| < draft-thubert-nina-01.txt | draft-thubert-nina-02.txt > | |||
|---|---|---|---|---|
| Internet Engineering Task Force P. Thubert | Internet Engineering Task Force P. Thubert | |||
| Internet-Draft Cisco | Internet-Draft Cisco | |||
| Intended status: Standards Track R. Wakikawa | Intended status: Standards Track R. Wakikawa | |||
| Expires: January 5, 2008 Keio University | Expires: August 7, 2008 Keio University | |||
| C. Bernardos | C. Bernardos | |||
| UC3M | UC3M | |||
| R. Baldessari | R. Baldessari | |||
| NEC Europe | NEC Europe | |||
| J. Lorchat | J. Lorchat | |||
| Keio University | Keio University | |||
| July 4, 2007 | February 4, 2008 | |||
| Network In Node Advertisement | Network In Node Advertisement | |||
| draft-thubert-nina-01.txt | draft-thubert-nina-02.txt | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 41 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on January 5, 2008. | This Internet-Draft will expire on August 7, 2008. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2008). | |||
| Abstract | Abstract | |||
| The Internet is evolving to become a more ubiquitous network, driven | The Internet is evolving to become a more ubiquitous network, driven | |||
| by the low prices of wireless routers and access points and by the | by the low prices of wireless routers and access points and by the | |||
| users' requirements of connectivity anytime and anywhere. For that | users' requirements of connectivity anytime and anywhere. For that | |||
| reason, a cloud of nodes connected by wireless technology is being | reason, a cloud of nodes connected by wireless technology is being | |||
| created at the edge of the Internet. This cloud is called a MANEMO | created at the edge of the Internet. This cloud is called a MANEMO | |||
| Fringe Stub (MFS). It is expected that networking in the MFS will be | Fringe Stub (MFS). It is expected that networking in the MFS will be | |||
| highly unmanaged and ad-hoc, but at the same time will need to offer | highly unmanaged and ad-hoc, but at the same time will need to offer | |||
| skipping to change at page 3, line 19 ¶ | skipping to change at page 3, line 19 ¶ | |||
| 3. Motivations . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 3. Motivations . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 4. Rationale for the proposed solution . . . . . . . . . . . . . 7 | 4. Rationale for the proposed solution . . . . . . . . . . . . . 7 | |||
| 4.1. Why ND based . . . . . . . . . . . . . . . . . . . . . . . 7 | 4.1. Why ND based . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 4.2. Why NA based . . . . . . . . . . . . . . . . . . . . . . . 7 | 4.2. Why NA based . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 4.3. Relationship with TD . . . . . . . . . . . . . . . . . . . 8 | 4.3. Relationship with TD . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.4. Relationship with NEMO . . . . . . . . . . . . . . . . . . 8 | 4.4. Relationship with NEMO . . . . . . . . . . . . . . . . . . 8 | |||
| 5. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 5. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 5.1. Nested NEMO . . . . . . . . . . . . . . . . . . . . . . . 10 | 5.1. Nested NEMO . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 6. Message Formats . . . . . . . . . . . . . . . . . . . . . . . 12 | 6. Message Formats . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.1. NINA message . . . . . . . . . . . . . . . . . . . . . . . 12 | 6.1. NINA message . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 7. Mobile Router Operation . . . . . . . . . . . . . . . . . . . 15 | 6.2. NINO IPv4 option . . . . . . . . . . . . . . . . . . . . . 15 | |||
| 7.1. Multicast TD RA messages from parent . . . . . . . . . . . 17 | 7. Mobile Router Operation . . . . . . . . . . . . . . . . . . . 16 | |||
| 7.2. Unicast NINA messages from child to parent . . . . . . . . 18 | 7.1. Multicast TD RA messages from parent . . . . . . . . . . . 18 | |||
| 7.3. Other events . . . . . . . . . . . . . . . . . . . . . . . 18 | 7.2. Unicast NINA messages from child to parent . . . . . . . . 19 | |||
| 7.4. Aggregation of prefixes on a same MR . . . . . . . . . . . 19 | 7.3. Other events . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
| 7.4. Aggregation of prefixes on a same MR . . . . . . . . . . . 20 | ||||
| 7.5. Aggregation of prefixes by a parent acting as mobile | 7.5. Aggregation of prefixes by a parent acting as mobile | |||
| Home . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 | Home . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 7.6. Default value . . . . . . . . . . . . . . . . . . . . . . 20 | 7.6. Default value . . . . . . . . . . . . . . . . . . . . . . 21 | |||
| 8. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 21 | 8. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 22 | |||
| 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22 | 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 23 | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 23 | 10. Security Considerations . . . . . . . . . . . . . . . . . . . 24 | |||
| 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24 | 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25 | 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | |||
| 12.1. Normative References . . . . . . . . . . . . . . . . . . . 25 | 12.1. Normative References . . . . . . . . . . . . . . . . . . . 26 | |||
| 12.2. Informative References . . . . . . . . . . . . . . . . . . 25 | 12.2. Informative References . . . . . . . . . . . . . . . . . . 26 | |||
| Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . . 28 | Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . . 29 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| Intellectual Property and Copyright Statements . . . . . . . . . . 31 | Intellectual Property and Copyright Statements . . . . . . . . . . 32 | |||
| 1. Introduction | 1. Introduction | |||
| Mobile IP [3] allows transparent routing of IPv4 datagrams to mobile | Mobile IP [3] allows transparent routing of IPv4 datagrams to mobile | |||
| nodes in the Internet. Mobile IPv6 (MIPv6) [4] extends this facility | nodes in the Internet. Mobile IPv6 (MIPv6) [4] extends this facility | |||
| for IPv6, and NEMO [5] enables it for mobile prefixes. In any case, | for IPv6, and NEMO [5] enables it for mobile prefixes. In any case, | |||
| a mobile node is always identified by its Home Address (HoA), | a mobile node is always identified by its Home Address (HoA), | |||
| regardless of its current point of attachment to the Internet. In | regardless of its current point of attachment to the Internet. In | |||
| turn, MANET [12], [15] allows a set of unrelated nodes and routers to | turn, MANET [11], [14] allows a set of unrelated nodes and routers to | |||
| discover their peers and establish communication. | discover their peers and establish communication. | |||
| Mobile Routers (MRs) may attach to other MRs and form a Care-of | Mobile Routers (MRs) may attach to other MRs and form a Care-of | |||
| Address (CoA) from a Mobile Network Prefix (MNP). As a result, MRs | Address (CoA) from a Mobile Network Prefix (MNP). As a result, MRs | |||
| are really MARs, Mobile Access Routers, because they can accept | are really MARs, Mobile Access Routers, because they can accept | |||
| connections from other MRs on their ingress interfaces. When Mobile | connections from other MRs on their ingress interfaces. When Mobile | |||
| Routers attach to other Mobile Routers with a single Care-of Address | Routers attach to other Mobile Routers with a single Care-of Address | |||
| in a loop-less manner, they end up building trees. This process is | in a loop-less manner, they end up building trees. This process is | |||
| described in Tree Discovery (TD) [6]. | described in Tree Discovery (TD) [6]. | |||
| This draft provides a minimum extension to IPv6 Neighbor Discovery | This draft provides a minimum extension to IPv6 Neighbor Discovery | |||
| (ND) Neighbors Advertisements (NA) - called NINA (Network In Node | (ND) Neighbors Advertisements (NA) - called NINA (Network In Node | |||
| Advertisement) - extending RFC 2461 [2] and RFC 4191 [7] to add the | Advertisement) - extending RFC 4861 [2] and RFC 4191 [7] to add the | |||
| capability to include a prefix option - called NINO (Network In Node | capability to include a prefix option - called NINO (Network In Node | |||
| Option) - in the NAs. This enables an MR to learn the prefixes of | Option) - in the NAs. This enables an MR to learn the prefixes of | |||
| all other MRs down its sub-tree. Note that NINO is pronounced NEE- | all other MRs down its sub-tree. Note that NINO is pronounced NEE- | |||
| GNO and NINA is pronounced NEE-GNA. | GNO and NINA is pronounced NEE-GNA. | |||
| A NEMO Mobile Router has a double behavior. On its egress | A NEMO Mobile Router has a double behavior. On its egress | |||
| interfaces, which are used to backhaul the traffic to the Home | interfaces, which are used to backhaul the traffic to the Home | |||
| Network and the rest of the Internet, it is seen as a Mobile Node | Network and the rest of the Internet, it is seen as a Mobile Node | |||
| (MN), performing the IPv6 and MIPv6 host-required features such as | (MN), performing the IPv6 and MIPv6 host-required features such as | |||
| neighbor and router discovery [2]. On the (ingress) interfaces to | neighbor and router discovery [2]. On the (ingress) interfaces to | |||
| skipping to change at page 5, line 12 ¶ | skipping to change at page 5, line 12 ¶ | |||
| NINA extends ND NAs to advertise over the egress interface the | NINA extends ND NAs to advertise over the egress interface the | |||
| prefixes that are reachable via the MR. | prefixes that are reachable via the MR. | |||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [1]. | document are to be interpreted as described in [1]. | |||
| Readers are expected to be familiar with all the terms defined in the | Readers are expected to be familiar with all the terms defined in the | |||
| RFC 3753 [11], the NEMO Terminology draft [20] and the MANEMO Problem | RFC 3753 [10], the NEMO Terminology draft [19] and the MANEMO Problem | |||
| Statement draft [19]. | Statement draft [18]. | |||
| NINO (Network In Node Option): a new Neighbor Discovery (ND) | NINO (Network In Node Option): a new Neighbor Discovery (ND) | |||
| option that adds the capability to include a prefix option in | option that adds the capability to include a prefix option in | |||
| Neighbor Advertisements (NAs). | Neighbor Advertisements (NAs). | |||
| NINA (Network In Node Advertisement): a Neighbor Discovery (ND) | NINA (Network In Node Advertisement): a Neighbor Discovery (ND) | |||
| Neighbor Advertisement (NA) carrying a NINO. NINA is also used to | Neighbor Advertisement (NA) carrying a NINO. NINA is also used to | |||
| refer to the protocol itself (defined in this document). | refer to the protocol itself (defined in this document). | |||
| 3. Motivations | 3. Motivations | |||
| The Internet is evolving to become a more ubiquitous network, driven | The Internet is evolving to become a more ubiquitous network, driven | |||
| by the low prices of wireless routers and access points and by the | by the low prices of wireless routers and access points and by the | |||
