||||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type = 0x04 |Opt Length = 14| | |T| |A| ... | | | Type = 0x04 |Opt Length = 14| | |T| |A| ... | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | |||
| | <- Flags -> ... | | ||||
| Figure 1: DODAG Configuration Option (Partial View) | Figure 1: DODAG Configuration Option (Partial View) | |||
| This specification defines a new flag "Enable RFC8138 Compression" | This specification defines a new flag "Enable RFC8138 Compression" | |||
| (T). The "T" flag is set to turn-on the use of the compression of | (T). The "T" flag is set to turn-on the use of [RFC8138] within the | |||
| RPL artifacts with [RFC8138] within the DODAG. The new "T" flag is | DODAG. The "T" flag is encoded in position 2 of the reserved Flags | |||
| encoded in position 2 of the reserved Flags field in the RPL DODAG | in the DODAG Configuration Option (counting from bit 0 as the most | |||
| Configuration Option, and set to 0 in legacy implementations as | significant bit) and set to 0 in legacy implementations as specified | |||
| specified in Section 6.7.6 of [RFC6550]. | respectively in Sections 20.14 and 6.7.6 of [RFC6550]. | |||
| [RFC6550] states, when referring to the DODAG Configuration Option, | The RPL DODAG Configuration Option is typically placed in a DODAG | |||
| that "Nodes other than the DODAG Root MUST NOT modify this | Information Object (DIO) message. The DIO message propagates down | |||
| information when propagating the DODAG Configuration option". | the DODAG to form and then maintain its structure. The DODAG | |||
| Therefore, a legacy parent propagates the "T" flag as set by the Root | Configuration Option is copied unmodified from parents to children. | |||
| whether it supports this specification or not. So when the "T" flag | ||||
| is set, it is transparently flooded to all the nodes in the DODAG. | ||||
| Section 6.3.1 of [RFC6550] defines a 3-bit Mode of Operation (MOP) in | Section 6.3.1 of [RFC6550] defines a 3-bit Mode of Operation (MOP) in | |||
| the DIO Base Object. This specification applies to MOP values 0 to | the DIO Base Object. This specification applies to MOP values 0 to | |||
| 6. For a MOP value of 7, the compression MUST be used by default | 6. For a MOP value of 7, the bit in position 2 is considered | |||
| regardless of the setting of the "T" flag. | unallocated and [RFC8138] MUST be used by default. | |||
| [RFC6550] states that "Nodes other than the DODAG Root MUST NOT | ||||
| modify this information when propagating the DODAG Configuration | ||||
| option". Therefore, a legacy parent propagates the "T" flag as set | ||||
| by the Root whether it supports this specification or not. So when | ||||
| the "T" flag is set, it is transparently flooded to all the nodes in | ||||
| the DODAG. | ||||
| 4. Updating RFC 8138 | 4. Updating RFC 8138 | |||
| A node SHOULD generate packets in the compressed form using [RFC8138] | A node SHOULD generate packets in the compressed form using [RFC8138] | |||
| if and only if the "T" flag is set. This behavior can be overridden | if and only if the "T" flag is set. This behavior can be overridden | |||
| by configuration or network management. Overriding may be needed | by configuration or network management. Overriding may be needed | |||
| e.g., to turn on the compression in a network where all nodes support | e.g., to turn on the compression in a network where all nodes support | |||
| [RFC8138] but the Root does not support this specification and cannot | [RFC8138] but the Root does not support this specification and cannot | |||
| set the "T" flag, or to disable it locally in case of a problem. | set the "T" flag, or to disable it locally in case of a problem. | |||
| skipping to change at page 5, line 41 ¶ | skipping to change at page 5, line 41 ¶ | |||
| the form that the source used, either compressed or uncompressed. | the form that the source used, either compressed or uncompressed. | |||
| A RUL [UNAWARE-LEAVES] is both a leaf and an external target. A RUL | A RUL [UNAWARE-LEAVES] is both a leaf and an external target. A RUL | |||
| does not participate in RPL and depends on the parent router to | does not participate in RPL and depends on the parent router to | |||
| obtain connectivity. In the case of a RUL, forwarding towards an | obtain connectivity. In the case of a RUL, forwarding towards an | |||
