Skip to main content

Problem Statement and Requirements for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing
draft-ietf-6lowpan-routing-requirements-10

Revision differences

Document history

Date Rev. By Action
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Stewart Bryant
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2012-03-19
10 (System) IANA Action state changed to No IC from RFC-Ed-Ack
2012-03-19
10 (System) IANA Action state changed to RFC-Ed-Ack
2012-03-16
10 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2012-03-16
10 Cindy Morgan State changed to Approved-announcement sent from IESG Evaluation::AD Followup
2012-03-16
10 Cindy Morgan IESG has approved the document
2012-03-16
10 Cindy Morgan Closed "Approve" ballot
2012-03-16
10 Cindy Morgan Ballot approval text was generated
2012-03-16
10 Cindy Morgan Ballot approval text was generated
2012-03-16
10 Cindy Morgan Ballot writeup was changed
2012-01-24
10 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss
2011-11-20
10 (System) New version available: draft-ietf-6lowpan-routing-requirements-10.txt
2011-04-21
10 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-04-04
10 Stewart Bryant [Ballot comment]
I have cleared
2011-04-04
10 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss
2011-03-26
10 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss
2011-03-26
10 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2011-03-07
10 Sean Turner
[Ballot discuss]
Updated based on -09.  I retained the numbering.

#5) Sec 5.4:  With regards to the 802.15.4 AES MAC based on AES.  The intro …
[Ballot discuss]
Updated based on -09.  I retained the numbering.

#5) Sec 5.4:  With regards to the 802.15.4 AES MAC based on AES.  The intro has:

Solutions may take into account
the specific features of IEEE 802.15.4 MAC layers.

but later it says:

Routing protocols need to define how this mechanism can be used to
obtain the intended security, either for the routing protocol
alone or in conjunction with the security used for the data.

The "may" and "need to" don't seem to line up.

Further, according to RFC 4919:

IEEE 802.15.4 mandates link-layer security based on AES

so why isn't this need to define /taking in to account a MUST?

In a nutshell it's not clear to me how the routing data is going to be secured.  MUST it be the IEEE mechanism, can it be something else that is WG defined, or can it be something already defined elsewhere in the IETF?

2011-02-07
09 (System) New version available: draft-ietf-6lowpan-routing-requirements-09.txt
2010-12-12
10 Adrian Farrel
[Ballot discuss]
I am updating my Discuss in step with the -08 revision of this document.

---

I have updated this Discuss to specifically catch …
[Ballot discuss]
I am updating my Discuss in step with the -08 revision of this document.

---

I have updated this Discuss to specifically catch the remaining items raised by Dimitri Papadimitriou in his Routing Area Directorate review. Thanks for resolving many of the points so far.

1. Does reliable routing mean "reliable communication of routing PDU
  exchange" clarification would be appreciated?

  -> NOK (the term still used in qualifying transmission and protocol
      messaging). This could be further clarified

2. Are all RFD and FFD expected to be part of the same routing domain?

  -> NOK. Doesn't seem to be addressed.

---

Expanding my Discuss issue to try to make it more clearly actionable...

I wrote:

> The Mesh Under description appears to suggest that there is a
> requirement to build a routing system for MAC addresses (i.e. not for
> IP addresses). If this is a requirement it has been far too deeply
> hidden in this document. It needs to be brought out and examined more
> because with one notable exception, the IETF does not normally work
> with routing for non-IP addresses.
>
> Do you really want this requirement to remain hidden, or is there a need
> to bring it to the attention of the IEEE?