| users' requirements of connectivity anytime and anywhere. For that | users' requirements of connectivity anytime and anywhere. For that | |||
| reason, a cloud of nodes connected by wireless technology is being | reason, a cloud of nodes connected by wireless technology is being | |||
| created at the edge of the Internet. This cloud is called a MANEMO | created at the edge of the Internet. This cloud is called a MANEMO | |||
| Fringe Stub (MFS) in [19]. Examples of wireless technologies used | Fringe Stub (MFS) in [18]. Examples of wireless technologies used | |||
| within a MFS are wireless metropolitan and local area network | within a MFS are wireless metropolitan and local area network | |||
| protocols (WiMAX, WLAN, 802.20, etc), short distance wireless | protocols (WiMAX, WLAN, 802.20, etc), short distance wireless | |||
| technology (bluetooth, IrDA, UWB), and radio mesh networks (e.g., | technology (bluetooth, IrDA, UWB), and radio mesh networks (e.g., | |||
| 802.11s). It is expected that networking in the MFS will be highly | 802.11s). It is expected that networking in the MFS will be highly | |||
| unmanaged and ad-hoc, but at the same time will need to offer | unmanaged and ad-hoc, but at the same time will need to offer | |||
| excellent service availability. | excellent service availability. | |||
| The NEMO Basic Support protocol [5] could be used to provide global | The NEMO Basic Support protocol [5] could be used to provide global | |||
| reachability for a mobile access network within the MFS. | reachability for a mobile access network within the MFS. | |||
| Analogously, the Tree-Discovery mechanism [6] could be used to avoid | Analogously, the Tree-Discovery mechanism [6] could be used to avoid | |||
| skipping to change at page 7, line 10 ¶ | skipping to change at page 7, line 10 ¶ | |||
| need to enable local routing between the Mobile Routers within a | need to enable local routing between the Mobile Routers within a | |||
| portion of the MFS. NINA can provide this form of local routing; it | portion of the MFS. NINA can provide this form of local routing; it | |||
| is an example of Route Optimization (RO) between Mobile Routers that | is an example of Route Optimization (RO) between Mobile Routers that | |||
| are communicating directly in a portion of the MFS. | are communicating directly in a portion of the MFS. | |||
| 4. Rationale for the proposed solution | 4. Rationale for the proposed solution | |||
| 4.1. Why ND based | 4.1. Why ND based | |||
| NINA extends the Neighbor Discovery protocol to address the MANEMO | NINA extends the Neighbor Discovery protocol to address the MANEMO | |||
| requirements listed in [19], although MANET protocols [13], [16], | requirements listed in [18], although MANET protocols [12], [15], | |||
| [17] provides similar features such as local routing and Internet | [16] provides similar features such as local routing and Internet | |||
| access over multihop. | access over multihop. | |||
| One of the drawbacks of MANET protocols is the question of which | One of the drawbacks of MANET protocols is the question of which | |||
| protocol should be used. AODV, DSR, DYMO, OLSR, etc. are | protocol should be used. AODV, DSR, DYMO, OLSR, etc. are | |||
| standardized in IETF and each has distinct features, like proactive | standardized in IETF and each has distinct features, like proactive | |||
| and reactive. In MANEMO scenarios, Mobile Routers, mobile hosts, and | and reactive. In MANEMO scenarios, Mobile Routers, mobile hosts, and | |||
| fixed access routers are involved, and therefore, it is highly | fixed access routers are involved, and therefore, it is highly | |||
| important to deploy a consistent protocol in the network. On the | important to deploy a consistent protocol in the network. On the | |||
| other hand, ND is a core component of IPv6 and is supported by all | other hand, ND is a core component of IPv6 and is supported by all | |||
| IPv6 nodes. All IPv6 nodes can process a NINO(s) in ND messages if | IPv6 nodes. All IPv6 nodes can process a NINO(s) in ND messages if | |||
| skipping to change at page 8, line 26 ¶ | skipping to change at page 8, line 26 ¶ | |||
| This allows an extreme conciseness of the routing information, with | This allows an extreme conciseness of the routing information, with | |||
| no topological knowledge past the first hop. That conciseness | no topological knowledge past the first hop. That conciseness | |||
| enables a high degree of movement within the nested structure; in | enables a high degree of movement within the nested structure; in | |||
| particular, a movement within a subtree is not seen outside of that | particular, a movement within a subtree is not seen outside of that | |||
| subtree, so most of the connectivity is maintained at all times while | subtree, so most of the connectivity is maintained at all times while | |||
| there might never be such a thing as a convergence. | there might never be such a thing as a convergence. | |||
| 4.4. Relationship with NEMO | 4.4. Relationship with NEMO | |||
| The Reverse Routing Header (RRH) described in [18] operates in the | The Reverse Routing Header (RRH) described in [17] operates in the | |||
| nested NEMO as a layer 3 Source Route Bridging (SRB) technique for | nested NEMO as a layer 3 Source Route Bridging (SRB) technique for | |||
| nested NEMO Route Optimization. It allows a quick reaction to inner | nested NEMO Route Optimization. It allows a quick reaction to inner | |||
| movements with the resolution of the packet; but the cost, an IPv6 | movements with the resolution of the packet; but the cost, an IPv6 | |||
