| < draft-pelov-lpwan-architecture-01.txt | draft-pelov-lpwan-architecture-02.txt > | |||
|---|---|---|---|---|
| lpwan Working Group A. Pelov | LPWAN Working Group A. Pelov | |||
| Internet-Draft Acklio | Internet-Draft Acklio | |||
| Intended status: Informational P. Thubert | Intended status: Informational P. Thubert | |||
| Expires: October 30, 2021 Cisco Systems | Expires: October 31, 2021 Cisco Systems | |||
| A. Minaburo | A. Minaburo | |||
| Acklio | Acklio | |||
| April 28, 2021 | April 29, 2021 | |||
| LPWAN Static Context Header Compression (SCHC) Architecture | LPWAN Static Context Header Compression (SCHC) Architecture | |||
| draft-pelov-lpwan-architecture-01 | draft-pelov-lpwan-architecture-02 | |||
| Abstract | Abstract | |||
| This document defines the LPWAN SCHC architecture. | This document defines the LPWAN SCHC architecture. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on October 30, 2021. | This Internet-Draft will expire on October 31, 2021. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. SCHC Operation . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. LPWAN Technologies and Profiles . . . . . . . . . . . . . . . 2 | |||
| 3. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 3. The Static Context Header Compression . . . . . . . . . . . . 3 | |||
| 4. Global architecture . . . . . . . . . . . . . . . . . . . . . 5 | 4. SCHC Endpoints . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 5. Data management . . . . . . . . . . . . . . . . . . . . . . . 6 | 5. SCHC Instances . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | 6. SCHC Data Model . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 7. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
| 7.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 8. IANA Consideration . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 7.2. Informative References . . . . . . . . . . . . . . . . . 8 | 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | ||||
| 10.1. Normative References . . . . . . . . . . . . . . . . . . 7 | ||||
| 10.2. Informative References . . . . . . . . . . . . . . . . . 8 | ||||
| 10.3. URIs . . . . . . . . . . . . . . . . . . . . . . . . . . 9 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
| 1. Introduction | 1. Introduction | |||
| The IETF LPWAN WG defined the necessary operations to enable IPv6 | The IETF LPWAN WG defined the necessary operations to enable IPv6 | |||
| over selected Low-Power Wide Area Networking (LPWAN) radio | over selected Low-Power Wide Area Networking (LPWAN) radio | |||
| technologies. [rfc8376] presents an overview of those technologies. | technologies. [rfc8376] presents an overview of those technologies. | |||
| The core product of the working group is the Static Context Header | The Static Context Header Compression (SCHC) [rfc8724] technology is | |||
| Compression (SCHC) [rfc8724] technology. | the core product of the IETF LPWAN working group. [rfc8724] defines a | |||
| generic framework for header compression and fragmentation, based on | ||||
| SCHC provides an extreme compression capability based on a state that | a static context that is pre-installed on the SCHC endpoints. | |||
| must match on the compressor and decompressor side. This state if | ||||
| formed of an ordered set of Compression/Decompression (C/D) rules. | ||||
| The first rule that matches is used to compress, and is indicated | ||||
| with the compression residue. Based on the rule identifier (RuleID) | ||||
| the decompressor can rebuild the original bitstream based on the | ||||
| residue. | ||||
| [rfc8724] also provides a Fragmentation/Reassembly (F/R) capability | This document details the constitutive elements of a SCHC-based | |||
| to cope with a constrained Maximum Transmit Unit (MTU) below the IPv6 | solution, and how the solution can be deployed. It provides a | |||
| minimum link MTU of 1280 bytes (see section 5 of [rfc8200]), which is | general architecture for a SCHC deployment, positioning the required | |||
| typically the case on an LPWAN network. | specifications, describing the possible deployment types, and | |||
| indicating models whereby the rules can be distributed and installed | ||||