| external target actually means delivering the packet. | external target actually means delivering the packet. | |||
| 5. Transition Scenarios | 5. Transition Scenarios | |||
| A node that supports [RFC8138] but not this specification can only be | A node that supports [RFC8138] but not this specification can only be | |||
| used in an homogeneous network. Enabling the [RFC8138] compression | used in a homogeneous network. Enabling the [RFC8138] compression | |||
| without a turn-on signaling method requires a "flag day"; by which | without a turn-on signaling method requires a "flag day"; by which | |||
| time all nodes must be upgraded, and at which point the network can | time all nodes must be upgraded, and at which point the network can | |||
| be rebooted with the [RFC8138] compression turned on. | be rebooted with the [RFC8138] compression turned on. | |||
| The intent for this specification is to perform a migration once and | The intent for this specification is to perform a migration once and | |||
| for all without the need for a flag day. In particular it is not the | for all without the need for a flag day. In particular it is not the | |||
| intention to undo the setting of the "T" flag. Though it is possible | intention to undo the setting of the "T" flag. Though it is possible | |||
| to roll back (see Section 5.3, the network operator SHOULD ensure | to roll back (see Section 5.3), the roll back operation SHOULD be | |||
| that the roll back operation is completed before adding nodes that do | complete before the network operator adds nodes that do not support | |||
| not support [RFC8138]. | [RFC8138]. | |||
| 5.1. Coexistence | 5.1. Coexistence | |||
| A node that supports this specification can operate in a network with | A node that supports this specification can operate in a network with | |||
| the [RFC8138] compression turned on or off with the "T" flag set | the [RFC8138] compression turned on or off with the "T" flag set | |||
| accordingly and in a network in transition from off to on or on to | accordingly and in a network in transition from off to on or on to | |||
| off (see Section 5.2). | off (see Section 5.2). | |||
| A node that does not support [RFC8138] can interoperate with nodes | A node that does not support [RFC8138] can interoperate with nodes | |||
| that do in a network with [RFC8138] compression turned off. If the | that do in a network with [RFC8138] compression turned off. If the | |||
| skipping to change at page 6, line 39 ¶ | skipping to change at page 6, line 39 ¶ | |||
| To ensure that a packet is forwarded across the RPL DODAG in the form | To ensure that a packet is forwarded across the RPL DODAG in the form | |||
| in which it was generated, it is required that all the RPL nodes | in which it was generated, it is required that all the RPL nodes | |||
| support [RFC8138] at the time of the switch. | support [RFC8138] at the time of the switch. | |||
| Setting the "T" flag is ultimately the responsibility of the Network | Setting the "T" flag is ultimately the responsibility of the Network | |||
| Administrator. The expectation is that the network management or | Administrator. The expectation is that the network management or | |||
| upgrading tools in place enable the Network Administrator to know | upgrading tools in place enable the Network Administrator to know | |||
| when all the nodes that may join a DODAG were migrated. In the case | when all the nodes that may join a DODAG were migrated. In the case | |||
| of a RPL instance with multiple Roots, all nodes that participate to | of a RPL instance with multiple Roots, all nodes that participate to | |||
| the RPL Instance may potentially join any DODAG. The network MUST be | the RPL Instance may potentially join any DODAG. The network MUST be | |||
| operated with the "T" flag reset until all nodes in the RPL Instance | operated with the "T" flag unset until all nodes in the RPL Instance | |||
| are upgraded to support this specification. | are upgraded to support this specification. | |||
| 5.3. Rolling Back | 5.3. Rolling Back | |||
| When turning [RFC8138] compression off in the network, the Network | When turning [RFC8138] compression off in the network, the Network | |||
| Administrator MUST wait until all nodes have converged to the "T" | Administrator MUST wait until all nodes have converged to the "T" | |||
| flag reset before allowing nodes that do not support the compression | flag unset before allowing nodes that do not support the compression | |||