| address per packet per hop, might be deemed excessive. | address per packet per hop, might be deemed excessive. | |||
| Also, the Home Agent needs to cache the RRH in its binding cache, and | Also, the Home Agent needs to cache the RRH in its binding cache, and | |||
| again, the overhead might be significant for a large deployment. | again, the overhead might be significant for a large deployment. | |||
| On the other hand, NINA establishes states in the intermediate nodes, | On the other hand, NINA establishes states in the intermediate nodes, | |||
| in a fashion similar to Transparent Bridging (TB), but at layer 3. | in a fashion similar to Transparent Bridging (TB), but at layer 3. | |||
| The integration of these 2 approaches allows switching between SRB to | The integration of these 2 approaches allows switching between SRB to | |||
| TB models dynamically as the NINA states are populated or become | TB models dynamically as the NINA states are populated or become | |||
| obsolete. To obtain this capability, the operation of an | obsolete. To obtain this capability, the operation of an | |||
| intermediate MR described in [18] is altered in the following manner: | intermediate MR described in [17] is altered in the following manner: | |||
| o If the MR has a (NINA) route to the upper entry in the RRH via the | o If the MR has a (NINA) route to the upper entry in the RRH via the | |||
| source of the packet, it still updates the source of the packet | source of the packet, it still updates the source of the packet | |||
| with its own Care-of Address, but does not save the previous | with its own Care-of Address, but does not save the previous | |||
| source as a new entry in the RRH. | source as a new entry in the RRH. | |||
| o At best, if NINA has established states all along in a given | o At best, if NINA has established states all along in a given | |||
| branch of the tree, the RRH for that branch has always 2 entries, | branch of the tree, the RRH for that branch has always 2 entries, | |||
| the first MR's Home Address, and its Care-of Address, regardless | the first MR's Home Address, and its Care-of Address, regardless | |||
| of the depth of the first MR in the nested NEMO. | of the depth of the first MR in the nested NEMO. | |||
| o When some MRs in the tree support NINA and some do not, the | o When some MRs in the tree support NINA and some do not, the | |||
| resulting RRH will be only partly compressed. Also, if the NINA | resulting RRH will be only partly compressed. Also, if the NINA | |||
| route does not match the RRH, then the route is obsolete and the | route does not match the RRH, then the route is obsolete and the | |||
| source address is added to the RRH as described in [18], in order | source address is added to the RRH as described in [17], in order | |||
| to ensure a correct routing on the way back. When NINA catches | to ensure a correct routing on the way back. When NINA catches | |||
| up, the entry will be saved again. | up, the entry will be saved again. | |||
| The integration of NINA and RRH can offer the best of 2 worlds: a | The integration of NINA and RRH can offer the best of 2 worlds: a | |||
| quick (per packet) resolution to the network changes, and the | quick (per packet) resolution to the network changes, and the | |||
| transparent (stateful) operation when the NINA routing protocol | transparent (stateful) operation when the NINA routing protocol | |||
| establishes the states in the nested NEMO. | establishes the states in the nested NEMO. | |||
| 5. Overview | 5. Overview | |||
| skipping to change at page 13, line 15 ¶ | skipping to change at page 13, line 15 ¶ | |||
| learned from NINO and the connected prefixes). A NINA is also sent | learned from NINO and the connected prefixes). A NINA is also sent | |||
| to the AR once it has been selected as new AR after a movement, or | to the AR once it has been selected as new AR after a movement, or | |||
| when the list of advertised prefixes has changed. | when the list of advertised prefixes has changed. | |||
| NINA may advertise positive (prefix is present) or negative (removed) | NINA may advertise positive (prefix is present) or negative (removed) | |||
| NINOs. A no-NINO is stimulated by the disappearance of a prefix | NINOs. A no-NINO is stimulated by the disappearance of a prefix | |||
| below. This is discovered by timing out after a request (a RA-TIO) | below. This is discovered by timing out after a request (a RA-TIO) | |||
| or by receiving a no-NINO. A no-NINO is a NINO with a NINO Lifetime | or by receiving a no-NINO. A no-NINO is a NINO with a NINO Lifetime | |||
| of 0. | of 0. | |||
| 0 1 2 3 | 0 1 2 3 | |||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Type | Length | Prefix Length | Reserved1 |L|4| | | Type | Length | Prefix Length |L| Reserved1 |4| | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | NINO Lifetime | | | NINO Lifetime | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | Reserved2 | | | Reserved2 | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | NINO Depth | Reserved3 | NINO Sequence | | | NINO Depth | Reserved3 | NINO Sequence | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | |||
| + + | + + | |||
| | | | | | | |||
| + Prefix (Variable Length) + | + Prefix (Variable Length) + | |||
| | | | | | | |||
| + + | + + | |||
| | | | | | | |||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| Type: | Type: | |||
| NINO (number to be assigned by IANA). | NINO (number to be assigned by IANA). | |||
| Length: | Length: | |||
| 8-bit unsigned integer. The length of the option (including the | 8-bit unsigned integer. The length of the option (including the | |||