| to enable reliable and scalable operations. | ||||
| [rfc8724] was defined to compress IPv6 and UDP; but SCHC really is a | 2. LPWAN Technologies and Profiles | |||
| generic compression and fragmentation technology. As such, SCHC is | ||||
| agnostic to which protocol it compresses and at which layer it is | ||||
| operated. The C/D peers may be hosted by different entities for | ||||
| different layers, and the F/R operation may also be performed between | ||||
| different parties, or different sub-layers in the same stack. | ||||
| If a protocol or a layer requires additional capabilities, it is | Because LPWAN technologies [rfc8376] have strict yet distinct | |||
| always possible to document more specifically how to use SCHC in that | constraints, e.g., in terms of maximum frame size, throughput, and/or | |||
| context, or to specify additional behaviours. For instance, | directionality, a SCHC instance must be profiled to adapt to the | |||
| [I-D.ietf-lpwan-coap-static-context-hc] extends the compression to | specific necessities of the technology to which it is applied. | |||
| CoAP [rfc7252] and OSCORE [rfc8613]. | ||||
| SCHC is also designed to be profiled to adapt to the specific | ||||
| necessities of the various LPWAN technologies to which it is applied. | ||||
| Appendix D. "SCHC Parameters" of [rfc8724] lists the information | Appendix D. "SCHC Parameters" of [rfc8724] lists the information | |||
| that an LPWAN technology-specific document must provide to profile | that an LPWAN technology-specific document must provide to profile | |||
| SCHC for that technology. As an example, [rfc9011] provides the | SCHC for that technology. | |||
| profile for LoRaWAN networks. | ||||
| In order to deploy SCHC, it is mandatory that the C/D and F/R peers | As an example, [rfc9011] provides the SCHC profile for LoRaWAN | |||
| are provisionned with the exact same set of rules. To be able to | networks. | |||
| provision end-points from different vendors, a common data model is | ||||
| needed that expresses the SCHC rules in an interoperable fashion. To | ||||
| that effect, [I-D.ietf-lpwan-schc-yang-data-model] defines a rule | ||||
| representation using the YANG [rfc7950] formalism. | ||||
| Finally, section 3 of [rfc8724] depicts a typical network | 3. The Static Context Header Compression | |||
| architecture for an LPWAN network, simplified from that shown in | ||||
| [rfc8376]and reproduced in Figure 1. | SCHC [rfc8724] specifies an extreme compression capability based on a | |||
| state that must match on the compressor and decompressor side. This | ||||
| state comprises a set of Compression/Decompression (C/D) rules. | ||||
| The SCHC Parser analyzes incoming packets and creates a list of | ||||
| fields that it matches against the compression rules. The rule that | ||||
| matches best is used to compress the packet, and the rule identifier | ||||
| (RuleID) is transmitted together with the compression residue to the | ||||
| decompressor. Based on the RuleID and the residue, the decompressor | ||||
| can rebuild the original packet and forward it in its uncompressed | ||||
| form over the Internet. | ||||
| [rfc8724] also provides a Fragmentation/Reassembly (F/R) capability | ||||
| to cope with the maximum frame size of a Link, which is extremely | ||||
| constrained in the case of an LPWAN network. | ||||
| If a SCHC-compressed packet is too large to be sent in a single Link- | ||||
| Layer PDU, the SCHC fragmentation can be applied on the compressed | ||||
| packet. The process of SCHC fragmentation is similar to that of | ||||
| compression; the fragmentation rules that are programmed for this | ||||
| device are checked to find the most appropriate one, regarding the | ||||
| SCHC packet size, the link error rate, and the reliability level | ||||
| required by the application. | ||||
| The nature of a ruleID allows to determine if it is a compression or | ||||
| fragmentation rule. | ||||
| 4. SCHC Endpoints | ||||
| Section 3 of [rfc8724] depicts a typical network architecture for an | ||||
| LPWAN network, simplified from that shown in [rfc8376] and reproduced | ||||
| in Figure 1. | ||||
| () () () | | () () () | | |||