| in the network. To that effect, whether the compression is active in | in the network. To that effect, whether the compression is active in | |||
| a node SHOULD be exposed the node's management interface. | a node SHOULD be exposed the node's management interface. | |||
| Nodes that do not support [RFC8138] SHOULD NOT be deployed in a | Nodes that do not support [RFC8138] SHOULD NOT be deployed in a | |||
| network where the compression is turned on. If that is done, the | network where the compression is turned on. If that is done, the | |||
| node can only operate as a RUL. | node can only operate as a RUL. | |||
| 6. IANA Considerations | 6. IANA Considerations | |||
| IANA is requested to assign a new option flag from the Registry for | IANA is requested to assign a new option flag from the Registry for | |||
| skipping to change at page 7, line 33 ¶ | skipping to change at page 7, line 33 ¶ | |||
| based attack in the network, more in [RFC7416]. This document | based attack in the network, more in [RFC7416]. This document | |||
| applies typically to an existing deployment and does not change its | applies typically to an existing deployment and does not change its | |||
| security requirements and operations. It is assumed that the | security requirements and operations. It is assumed that the | |||
| security mechanisms as defined for RPL are followed. | security mechanisms as defined for RPL are followed. | |||
| Setting the "T" flag before all routers are upgraded may cause a loss | Setting the "T" flag before all routers are upgraded may cause a loss | |||
| of packets. The new bit is protected as the rest of the | of packets. The new bit is protected as the rest of the | |||
| configuration so this is just one of the many attacks that can happen | configuration so this is just one of the many attacks that can happen | |||
| if an attacker manages to inject a corrupted configuration. | if an attacker manages to inject a corrupted configuration. | |||
| Setting and resetting the "T" flag may create inconsistencies in the | Setting and unsetting the "T" flag may create inconsistencies in the | |||
| network but as long as all nodes are upgraded to [RFC8138] support | network but as long as all nodes are upgraded to [RFC8138] support | |||
| they will be able to forward both forms. The source is responsible | they will be able to forward both forms. The source is responsible | |||
| for selecting whether the packet is compressed or not, and all | for selecting whether the packet is compressed or not, and all | |||
| routers must use the format that the source selected. So the result | routers must use the format that the source selected. So the result | |||
| of an inconsistency is merely that both forms will be present in the | of an inconsistency is merely that both forms will be present in the | |||
| network, at an additional cost of bandwidth for packets in the | network, at an additional cost of bandwidth for packets in the | |||
| uncompressed form. | uncompressed form. | |||
| An attacker in the middle of the network may reset the "T" flag to | An attacker may unset the "T" flag to force additional energy | |||
| cause extra energy spending in the subset of the DODAG formed by its | consumption of child or descendant nodes in its subDAG. Conversely | |||
| descendants (its subDAG). Conversely it may set the "T" flag, so | it may set the "T" flag, so that nodes located downstream would | |||
| that nodes located downstream would compress when that it is not | compress when that it is not desired, potentially resulting in the | |||
| desired, potentially resulting in the loss of packets. In a tree | loss of packets. In a tree structure, the attacker would be in | |||
| structure, the attacker would be in position to drop the packets from | position to drop the packets from and to the attacked nodes. So the | |||
| and to the attacked nodes. So the attacks above would be more | attacks above would be more complex and more visible than simply | |||
| complex and more visible than simply dropping selected packets. The | dropping selected packets. The downstream node may have other | |||
| downstream node may have other parents and see both settings, which | parents and see both settings, which could raise attention. | |||
| could raise attention. | ||||
| 8. Acknowledgments | 8. Acknowledgments | |||