| Type and Length fields) in units of 8 octets. | Type and Length fields) in units of 8 octets. | |||
| skipping to change at page 15, line 5 ¶ | skipping to change at page 15, line 5 ¶ | |||
| lollipop mechanism is used to wrap from 0xFFFF directly to 10. | lollipop mechanism is used to wrap from 0xFFFF directly to 10. | |||
| Prefix: | Prefix: | |||
| Variable-length field containing an IPv6 address or a prefix of an | Variable-length field containing an IPv6 address or a prefix of an | |||
| IPv6 address. The Prefix Length field contains the number of | IPv6 address. The Prefix Length field contains the number of | |||
| valid leading bits in the prefix. The bits in the prefix after | valid leading bits in the prefix. The bits in the prefix after | |||
| the prefix length (if any) are reserved and MUST be initialized to | the prefix length (if any) are reserved and MUST be initialized to | |||
| zero by the sender and ignored by the receiver. | zero by the sender and ignored by the receiver. | |||
| 6.2. NINO IPv4 option | ||||
| NINA is defined for both IPv4 and IPv6 address families. | ||||
| For IPv4, a new NINO IPv4 option is introduced to be included in RA | ||||
| and NA messages, for a node to advertise its IPv4 address on the | ||||
| interface where the ND message is issued. | ||||
| The NINO IPv4 option can be included in an RA by the sending router | ||||
| to expose its IPv4 address to the attached visitors, so they can | ||||
| install a default route via that address and use the sending router | ||||
| as default gateway. | ||||
| The option can also be included in a NA by a visiting node to expose | ||||
| its IPv4 address to the Attachment Router; this address is used as | ||||
| next hop by the AR as it installs routes via the visiting node | ||||
| towards the IPv4 prefixes contained in the NINOs and passed as mapped | ||||
| addresses in the NA message. | ||||
| 0 1 2 3 | ||||
| 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | Type | Length | Reserved | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| | IPv4 address on sending interface | | ||||
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ||||
| Type: | ||||
| NINO IPv4 (number to be assigned by IANA). | ||||
| Length: | ||||
| 8-bit unsigned integer. The length of the option (including the | ||||
| Type and Length fields) in units of 8 octets. | ||||
| Reserved: | ||||
| 8-bit unused field. It MUST be initialized to zero by the sender | ||||
| and MUST be ignored by the receiver. | ||||
| IPv4 address on sending interface: | ||||
| 32-bit field containing the IPv4 address of the sending interface. | ||||
| 7. Mobile Router Operation | 7. Mobile Router Operation | |||
| The Mobile Router operation is autonomous, based on the information | The Mobile Router operation is autonomous, based on the information | |||
| provided by the potential Access Routers in sight. Each MR selects | provided by the potential Access Routers in sight. Each MR selects | |||
| an AR (a MAR) in a loop-less and case-optimized fashion, and installs | an AR (a MAR) in a loop-less and case-optimized fashion, and installs | |||
| a default route up the tree via the selected AR. The resulting tree | a default route up the tree via the selected AR. The resulting tree | |||
| (the cluster) may never be globally stable enough to be mapped in a | (the cluster) may never be globally stable enough to be mapped in a | |||
| global graph. So the adaptation to local movements must be rapid and | global graph. So the adaptation to local movements must be rapid and | |||
| localized. | localized. | |||
| skipping to change at page 20, line 9 ¶ | skipping to change at page 21, line 9 ¶ | |||
| 3. A toon member is somewhere else in the Internet. | 3. A toon member is somewhere else in the Internet. | |||
| In all those cases, a node situated above the commander in the TD | In all those cases, a node situated above the commander in the TD | |||
| tree but not above the toon member will see the advertisements for | tree but not above the toon member will see the advertisements for | |||
| the aggregation owned by the commander but not that of the individual | the aggregation owned by the commander but not that of the individual | |||
| toon member prefix. So it will route all the packets for the toon | toon member prefix. So it will route all the packets for the toon | |||
| member towards the commander, but the commander will have no route to | member towards the commander, but the commander will have no route to | |||
| the toon and will fail to forward. | the toon and will fail to forward. | |||
| Section 8 'Mobile Home' of RFC 4887 [21] proposes a deployment model | Section 8 'Mobile Home' of RFC 4887 [20] proposes a deployment model | |||
| where a Mobile Router would also act as Home Agent for a mobile | where a Mobile Router would also act as Home Agent for a mobile | |||
| aggregation. This method can be used in the general case 3 to ensure | aggregation. This method can be used in the general case 3 to ensure | |||
| routability to the toon member. With that method, the Home Link for | routability to the toon member. With that method, the Home Link for | |||
| a toon member should be one of the commander links. The Tree | a toon member should be one of the commander links. The Tree | |||
| Discovery plug-in should favor that link so that many toon members | Discovery plug-in should favor that link so that many toon members | |||
| actually attach at Home. | actually attach at Home. | |||
| If a toon member is not at Home, then it will register to its Home | If a toon member is not at Home, then it will register to its Home | |||