To be clear:
I am not asking for the mesh-under requirement to be removed (it is in the WG charter and should be in this document). I *am* asking for the mesh-under requirement to be made more visible and apparent in the document, and I am asking that the requirement should be directed to a body that might consider working on the solution (since requirements are no value if they are hidden or implicit, and are unlikely to be acted on unless they are clearly indicated to the SDO responsible for solutions work).
2010-11-08
08 (System) New version available: draft-ietf-6lowpan-routing-requirements-08.txt
2010-09-29
10 Adrian Farrel
[Ballot comment]
I remain unhappy about the objective of this document within the IETF since it seems to be capturing requirements for routing in a …
[Ballot comment]
I remain unhappy about the objective of this document within the IETF since it seems to be capturing requirements for routing in a 6lowpan that form a subset of the requirements already documented and addressed by the ROLL working group. Nevertheless, since my gripes are mainly about process, I am taking them out of my Discuss so that the document can proceed. I would still be happy to have it clarified to me how this document fits in with the ROLL effort.
2010-09-29
10 Adrian Farrel
[Ballot discuss]
I am updating my Discuss in step with the -07 revision of this document.

---

I am holding a Discuss until the Dimitri …
[Ballot discuss]
I am updating my Discuss in step with the -07 revision of this document.

---

I am holding a Discuss until the Dimitri Papadimitriou indicates that the points raised in his Routing Area Directorate review have been resolved. The authors are in discussions with him.

---

The Mesh Under description appears to suggest that there is a
requirement to build a routing system for MAC addresses (i.e. not for
IP addresses). If this is a requirement it has been far too deeply
hidden in this document. It needs to be brought out and examined more
because with one notable exception, the IETF does not normally work
with routing for non-IP addresses.

Do you really want this requirement to remain hidden, or is there a need to bring it to the attention of the IEEE?
2010-08-05
10 Sean Turner
[Ballot discuss]
This is an updated discuss.  I retained the numbering.

#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to …
[Ballot discuss]
This is an updated discuss.  I retained the numbering.

#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to do at this time.

The charter indicates that the WG will develop:

  6. Produce "6LoWPAN Security Analysis" to define the threat model
    of 6LoWPANs, to document suitability of existing key management
    schemes and to discuss
    bootstrapping/installation/commissioning/setup issues. This
    document will be referenced from the "security considerations"
    of the other 6LoWPAN documents.  This document will be
    informational.

Shouldn't this document point to that document?  Is that document no longer going to be published?



#5) Sec 5.4:  With regards to the 802.15.4 AES MAC based on AES.  The intro has:

Solutions may take into account
the specific features of IEEE 802.15.4 MAC layers.

but later it says:

Routing protocols need to define how this mechanism can be used to
obtain the intended security, either for the routing protocol
alone or in conjunction with the security used for the data.

The "may" and "need to" don't seem to line up.

Further, according to RFC 4919:

IEEE 802.15.4 mandates link-layer security based on AES

so why isn't this need to define /taking in to account a MUST?

In a nutshell it's not clear to me how the routing data is going to be secured.  MUST it be the IEEE mechanism, can it be something else that is WG defined, or can it be something already defined elsewhere in the IETF?

2010-08-04
10 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-08-04
07 (System) New version available: draft-ietf-6lowpan-routing-requirements-07.txt
2010-05-21
10 (System) Removed from agenda for telechat - 2010-05-20
2010-05-20
10 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-05-20
10 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2010-05-20
10 Dan Romascanu
[Ballot discuss]
1. I support the part of Adrian's DISCUSS concerning the need to coordinate and have this document reviewed by the ROLL WG. I …
[Ballot discuss]
1. I support the part of Adrian's DISCUSS concerning the need to coordinate and have this document reviewed by the ROLL WG. I note that the WG charter explicitly mentions working closely with ROLL.

2. I cannot see in the document any requirement related to the management of the nodes implementing 6lowpan routing. The charter talks about 'define the necessary security and management protocols and constructs for building 6LoWPAN networks- - is this covered in another document, or should it be covered here?
2010-05-20
10 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2010-05-20
10 Stewart Bryant
[Ballot discuss]
I agree with Adrian's DISCUSS.

I am particularly concerned with

"Here, 'Routing' is not equivalent to IP routing, but includes the functionalities of …
[Ballot discuss]
I agree with Adrian's DISCUSS.