| () () () () / \ +---------+ | () () () () / \ +---------+ | |||
| () () () () () () / \======| ^ | +-----------+ | () () () () () () / \======| ^ | +-----------+ | |||
| () () () | | <--|--> | |Application| | () () () | | <--|--> | |Application| | |||
| () () () () / \==========| v |=============| Server | | () () () () / \==========| v |=============| Server | | |||
| () () () / \ +---------+ +-----------+ | () () () / \ +---------+ +-----------+ | |||
| Dev RGWs NGW App | Dev RGWs NGW App | |||
| Figure 1: Typical LPWAN Network Architecture | Figure 1: Typical LPWAN Network Architecture | |||
| skipping to change at page 4, line 7 ¶ | skipping to change at page 4, line 23 ¶ | |||
| to star-oriented deployments and/or to use cases where applications | to star-oriented deployments and/or to use cases where applications | |||
| are very static and the state can provisionned in advance. | are very static and the state can provisionned in advance. | |||
| [I-D.thubert-intarea-schc-over-ppp] describes an alternate deployment | [I-D.thubert-intarea-schc-over-ppp] describes an alternate deployment | |||
| where the C/D and/or F/R operations are performed between peers of | where the C/D and/or F/R operations are performed between peers of | |||
| equal capabilities over a PPP [rfc2516] connection. SCHC over PPP | equal capabilities over a PPP [rfc2516] connection. SCHC over PPP | |||
| illustrates that with SCHC, the protocols that are compressed can be | illustrates that with SCHC, the protocols that are compressed can be | |||
| discovered dynamically and the rules can be fetched on-demand by both | discovered dynamically and the rules can be fetched on-demand by both | |||
| parties from the same Uniform Resource Name (URN) [rfc8141], ensuring | parties from the same Uniform Resource Name (URN) [rfc8141], ensuring | |||
| that the peers use the exact same set of rules. | that the peers use the exact same set of rules. | |||
| +----------+ Wi-Fi / +----------+ .... | +----------+ Wi-Fi / +----------+ .... | |||
| | IP | Ethernet | IP | .. ) | | IP | Ethernet | IP | .. ) | |||
| | Host +-----/------+ Router +----------( Internet ) | | Host +-----/------+ Router +----------( Internet ) | |||
| | SCHC C/D | Serial | SCHC C/D | ( ) | | SCHC C/D | Serial | SCHC C/D | ( ) | |||
| +----------+ +----------+ ... | +----------+ +----------+ ... | |||
| <-- SCHC --> | <-- SCHC --> | |||
| over PPP | over PPP | |||
| Figure 2: PPP-based SCHC Deployment | Figure 2: PPP-based SCHC Deployment | |||
| This document provides a general architecture for a SCHC deployment, | 5. SCHC Instances | |||
| positioning the required specifications, describing the possible | ||||
| deployment types, and indicating models whereby the rules can be | ||||
| distributed and installed to enable reliable and scalable operations. | ||||
| 2. SCHC Operation | The rule database contains a set of rules that are specific per | |||
| device. There is thus a SCHC instance per pair of endpoints. | ||||
| [rfc8724] states that a SCHC instance obtains the rules to process C/ | ||||
| D and F/R before the session starts, and that rules cannot be | ||||
| modified during the session. | ||||
| As [I-D.ietf-lpwan-coap-static-context-hc] states, the SCHC | [rfc8724] was defined to compress IPv6 [rfc8200] and UDP; but SCHC | |||
| compression and fragmentation mechanism can be implemented at | really is a generic compression and fragmentation technology. As | |||
| different levels and/or managed by different organizations. For | such, SCHC is agnostic to which protocol it compresses and at which | |||
| instance, as represented figure Figure 3, IP compression and | layer it is operated. The C/D peers may be hosted by different | |||
| fragmentation may be managed by the network SCHC instance and end-to- | entities for different layers, and the F/R operation may also be | |||
| end compression between the device and the application. The former | performed between different parties, or different sub-layers in the | |||
| can itself be split in two instances since encryption hides the field | same stack, and/or managed by different organizations. | |||
| structure. | ||||