| Agent using NEMO basic support (RFC 3963 [5]). Depending of the | Agent using NEMO basic support (RFC 3963 [5]). Depending of the | |||
| location of a source, a packet to the toon member will either go | location of a source, a packet to the toon member will either go | |||
| directly to it, or go to its commander. If the toon member as a | directly to it, or go to its commander. If the toon member as a | |||
| Mobile Router is registered to its commander as its Home Agent, the | Mobile Router is registered to its commander as its Home Agent, the | |||
| commander can always encapsulate the packet to the CoA of the toon | commander can always encapsulate the packet to the CoA of the toon | |||
| member using NEMO, and ensure reachability to the MR. | member using NEMO, and ensure reachability to the MR. | |||
| Section 2.7 of RFC 4888 [22] explains that in the specific case of | Section 2.7 of RFC 4888 [21] explains that in the specific case of | |||
| case 1), the commander will not be able to reach Home using plain | case 1), the commander will not be able to reach Home using plain | |||
| NEMO basic support, and an additional mechanism such as RRH ([18]) is | NEMO basic support, and an additional mechanism such as RRH ([17]) is | |||
| required to fix that issue. | required to fix that issue. | |||
| Also specifically in case 1), the toon member will refrain from | Also specifically in case 1), the toon member will refrain from | |||
| adding the NINO options for its own prefixes that are aggregated in | adding the NINO options for its own prefixes that are aggregated in | |||
| the NINO option of its commander that it propagates up the TD tree. | the NINO option of its commander that it propagates up the TD tree. | |||
| 7.6. Default value | 7.6. Default value | |||
| DEF_NA_LATENCY = 150 ms | DEF_NA_LATENCY = 150 ms | |||
| MAX_DESTROY_INTERVAL = 200ms | MAX_DESTROY_INTERVAL = 200ms | |||
| 8. Privacy Considerations | 8. Privacy Considerations | |||
| It is already possible for a visiting Mobile Node (Mobile Router) to | It is already possible for a visiting Mobile Node (Mobile Router) to | |||
| autoconfigure an address that will not identify the visitor [8], | autoconfigure an address that will not identify the visitor [22], | |||
| [23], [14]. It is also possible for a visitor to roll its CoA | [13]. It is also possible for a visitor to roll its CoA periodically | |||
| periodically even when it stays attached to a same point, and | even when it stays attached to a same point, and register the new | |||
| register the new addresses as it forms them. | addresses as it forms them. | |||
| CIA (Capability, Innocuousness and Anonymity) properties demand also | CIA (Capability, Innocuousness and Anonymity) properties demand also | |||
| that the visited party might not be identified by the visitor. To | that the visited party might not be identified by the visitor. To | |||
| achieve that, a Mobile Router should not advertise its MNPs on its | achieve that, a Mobile Router should not advertise its MNPs on its | |||
| links open to untrusted visitors. | links open to untrusted visitors. | |||
| This draft recommends that the interface that is open for untrusted | This draft recommends that the interface that is open for untrusted | |||
| visitors uses unique local addresses (RFC 4193 [9]) and rolls the | visitors uses unique local addresses (RFC 4193 [8]) and rolls the | |||
| advertised prefixes with a short lifetime. This can be achieved for | advertised prefixes with a short lifetime. This can be achieved for | |||
| instance by obtaining short lived leases from the Home Agent using | instance by obtaining short lived leases from the Home Agent using | |||
| DHCP-PD [24]. | DHCP-PD [23]. | |||
| Another possibility is to use strict RRH routing [18]; in that case, | Another possibility is to use strict RRH routing [17]; in that case, | |||
| the prefix that is presented on the link can be taken from anywhere | the prefix that is presented on the link can be taken from anywhere | |||
| in the ULA range since it is not used for routing outside the link. | in the ULA range since it is not used for routing outside the link. | |||
| Alternatively, a global unique prefix obtained from an autoconf | Alternatively, a global unique prefix obtained from an autoconf | |||
| solution [25], [26] or DHCPv6 prefix delegation [10] can be used as | solution [24], [25] or DHCPv6 prefix delegation [9] can be used as | |||
| well. | well. | |||
| 9. IANA Considerations | 9. IANA Considerations | |||
| This document requires IANA to assign a number for a new ND option | This document requires IANA to assign a number for a new ND option | |||
| type (NINO NA). | type (NINO NA). | |||
| 10. Security Considerations | 10. Security Considerations | |||
| Exposing the MRs' MNPs within the MFS introduces several security | Exposing the MRs' MNPs within the MFS introduces several security | |||
| threats that should be carefully tackled, mainly derived from the | threats that should be carefully tackled, mainly derived from the | |||
| fact that MRs are distributing prefixes (i.e., their MNPs) that are | fact that MRs are distributing prefixes (i.e., their MNPs) that are | |||
| not topologically correct within the MFS. | not topologically correct within the MFS. | |||
| To avoid these security issues -- that might enable malicious nodes | To avoid these security issues -- that might enable malicious nodes | |||
| to steal traffic addressed to other nodes (by spoofing their | to steal traffic addressed to other nodes (by spoofing their | |||