I am particularly concerned with

"Here, 'Routing' is not equivalent to IP routing, but includes the functionalities of path computation and forwarding under the IP layer."

In the IETF "Routing" has a well known meaning, and if this document proposes something else, it needs a new term.
2010-05-20
10 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded by Stewart Bryant
2010-05-20
10 Tim Polk [Ballot comment]
Is there an example of a power affluent node that is *not* mains-powered?  And does this have
any impact on the routing requirements?
2010-05-20
10 Tim Polk
[Ballot discuss]
(1) This document seems to assume that a LoWPAN will be either Route Over or Mesh Under in its
entirety.  This is not …
[Ballot discuss]
(1) This document seems to assume that a LoWPAN will be either Route Over or Mesh Under in its
entirety.  This is not an obvious result.  I would expect that a Mesh Under could live transparently
within a Route Over LoWPAN.  (Essentially, the ER in the Mesh Under LoWPAN from Figure 3
would be LoWPAN router in the Figure 2 Route Over network.)  If this scenario is realistic, the document should address any routing requirements that would be introduced (or note that no new requirements are established by the hybrid scenario.  [Note: it is not as clear to me whether a Route Over in a Mesh Under makes sense.]

(2) The term "node" seems to be used inconsistently within this document, and with respect to IEEE
802.15.4 and 6lowpan-nd.  For example, in figure 2 all components of a Route Over network are
labeled as edge routers, LoWPAN routers, or LoWPAN hosts.  Figure 3 labels several components
in a mesh under network as "mesh nodes", and the remaining components are Edge routers or
LoWPAN hosts.  The text that follows (last paragraph in 3.1) opens with a discussion of communication between nodes in different LoWPANs -shouldn't this include communication
between LoWPAN hosts?  The next sentence talks about nodes performing IP routing in the
Route Over case, but Figure 2 doesn't have "nodes". 

Note: I considered making this a comment, since it is editorial, but being consistent with these
terms is essential to understanding the document!

(3) The text in Figure 1 and section 3.2 is inconsistent.  (Figure 1 "shows the place of 6LoWPAN
routing in the entire network stack.")

From 3.2:
  In the simplest case for a Mesh Under where layer two forwarding can
  be performed without piggy-backing routing protocol information, the
  mesh-header defined in RFC 4944 [RFC4944] is sufficient, see
  Figure 5.

This implies that the 6LoWPAN routing could occur in the IEEE 802.15.4 MAC layer.  I realize
that ascii art has its limitations, but if that is correct a note in the accompanying text in section 3
would be helpful.
2010-05-20
10 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-05-20
10 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-05-20
10 Adrian Farrel
[Ballot discuss]
I have some significant concerns about this document. These cover
both process and techncial content.

---

These requirements have arrived very late in …
[Ballot discuss]
I have some significant concerns about this document. These cover
both process and techncial content.

---

These requirements have arrived very late in the cycle. The ROLL
working group has written four requirements documents (3 RFCs and
one on the RFC Editor Queue), and the RPL specification is nearing
completion. In fact, some of the rquirements in this document
actually reference the requirements published by the ROLL WG.

It is unclear how these requirements should be applied and whether
they are a subset of the rquirements already captured by the ROLL
working group or different in some way.

If the requirements have all been captured already, I suggest that
this document should become Historic. If the reuirements are "new"
to the work done by ROLL, then please see the next point.

---

The proto write-up says...

  On a [One?] single person, JP Vasseur, has indicated discontent
  with the document.  He seems to feel the document is unnecessary
  because, in his opinion, it overlaps with the ROLL WG work.  This
  document, though, is specific to 6lowpan and references the
  documents of ROLL.  ROLLs work is not specific to 6lowpan
  networks.

I note that the person expressing the concern is one of the co-chairs
of the ROLL working group.

The Abstract says...

  The purpose of this
  document is not to recommend specific solutions, but to provide
  general, layer-agnostic guidelines about the design of 6LoWPAN
  routing, which can lead to further analysis and protocol design.
  This document is intended as input to groups working on routing
  protocols relevant to 6LoWPAN, such as the IETF ROLL WG.