| If a protocol or a layer requires additional capabilities, it is | ||||
| always possible to document more specifically how to use SCHC in that | ||||
| context, or to specify additional behaviours. For instance, | ||||
| [I-D.ietf-lpwan-coap-static-context-hc] extends the compression to | ||||
| CoAP [RFC7252] and OSCORE [RFC8613]. | ||||
| As represented figure Figure 3, the fragmentation and the compression | ||||
| of the IP and UDP headers may be operated by a network SCHC instance | ||||
| whereas the end-to-end compression of the application payload happens | ||||
| between the device and the application. The compression of the | ||||
| application payload may be split in two instances to deal with the | ||||
| encrypted portion of the application PDU. | ||||
| (device) (NGW) (App) | (device) (NGW) (App) | |||
| +--------+ +--------+ | +--------+ +--------+ | |||
| A S | CoAP | | CoAP | | A S | CoAP | | CoAP | | |||
| p C | inner | | inner | | p C | inner | | inner | | |||
| p H +--------+ +--------+ | p H +--------+ +--------+ | |||
| . V | SCHC | | SCHC | | . C | SCHC | | SCHC | | |||
| | inner | cryptographical boundary | inner | | | inner | cryptographical boundary | inner | | |||
| -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._ | -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._ | |||
| A S | CoAP | | CoAP | | A S | CoAP | | CoAP | | |||
| p C | outer | | outer | | p C | outer | | outer | | |||
| p H +--------+ +--------+ | p H +--------+ +--------+ | |||
| . C | SCHC | | SCHC | | . C | SCHC | | SCHC | | |||
| | outer | functional boundary | outer | | | outer | layer / functional boundary | outer | | |||
| -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._ | -._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._.-._ | |||
| N . udp . . udp . | N . UDP . . UDP . | |||
| e .......... .................. .......... | e .......... .................. .......... | |||
| t . ipv6 . . ipv6 . . ipv6 . | t . IPv6 . . IPv6 . . IPv6 . | |||
| w C .......... .................. .......... | w S .......... .................. .......... | |||
| o S . schc . . schc . . . . | o C . SCHC . . SCHC . . . . | |||
| r H .......... .......... . . . | r H .......... .......... . . . | |||
| k C . lpwan . . lpwan . . . . | k C . LPWAN . . LPWAN . . . . | |||
| .......... .................. .......... | .......... .................. .......... | |||
| ((((LPWAN)))) ------ Internet ------ | ((((LPWAN)))) ------ Internet ------ | |||
| Figure 3: Different SCHC instances in a global system | Figure 3: Different SCHC instances in a global system | |||
| This document defines a generic architecture for SCHC that can be | This document defines a generic architecture for SCHC that can be | |||
| used at any of these levels. The goal of the architectural document | used at any of these levels. The goal of the architectural document | |||
| is to orchestrate the different protocols and data model defined by | is to orchestrate the different protocols and data model defined by | |||
| the LPWAN woeking group to design an operational and interoperable | the LPWAN woeking group to design an operational and interoperable | |||
| framework for allowing IP application over contrained networks. | framework for allowing IP application over contrained networks. | |||
| 3. Definitions | 6. SCHC Data Model | |||
| 4. Global architecture | ||||
| As described in [rfc8724] a SCHC service is composed of a Parser, | ||||
| analyzing packets and creating a list of fields what will be used to | ||||
| match against the compression rules. If a packet matches rules, | ||||
| compression can be applied following rules instructions. | ||||
| If SCHC compressed packet is too large to be send in a single L2 | ||||
| frame, fragmentation will apply. The process is similar, device | ||||
| rules are checked to find the most appropriate fragmentation rule, | ||||
| regarding the SCHC packet size, the link error rate, the reliability | ||||
| required by the application, ... | ||||
| On the other direction, when a packet SCHC arrives, the ruleID is | ||||
| used to find the rule. Its nature allows to select if it is a | ||||
| compression or fragmentation rule. | ||||