| prefixes) -- Mobile Routers should be provided with some security | prefixes) -- Mobile Routers should be provided with some security | |||
| mechanisms, ensuring that an MR that is advertising a certain MNP is | mechanisms, ensuring that an MR that is advertising a certain MNP is | |||
| actually authorised to do that. | actually authorized to do that. | |||
| The use of L2 trusts and policies, SeND or preconfigured security | The use of L2 trusts and policies, SeND or preconfigured security | |||
| relationships might help in securing the mechanism described in this | relationships might help in securing the mechanism described in this | |||
| draft. Additionally, if MRs have connectivity with their Home | draft. Additionally, if MRs have connectivity with their Home | |||
| Agents, a modified Return Routability mechanism -- extended to | Agents, a modified Return Routability mechanism -- extended to | |||
| support prefix checks (such as [27] or [28]) -- may be used to | support prefix checks (such as [26] or [27]) -- may be used to | |||
| provide the required authorisation, before starting to use the RO | provide the required authorization, before starting to use the RO | |||
| shortcut within the MFS. | shortcut within the MFS. | |||
| 11. Acknowledgments | 11. Acknowledgments | |||
| We would like to thank all the people who have provided comments on | We would like to thank all the people who have provided comments on | |||
| this draft, specially to Ben McCarthy for his very helpful review of | this draft, specially to Ben McCarthy for his very helpful review of | |||
| this document. | this document. | |||
| 12. References | 12. References | |||
| 12.1. Normative References | 12.1. Normative References | |||
| [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement | [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels", BCP 14, RFC 2119, March 1997. | Levels", BCP 14, RFC 2119, March 1997. | |||
| [2] Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery | [2] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, | |||
| for IP Version 6 (IPv6)", RFC 2461, December 1998. | "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, | |||
| September 2007. | ||||
| [3] Perkins, C., "IP Mobility Support for IPv4", RFC 3344, | [3] Perkins, C., "IP Mobility Support for IPv4", RFC 3344, | |||
| August 2002. | August 2002. | |||
| [4] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in | [4] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in | |||
| IPv6", RFC 3775, June 2004. | IPv6", RFC 3775, June 2004. | |||
| [5] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert, | [5] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert, | |||
| "Network Mobility (NEMO) Basic Support Protocol", RFC 3963, | "Network Mobility (NEMO) Basic Support Protocol", RFC 3963, | |||
| January 2005. | January 2005. | |||
| [6] Thubert, P., "Nested Nemo Tree Discovery", | [6] Thubert, P., "Nested Nemo Tree Discovery", | |||
| draft-thubert-tree-discovery-05 (work in progress), April 2007. | draft-thubert-tree-discovery-06 (work in progress), July 2007. | |||
| [7] Draves, R. and D. Thaler, "Default Router Preferences and More- | [7] Draves, R. and D. Thaler, "Default Router Preferences and More- | |||
| Specific Routes", RFC 4191, November 2005. | Specific Routes", RFC 4191, November 2005. | |||
| [8] Narten, T. and R. Draves, "Privacy Extensions for Stateless | [8] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast | |||
| Address Autoconfiguration in IPv6", RFC 3041, January 2001. | ||||
| [9] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast | ||||
| Addresses", RFC 4193, October 2005. | Addresses", RFC 4193, October 2005. | |||
| [10] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic Host | [9] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic Host | |||
| Configuration Protocol (DHCP) version 6", RFC 3633, | Configuration Protocol (DHCP) version 6", RFC 3633, | |||
| December 2003. | December 2003. | |||
| 12.2. Informative References | 12.2. Informative References | |||
| [11] Manner, J. and M. Kojo, "Mobility Related Terminology", | [10] Manner, J. and M. Kojo, "Mobility Related Terminology", | |||
| RFC 3753, June 2004. | RFC 3753, June 2004. | |||
| [12] Corson, M. and J. Macker, "Mobile Ad hoc Networking (MANET): | [11] Corson, M. and J. Macker, "Mobile Ad hoc Networking (MANET): | |||
| Routing Protocol Performance Issues and Evaluation | Routing Protocol Performance Issues and Evaluation | |||
| Considerations", RFC 2501, January 1999. | Considerations", RFC 2501, January 1999. | |||
| [13] Johnson, D., Hu, Y., and D. Maltz, "The Dynamic Source Routing | [12] Johnson, D., Hu, Y., and D. Maltz, "The Dynamic Source Routing | |||
| Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, | Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, | |||
| February 2007. | February 2007. | |||
| [14] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure | [13] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure | |||
| Neighbor Discovery (SEND)", RFC 3971, March 2005. | Neighbor Discovery (SEND)", RFC 3971, March 2005. | |||
| [15] Chakeres, I., "Mobile Ad hoc Network Architecture", | [14] Chakeres, I., Macker, J., and T. Clausen, "Mobile Ad hoc | |||
| draft-ietf-autoconf-manetarch-03 (work in progress), June 2007. | Network Architecture", draft-ietf-autoconf-manetarch-07 (work | |||
| in progress), November 2007. | ||||
| [16] Clausen, T., "The Optimized Link State Routing Protocol version | [15] Clausen, T., "The Optimized Link State Routing Protocol version | |||
| 2", draft-ietf-manet-olsrv2-03 (work in progress), March 2007. | 2", draft-ietf-manet-olsrv2-04 (work in progress), July 2007. | |||