It is clear, therefore that, in the opinion of the 6lowpan working
gorup, this document does overlap with the work of the ROLL working
group.

The proto write-up does not show any signs of the document having
been discussed with the ROLL working group or within the Routing
Area more widely. I don't see any mention of the document on the                             
ROLL working group mailing list.

I find this expression that the ROLL working group is an intended
consumer of this document very strange when combined with the
disregard of the that working group's view of the document.

Furthermore, the 6lowpan charter says...

  6lowpan will work closely with the Routing Over Low power and
  Lossy networks (roll) working group which is developing IPv6
  routing solutions for low power and lossy networks (LLNs).

I do not see any demonstration of close working.

What actions have been taken to ensure that the content of this
document are understood by the ROLL working group and that the
details are relevant to the people developing routing protocol
solutions?

---

Section 1 (and again, Section 4) refers to a requirement for
"data-aware routing" without giving any description of this term.

The term is sometimes used to refer to the concept of routing packets
according to the data content of those packets. This is not consistent
with IP routing paradigms and would need to be brought out for full
discussion.

Potentially you mean something else by this term in which case you
really do need to define the term.

---

Section 3.2

It is not appropriate for an Informational requirements document to
take a position on which solutions my be adequate or to give PDU
specifications.

---

The document would have benefitted significantly from review in the
Routing Area. The Routing ADs asked Dimitri Papadimitriou to review
the document on behalf of the Routing Area Directorate. His comments
will be sent to the document authors under separate cover. Many of
his comments are very significant, and all would seriously improve
the document.

Please address the comments and update the document accordingly.

---

Requirement 8 says

  [R08] 6LoWPAN routing protocols SHOULD be reliable despite
  unresponsive nodes due to periodic hibernation.                                     

This needs to be clarified. What is "protocol reliability". Do you mean
that the protocol should exchange packets reliably, that the protocol
should be able to reliably find a path, or that the path found should
be reliabel?

---

Requirement 11 says

  [R11] The procedure of route repair and related control messages
  should not harm overall energy consumption from the routing
  protocols.

Why don't you use "SHOULD NOT"?

---

The Mesh Under description appears to suggest that there is a
requirement to build a routing system for MAC addresses (i.e. not for
IP addresses). If this is a requirement it has been far too deeply
hidden in this document. It needs to be brought out and examined more
because with one notable exception, the IETF does not normally work
with routing for non-IP addresses.

---

Requirement 17

  [R17] In case there are one or more nodes allocated for the specific
  role of local management, such a management node MAY take the role of
  keeping track of nodes within the area of the LoWPAN it takes
  responsibility for.

Is this a requirement on the routing protocol? It doesn't appear to be.

---

Requirement 18

  [R18] If the routing protocol functionality includes enabling IP
  multicast, then it may want to employ structure in the network for
  efficient distribution [I-D.ietf-manet-smf], such as Connected
  Dominating Sets (CDS), Multi-Point Relays (MPR), or relay points
  sending point-to-multipoint messages in unicast messages instead of
  using link-layer multicast (broadcast).

Do you mean "MAY".

"may want to" seems like a very flimsy "requirement." Actually, the
paragraph looks like a solution in search of a requirement. Can you
turn this into a potential requirement, and leave the solution for
the solution documents?

---

Section 6 needs to make more clarity by separating the requirements
for security of the routing protocol, and the requirements of security
for end-to-end data that can be assisted by the routing protocol.
2010-05-20
10 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-05-20
10 Tim Polk [Ballot comment]
2010-05-20
10 Tim Polk
[Ballot comment]
Please review the secdir review in its totality.  I realize this came in late, but I think there
are a number of comments …
[Ballot comment]
Please review the secdir review in its totality.  I realize this came in late, but I think there
are a number of comments that would improve the document.  The review is available at:

  http://www.ietf.org/mail-archive/web/secdir/current/msg01701.html
2010-05-20
10 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-05-20
10 Lars Eggert
[Ballot comment]
I have a few questions:

Section 4., paragraph 15:
>        *  Classes of Service:
>          For …
[Ballot comment]
I have a few questions:

Section 4., paragraph 15:
>        *  Classes of Service:
>          For mixing applications of different criticality on one
>          LoWPAN, support of multiple classes of service may be required
>          in resource-constrained LoWPANs and may require a certain
>          degree of routing protocol overhead.