| The rule database contains a set of rules specific to a single | ||||
| device. The [rfc8724] indicates that the SCHC instance reads the | ||||
| rules to process C/D and F/R, rules are not modified during these | ||||
| actions. | ||||
| A SCHC instance, summarized in the Figure 4, implies C/D and F/R | ||||
| present in both end. The device connected to a constrained network | ||||
| is in one end and the other end is either located in the core network | ||||
| or at the application. | ||||
| In any cases, the rules must be the same in both ends to perform C/D | ||||
| and F/R. | ||||
| (device) (core|app) | A SCHC instance, summarized in the Figure 4, implies C/D and/or F/R | |||
| present in both end and that both ends are provisionned with the same | ||||
| set of rules. | ||||
| (---) (---) | (-------) (-------) | |||
| ( r ) ( r ) | ( Rules ) ( Rules ) | |||
| (---) (---) | (-------) (-------) | |||
| . read . read | . read . read | |||
| . . | . . | |||
| +-----+ +-----+ | +-------+ +-------+ | |||
| <===| R&D |<=..............................<=| C&F |<=== | <===| R & D |<=== <===| C & F |<=== | |||
| ===>| C&F |=>..............................=>| R&D |===> | ===>| C & F |===> ===>| R & D |===> | |||
| +-----+ +-----+ | +-------+ +-------+ | |||
| +-------+ | ||||
| Figure 4: Summarized SCHC elements | Figure 4: Summarized SCHC elements | |||
| To enable rule synchronization between both ends, a common rule | To be able to provision end-points from different vendors, a common | |||
| representation must be defined. | rule representation is needed that expresses the SCHC rules in an | |||
| interoperable fashion. To that effect, | ||||
| 5. Data management | [I-D.ietf-lpwan-schc-yang-data-model] defines a rule representation | |||
| using the YANG [1] formalism. | ||||
| [I-D.ietf-lpwan-schc-yang-data-model] defines an YANG data model to | [I-D.ietf-lpwan-schc-yang-data-model] defines an YANG data model to | |||
| represent the rules. This enables the use of several protocols for | represent the rules. This enables the use of several protocols for | |||
| rule management, such as NETCONF, RESTCONF and CORECONF. NETCONF | rule management, such as NETCONF[RFC6241], RESTCONF[RFC8040], and | |||
| uses SSH, RESTCONF uses HTTPS, and CORECONF uses CoAP(s) as their | CORECONF[I-D.ietf-core-comi]. NETCONF uses SSH, RESTCONF uses HTTPS, | |||
| respective transport layer protocols. The data is represented in XML | and CORECONF uses CoAP(s) as their respective transport layer | |||
| under NETCONF, in JSON under RESTCONF and in CBOR under CORECONF. | protocols. The data is represented in XML under NETCONF, in | |||
| JSON[RFC8259] under RESTCONF and in CBOR[RFC8949] under CORECONF. | ||||
| create | create | |||
| (-------) read +=======+ * | (-------) read +=======+ * | |||
| ( rules )<------->|Rule |<--|--------> | ( rules )<------->|Rule |<--|--------> | |||
| (-------) update |Manager| NETCONF, RESTCONF or CORECONF | (-------) update |Manager| NETCONF, RESTCONF or CORECONF | |||
| . read delete +=======+ request | . read delete +=======+ request | |||
| . | . | |||
| +-------+ | +-------+ | |||
| <===| R & D |<=== | <===| R & D |<=== | |||
| ===>| C & F |===> | ===>| C & F |===> | |||
| +-------+ | +-------+ | |||
| Figure 5: Summerized SCHC elements | Figure 5: Summerized SCHC elements | |||
| Rule Manager (RM) is in charge of handling data derived from the YANG | The Rule Manager (RM) is in charge of handling data derived from the | |||
| Data Model and apply changes to the rules database Figure 5. | YANG Data Model and apply changes to the rules database Figure 5. | |||
| The RM is a application using the Internet to exchange information, | The RM is a application using the Internet to exchange information, | |||
| therefore: | therefore: | |||
| o for the network-level SCHC, the communication does not require | o for the network-level SCHC, the communication does not require | |||
| routing. Each of the end-points having an RM and both RMs can be | routing. Each of the end-points having an RM and both RMs can be | |||
| viewed on the same link, therefore wellknown Link Local addresses | viewed on the same link, therefore wellknown Link Local addresses | |||