| [17] Clausen, T., "MANET Neighborhood Discovery Protocol (NHDP)", | [16] Clausen, T., Dearlove, C., and J. Dean, "MANET Neighborhood | |||
| draft-ietf-manet-nhdp-04 (work in progress), June 2007. | Discovery Protocol (NHDP)", draft-ietf-manet-nhdp-05 (work in | |||
| progress), December 2007. | ||||
| [18] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and | [17] Thubert, P. and M. Molteni, "IPv6 Reverse Routing Header and | |||
| its application to Mobile Networks", | its application to Mobile Networks", | |||
| draft-thubert-nemo-reverse-routing-header-07 (work in | draft-thubert-nemo-reverse-routing-header-07 (work in | |||
| progress), February 2007. | progress), February 2007. | |||
| [19] Wakikawa, R., "MANEMO Problem Statement", | [18] Wakikawa, R., "Problem Statement and Requirements for MANEMO", | |||
| draft-wakikawa-manemo-problem-statement-00 (work in progress), | draft-wakikawa-manemo-problem-statement-01 (work in progress), | |||
| February 2007. | July 2007. | |||
| [20] Ernst, T. and H. Lach, "Network Mobility Support Terminology", | [19] Ernst, T. and H-Y. Lach, "Network Mobility Support | |||
| draft-ietf-nemo-terminology-06 (work in progress), | Terminology", RFC 4885, July 2007. | |||
| November 2006. | ||||
| [21] Thubert, P., "NEMO Home Network models", | [20] Thubert, P., Wakikawa, R., and V. Devarapalli, "Network | |||
| draft-ietf-nemo-home-network-models-06 (work in progress), | Mobility Home Network Models", RFC 4887, July 2007. | |||
| February 2006. | ||||
| [22] Ng, C., "Network Mobility Route Optimization Problem | [21] Ng, C., Thubert, P., Watari, M., and F. Zhao, "Network Mobility | |||
| Statement", draft-ietf-nemo-ro-problem-statement-03 (work in | Route Optimization Problem Statement", RFC 4888, July 2007. | |||
| progress), September 2006. | ||||
| [23] Narten, T., "Privacy Extensions for Stateless Address | [22] Narten, T., Draves, R., and S. Krishnan, "Privacy Extensions | |||
| Autoconfiguration in IPv6", draft-ietf-ipv6-privacy-addrs-v2-05 | for Stateless Address Autoconfiguration in IPv6", RFC 4941, | |||
| (work in progress), October 2006. | September 2007. | |||
| [24] Droms, R. and P. Thubert, "DHCPv6 Prefix Delegation for NEMO", | [23] Droms, R. and P. Thubert, "DHCPv6 Prefix Delegation for NEMO", | |||
| draft-droms-nemo-dhcpv6-pd-02 (work in progress), April 2005. | draft-droms-nemo-dhcpv6-pd-02 (work in progress), April 2005. | |||
| [25] Baccelli, E., "Address Autoconfiguration for MANET: Terminology | [24] Baccelli, E., Mase, K., Ruffino, S., and S. Singh, "Address | |||
| and Problem Statement", draft-ietf-autoconf-statement-00 (work | Autoconfiguration for MANET: Terminology and Problem | |||
| in progress), June 2007. | Statement", draft-ietf-autoconf-statement-03 (work in | |||
| progress), January 2008. | ||||
| [26] Bernardos, C. and M. Calderon, "Survey of IP address | [25] Bernardos, C., Calderon, M., and H. Moustafa, "Survey of IP | |||
| autoconfiguration mechanisms for MANETs", | address autoconfiguration mechanisms for MANETs", | |||
| draft-bernardos-manet-autoconf-survey-00 (work in progress), | draft-bernardos-manet-autoconf-survey-02 (work in progress), | |||
| July 2005. | October 2007. | |||
| [27] Ng, C., "Extending Return Routability Procedure for Network | [26] Ng, C., "Extending Return Routability Procedure for Network | |||
| Prefix (RRNP)", draft-ng-nemo-rrnp-00 (work in progress), | Prefix (RRNP)", draft-ng-nemo-rrnp-00 (work in progress), | |||
| October 2004. | October 2004. | |||
| [28] Bernardos, C., Soto, I., Maria, M., Fernando, F., and A. | [27] Bernardos, C., Soto, I., Maria, M., Fernando, F., and A. | |||
| Arturo, "VARON: Vehicular Ad hoc Route Optimisation for NEMO", | Arturo, "VARON: Vehicular Ad hoc Route Optimisation for NEMO", | |||
| Computer Communications, vol. 30, pp. 1765-1784 , 2007. | Computer Communications, vol. 30, pp. 1765-1784 , 2007. | |||
| Appendix A. Change Log | Appendix A. Change Log | |||
| Changes from -01 to -02: | ||||
| o NINA IPv4 support: added IPv4 NINO ND option. | ||||
| o References updated. | ||||
| o Updated the location of the 'L' bit in the NINO NA option, to | ||||
| match format of RFC 4861. | ||||
| Changes from -00 to -01: | Changes from -00 to -01: | |||
| o Basic kiss (MR to MR over egress) sections removed. | o Basic kiss (MR to MR over egress) sections removed. | |||
| o Added sections about aggregation of prefixes. | o Added sections about aggregation of prefixes. | |||
| o Added Privacy consideration section. | o Added Privacy consideration section. | |||
| o NINO NA message format changed. | o NINO NA message format changed. | |||
| skipping to change at page 31, line 7 ¶ | skipping to change at page 32, line 7 ¶ | |||
| Jean Lorchat | Jean Lorchat | |||
| Keio University and WIDE | Keio University and WIDE | |||
| 5322 Endo Fujisawa Kanagawa | 5322 Endo Fujisawa Kanagawa | |||
| 252-8520 | 252-8520 | |||
| JAPAN | JAPAN | |||
| Email: lorchat@sfc.wide.ad.jp | Email: lorchat@sfc.wide.ad.jp | |||
| Full Copyright Statement | Full Copyright Statement | |||
| Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2008). | |||
| This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
| contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
| retain all their rights. | retain all their rights. | |||
| This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND | |||
| THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS | |||
| OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | |||
| End of changes. 51 change blocks. | ||||
| 110 lines changed or deleted | 163 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||