  I'm not sure I see why. QoS support typically involves end-to-end
  transport functions and more complex *queueing*, but not routing
  *protocol* overheads. Could you explain?


Section 4., paragraph 17:
>    b.  Node Parameters:

  Isn't queuing strategy and queue buffer size also a parameter?


Section 4., paragraph 21:
>        *  Traffic Pattern:
>          This parameter affects routing since highly loaded nodes
>          (either because they are the source of packets to be
>          transmitted or due to forwarding) may contribute to higher
>          delivery delays and may consume more energy than lightly
>          loaded nodes.  This applies to both data packets and routing
>          control messages.

  Again, I'm not sure I understand. Why does the volume of application
  data sent or received by some nodes affect the routing *protocol*?
2010-05-20
10 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-05-19
10 Ralph Droms State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ralph Droms
2010-05-18
10 Sean Turner
[Ballot discuss]
#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to do at this time.

The charter indicates that the …
[Ballot discuss]
#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to do at this time.

The charter indicates that the WG will develop:

  6. Produce "6LoWPAN Security Analysis" to define the threat model
    of 6LoWPANs, to document suitability of existing key management
    schemes and to discuss
    bootstrapping/installation/commissioning/setup issues. This
    document will be referenced from the "security considerations"
    of the other 6LoWPAN documents.  This document will be
    informational.

Shouldn't this document point to that document?  Is that document no longer going to be published?

#2) The Security Considerations point to RFC 4944 and that includes the [KW03] reference for attacks and counter measures for sensor networks.  Do these line up with the threats defined in RFC 4593?  Did the WG consider RFC 4593?  I don't have a copy of the [KW03] reference so it's hard for me to tell.

#3) Sec 5.4: What do you mean by secure delivery/transmission?  Does secure delivery/transmission encompass origin authentication, integrity, and confidentiality or some subset?  RFC 4919 only refers to confidentiality and integrity.  I think you should be explicit about what "secure delivery" means.

#4) Sec 5.4: Why isn't a MUST support secure delivery?  To me, SHOULD means the protocol might not support the option of secure delivery/transport.  That is a bad thing in my book.  If you make it MUST support then it's built-in when you need it.

#5) Sec 5.4:  With regards to the 802.15.4 AES MAC based on AES.  The intro has:

Solutions may take into account
the specific features of IEEE 802.15.4 MAC layers.

but later it says:

Routing protocols need to define how this mechanism can be used to
obtain the intended security, either for the routing protocol
alone or in conjunction with the security used for the data.

The "may" and "need to" don't seem to line up.

Further, according to RFC 4919:

IEEE 802.15.4 mandates link-layer security based on AES

so why isn't this need to define /taking in to account a MUST?

In a nutshell it's not clear to me how the routing data is going to be secured.  MUST it be the IEEE mechanism, can it be something else that is WG defined, or can it be something already defined elsewhere in the IETF?

In [R14],  I think you should delete the 2nd sentence from the requirements statement.

#6) Sec 5.4: In the security threats paragraph, it says:

  Neighbor Discovery in IEEE 802.15.4 links may be susceptible to
  threats as listed in RFC3756 [RFC3756].

Are they or aren't they?  If they are, then which ones apply?

#7) Sec 5.4: In the security threats paragraph, it says:

  Bootstrapping may also impose additional threats.

What are these threats?  How are they mitigated?

#8) The following is in Section 5.4:

  While there are applications which require very high security,
  such as in traffic control, other applications are less easily
  harmed by wrong node behavior, such as a home entertainment system.