| can be used to identify the device and the core RM. L2 security | can be used to identify the device and the core RM. L2 security | |||
| MAY be deemed as sufficient, if it provides the necessary level of | MAY be deemed as sufficient, if it provides the necessary level of | |||
| protection. | protection. | |||
| o for application-level SCHC, routing is involved and global IP | o for application-level SCHC, routing is involved and global IP | |||
| addresses SHOULD be used. End-to-end encryption is recommended. | addresses SHOULD be used. End-to-end encryption is RECOMMENDED. | |||
| Management messages can also be carried in the negotiation protocol | Management messages can also be carried in the negotiation protocol | |||
| as proposed in [I-D.thubert-intarea-schc-over-ppp] | as proposed in [I-D.thubert-intarea-schc-over-ppp]. The RM traffic | |||
| may be itself compressed by SCHC, especially if CORECONF is used, | ||||
| [I-D.ietf-lpwan-coap-static-context-hc] can be used. | ||||
| The RM traffic may be itself compressed by SCHC, especially if | 7. Security Considerations | |||
| CORECONF is used, [I-D.ietf-lpwan-coap-static-context-hc] can be | ||||
| used. | ||||
| 6. Acknowledgements | SCHC is sensitive to the rules that could be abused to form arbitrary | |||
| long messages or as a form of attack against the C/D and/or F/R | ||||
| functions, say to generate a buffer overflow and either modify the | ||||
| device or crash it. It is thus critical to ensure that the rules are | ||||
| distributed in a fashion that is protected against tempering, e.g., | ||||
| encrypted and signed. | ||||
| 8. IANA Consideration | ||||
| This document has no request to IANA | ||||
| 9. Acknowledgements | ||||
| The authors would like to thank (in alphabetic order): | The authors would like to thank (in alphabetic order): | |||
| 7. References | 10. References | |||
| 7.1. Normative References | 10.1. Normative References | |||
| [rfc8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC. | [rfc8724] Minaburo, A., Toutain, L., Gomez, C., Barthel, D., and JC. | |||
| Zuniga, "SCHC: Generic Framework for Static Context Header | Zuniga, "SCHC: Generic Framework for Static Context Header | |||
| Compression and Fragmentation", RFC 8724, | Compression and Fragmentation", RFC 8724, | |||
| DOI 10.17487/RFC8724, April 2020, | DOI 10.17487/RFC8724, April 2020, | |||
| <https://www.rfc-editor.org/info/rfc8724>. | <https://www.rfc-editor.org/info/rfc8724>. | |||
| 7.2. Informative References | [rfc9011] Gimenez, O., Ed. and I. Petrov, Ed., "Static Context | |||
| Header Compression and Fragmentation (SCHC) over LoRaWAN", | ||||
| RFC 9011, DOI 10.17487/RFC9011, April 2021, | ||||
| <https://www.rfc-editor.org/info/rfc9011>. | ||||
| 10.2. Informative References | ||||
| [I-D.ietf-core-comi] | ||||
| Veillette, M., Stok, P., Pelov, A., Bierman, A., and I. | ||||
| Petrov, "CoAP Management Interface (CORECONF)", draft- | ||||
| ietf-core-comi-11 (work in progress), January 2021. | ||||
| [I-D.ietf-lpwan-coap-static-context-hc] | [I-D.ietf-lpwan-coap-static-context-hc] | |||
| Minaburo, A., Toutain, L., and R. Andreasen, "LPWAN Static | Minaburo, A., Toutain, L., and R. Andreasen, "LPWAN Static | |||
| Context Header Compression (SCHC) for CoAP", draft-ietf- | Context Header Compression (SCHC) for CoAP", draft-ietf- | |||
| lpwan-coap-static-context-hc-19 (work in progress), March | lpwan-coap-static-context-hc-19 (work in progress), March | |||
| 2021. | 2021. | |||
| [I-D.ietf-lpwan-schc-yang-data-model] | [I-D.ietf-lpwan-schc-yang-data-model] | |||
| Minaburo, A. and L. Toutain, "Data Model for Static | Minaburo, A. and L. Toutain, "Data Model for Static | |||
| Context Header Compression (SCHC)", draft-ietf-lpwan-schc- | Context Header Compression (SCHC)", draft-ietf-lpwan-schc- | |||
| skipping to change at page 8, line 33 ¶ | skipping to change at page 8, line 32 ¶ | |||
| [I-D.thubert-intarea-schc-over-ppp] | [I-D.thubert-intarea-schc-over-ppp] | |||
| Thubert, P., "SCHC over PPP", draft-thubert-intarea-schc- | Thubert, P., "SCHC over PPP", draft-thubert-intarea-schc- | |||
| over-ppp-03 (work in progress), April 2021. | over-ppp-03 (work in progress), April 2021. | |||