| The authors wish to thank Murray Kucherawy, Meral Shirazipour, Barry | The authors wish to thank Murray Kucherawy, Meral Shirazipour, Barry | |||
| Leiba, Tirumaleswar Reddy, Nagendra Kumar Nainar, Stewart Bryant, | Leiba, Tirumaleswar Reddy, Nagendra Kumar Nainar, Stewart Bryant, | |||
| Carles Gomez, Eric Vyncke, and especially Alvaro Retana, Dominique | Carles Gomez, Eric Vyncke, Roman Danyliw, and especially Benjamin | |||
| Barthel and Rahul Jadhav for their in-depth reviews and constructive | Kaduk, Alvaro Retana, Dominique Barthel and Rahul Jadhav for their | |||
| suggestions. | in-depth reviews and constructive suggestions. | |||
| Also many thanks to Michael Richardson for being always helpful and | Also many thanks to Michael Richardson for being always helpful and | |||
| responsive when need comes. | responsive when need comes. | |||
| 9. Normative References | 9. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| skipping to change at page 9, line 8 ¶ | skipping to change at page 9, line 8 ¶ | |||
| [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | [RFC8505] Thubert, P., Ed., Nordmark, E., Chakrabarti, S., and C. | |||
| Perkins, "Registration Extensions for IPv6 over Low-Power | Perkins, "Registration Extensions for IPv6 over Low-Power | |||
| Wireless Personal Area Network (6LoWPAN) Neighbor | Wireless Personal Area Network (6LoWPAN) Neighbor | |||
| Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | Discovery", RFC 8505, DOI 10.17487/RFC8505, November 2018, | |||
| <https://www.rfc-editor.org/info/rfc8505>. | <https://www.rfc-editor.org/info/rfc8505>. | |||
| [UNAWARE-LEAVES] | [UNAWARE-LEAVES] | |||
| Thubert, P. and M. Richardson, "Routing for RPL Leaves", | Thubert, P. and M. Richardson, "Routing for RPL Leaves", | |||
| Work in Progress, Internet-Draft, draft-ietf-roll-unaware- | Work in Progress, Internet-Draft, draft-ietf-roll-unaware- | |||
| leaves-18, June 12, 2020, <https://tools.ietf.org/html/ | leaves-18, 12 June 2020, <https://tools.ietf.org/html/ | |||
| draft-ietf-roll-unaware-leaves-18>. | draft-ietf-roll-unaware-leaves-18>. | |||
| 10. Informative References | 10. Informative References | |||
| [RFC6553] Hui, J. and JP. Vasseur, "The Routing Protocol for Low- | [RFC6553] Hui, J. and JP. Vasseur, "The Routing Protocol for Low- | |||
| Power and Lossy Networks (RPL) Option for Carrying RPL | Power and Lossy Networks (RPL) Option for Carrying RPL | |||
| Information in Data-Plane Datagrams", RFC 6553, | Information in Data-Plane Datagrams", RFC 6553, | |||
| DOI 10.17487/RFC6553, March 2012, | DOI 10.17487/RFC6553, March 2012, | |||
| <https://www.rfc-editor.org/info/rfc6553>. | <https://www.rfc-editor.org/info/rfc6553>. | |||
| skipping to change at page 9, line 35 ¶ | skipping to change at page 9, line 35 ¶ | |||
| and M. Richardson, Ed., "A Security Threat Analysis for | and M. Richardson, Ed., "A Security Threat Analysis for | |||
| the Routing Protocol for Low-Power and Lossy Networks | the Routing Protocol for Low-Power and Lossy Networks | |||
| (RPLs)", RFC 7416, DOI 10.17487/RFC7416, January 2015, | (RPLs)", RFC 7416, DOI 10.17487/RFC7416, January 2015, | |||
| <https://www.rfc-editor.org/info/rfc7416>. | <https://www.rfc-editor.org/info/rfc7416>. | |||
| [USEofRPLinfo] | [USEofRPLinfo] | |||
| Robles, I., Richardson, M., and P. Thubert, "Using RPI | Robles, I., Richardson, M., and P. Thubert, "Using RPI | |||
| Option Type, Routing Header for Source Routes and IPv6-in- | Option Type, Routing Header for Source Routes and IPv6-in- | |||
| IPv6 encapsulation in the RPL Data Plane", Work in | IPv6 encapsulation in the RPL Data Plane", Work in | |||
| Progress, Internet-Draft, draft-ietf-roll-useofrplinfo-40, | Progress, Internet-Draft, draft-ietf-roll-useofrplinfo-40, | |||
| June 25, 2020, <https://tools.ietf.org/html/draft-ietf- | 25 June 2020, <https://tools.ietf.org/html/draft-ietf- | |||
| roll-useofrplinfo-40>. | roll-useofrplinfo-40>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Pascal Thubert (editor) | Pascal Thubert (editor) | |||
| Cisco Systems, Inc | Cisco Systems, Inc | |||
| Building D | Building D | |||
| 45 Allee des Ormes - BP1200 | 45 Allee des Ormes - BP1200 | |||
| 06254 MOUGINS - Sophia Antipolis | 06254 MOUGINS - Sophia Antipolis | |||
| France | France | |||
| End of changes. 24 change blocks. | ||||
| 68 lines changed or deleted | 68 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||