| [rfc2516] Mamakos, L., Lidl, K., Evarts, J., Carrel, D., Simone, D., | [rfc2516] Mamakos, L., Lidl, K., Evarts, J., Carrel, D., Simone, D., | |||
| and R. Wheeler, "A Method for Transmitting PPP Over | and R. Wheeler, "A Method for Transmitting PPP Over | |||
| Ethernet (PPPoE)", RFC 2516, DOI 10.17487/RFC2516, | Ethernet (PPPoE)", RFC 2516, DOI 10.17487/RFC2516, | |||
| February 1999, <https://www.rfc-editor.org/info/rfc2516>. | February 1999, <https://www.rfc-editor.org/info/rfc2516>. | |||
| [rfc7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained | [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | |||
| and A. Bierman, Ed., "Network Configuration Protocol | ||||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | ||||
| <https://www.rfc-editor.org/info/rfc6241>. | ||||
| [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained | ||||
| Application Protocol (CoAP)", RFC 7252, | Application Protocol (CoAP)", RFC 7252, | |||
| DOI 10.17487/RFC7252, June 2014, | DOI 10.17487/RFC7252, June 2014, | |||
| <https://www.rfc-editor.org/info/rfc7252>. | <https://www.rfc-editor.org/info/rfc7252>. | |||
| [rfc7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", | [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | |||
| RFC 7950, DOI 10.17487/RFC7950, August 2016, | Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | |||
| <https://www.rfc-editor.org/info/rfc7950>. | <https://www.rfc-editor.org/info/rfc8040>. | |||
| [rfc8141] Saint-Andre, P. and J. Klensin, "Uniform Resource Names | [rfc8141] Saint-Andre, P. and J. Klensin, "Uniform Resource Names | |||
| (URNs)", RFC 8141, DOI 10.17487/RFC8141, April 2017, | (URNs)", RFC 8141, DOI 10.17487/RFC8141, April 2017, | |||
| <https://www.rfc-editor.org/info/rfc8141>. | <https://www.rfc-editor.org/info/rfc8141>. | |||
| [rfc8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | [rfc8200] Deering, S. and R. Hinden, "Internet Protocol, Version 6 | |||
| (IPv6) Specification", STD 86, RFC 8200, | (IPv6) Specification", STD 86, RFC 8200, | |||
| DOI 10.17487/RFC8200, July 2017, | DOI 10.17487/RFC8200, July 2017, | |||
| <https://www.rfc-editor.org/info/rfc8200>. | <https://www.rfc-editor.org/info/rfc8200>. | |||
| [RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data | ||||
| Interchange Format", STD 90, RFC 8259, | ||||
| DOI 10.17487/RFC8259, December 2017, | ||||
| <https://www.rfc-editor.org/info/rfc8259>. | ||||
| [rfc8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) | [rfc8376] Farrell, S., Ed., "Low-Power Wide Area Network (LPWAN) | |||
| Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, | Overview", RFC 8376, DOI 10.17487/RFC8376, May 2018, | |||
| <https://www.rfc-editor.org/info/rfc8376>. | <https://www.rfc-editor.org/info/rfc8376>. | |||
| [rfc8613] Selander, G., Mattsson, J., Palombini, F., and L. Seitz, | [RFC8613] Selander, G., Mattsson, J., Palombini, F., and L. Seitz, | |||
| "Object Security for Constrained RESTful Environments | "Object Security for Constrained RESTful Environments | |||
| (OSCORE)", RFC 8613, DOI 10.17487/RFC8613, July 2019, | (OSCORE)", RFC 8613, DOI 10.17487/RFC8613, July 2019, | |||
| <https://www.rfc-editor.org/info/rfc8613>. | <https://www.rfc-editor.org/info/rfc8613>. | |||
| [rfc9011] Gimenez, O., Ed. and I. Petrov, Ed., "Static Context | [RFC8949] Bormann, C. and P. Hoffman, "Concise Binary Object | |||
| Header Compression and Fragmentation (SCHC) over LoRaWAN", | Representation (CBOR)", STD 94, RFC 8949, | |||
| RFC 9011, DOI 10.17487/RFC9011, April 2021, | DOI 10.17487/RFC8949, December 2020, | |||
| <https://www.rfc-editor.org/info/rfc9011>. | <https://www.rfc-editor.org/info/rfc8949>. | |||
| 10.3. URIs | ||||
| [1] RFC7950 | ||||
| Authors' Addresses | Authors' Addresses | |||
| Alexander Pelov | Alexander Pelov | |||
| Acklio | Acklio | |||
| 1137A avenue des Champs Blancs | 1137A avenue des Champs Blancs | |||
| 35510 Cesson-Sevigne Cedex | 35510 Cesson-Sevigne Cedex | |||
| France | France | |||
| Email: a@ackl.io | Email: a@ackl.io | |||
| End of changes. 42 change blocks. | ||||
| 145 lines changed or deleted | 187 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||