I'd disagree with this statement.  Say an emergency broadcast system is in effect and it's supposed to telling me via my TV to duck and cover and it's not.  My point is I'm not sure you need this sentence.

#9) Sec 6: I think the first sentence is a little off.  Neither 4919 or 4944 have  a section 4.4 that talks about security considerations.  Did you mean:

OLD:

Security issues are described in Section 4.4 of the security considerations of RFC 4919 [RFC4919] and RFC 4944 [RFC4944] apply as well.

NEW:

Security issues are described in Section 5.4.  The security considerations in RFC 4919 [RFC4919] and RFC 4944 [RFC4944] apply as well.
2010-05-18
10 Sean Turner [Ballot comment]
2010-05-18
10 Sean Turner
[Ballot discuss]
#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to do at this time.

The charter indicates that the …
[Ballot discuss]
#1) This is a DISCUSS-DISCUSS.  To be clear there's nothing for the authors to do at this time.

The charter indicates that the WG will develop:

  6. Produce "6LoWPAN Security Analysis" to define the threat model
    of 6LoWPANs, to document suitability of existing key management
    schemes and to discuss
    bootstrapping/installation/commissioning/setup issues. This
    document will be referenced from the "security considerations"
    of the other 6LoWPAN documents.  This document will be
    informational.

Shouldn't this document point to that document?  Is that document no longer going to be published?

#2) The Security Considerations point to RFC 4944 and that includes the [KW03] reference for attacks and counter measures for sensor networks.  Do these line up with the threats defined in RFC 4593?  Did the WG consider RFC 4593?  I don't have a copy of the [KW03] reference so it's hard for me to tell.

#3) Sec 5.4: What do you mean by secure delivery/transmission?  Does secure delivery/transmission encompass origin authentication, integrity, and confidentiality or some subset?  RFC 4919 only refers to confidentiality and integrity.  I think you should be explicit about what "secure delivery" means.

#4) Sec 5.4: Why isn't a MUST support secure delivery?  To me, SHOULD means the protocol might not support the option of secure delivery/transport.  That is a bad thing in my book.  If you make it MUST support then it's built-in when you need it.

#5) Sec 5.4:  With regards to the 802.15.4 AES MAC based on AES.  The intro has:

Solutions may take into account
the specific features of IEEE 802.15.4 MAC layers.

but later it says:

Routing protocols need to define how this mechanism can be used to
obtain the intended security, either for the routing protocol
alone or in conjunction with the security used for the data.

The "may" and "need to" don't seem to line up.

Further, according to RFC 4919:

IEEE 802.15.4 mandates link-layer security based on AES

so why isn't this need to define /taking in to account a MUST?

In a nutshell it's not clear to me how the routing data is going to be secured.  MUST it be the IEEE mechanism, can it be something else that is WG defined, or can it be something already defined elsewhere in the IETF?

In [R14],  I think you should delete the 2nd sentence from the requirements statement.

#6) Sec 5.4: In the security threats paragraph, it says:

  Neighbor Discovery in IEEE 802.15.4 links may be susceptible to
  threats as listed in RFC3756 [RFC3756].

Are they or aren't they?  If they are, then which ones apply?

#7) Sec 5.4: In the security threats paragraph, it says:

  Bootstrapping may also impose additional threats.

What are these threats?  How are they mitigated?

#8) The following is in Section 5.4:

  While there are applications which require very high security,
  such as in traffic control, other applications are less easily
  harmed by wrong node behavior, such as a home entertainment system.

I'd disagree with this statement.  Say an emergency broadcast system is in effect and it's supposed to telling me via my TV to duck and cover and it's not.  My point is I'm not sure you need this sentence.

#9) RFC 4919

#8) Sec 6: I think the first sentence is a little off.  Neither 4919 or 4944 have  a section 4.4 that talks about security considerations.  Did you mean:

OLD:

Security issues are described in Section 4.4 of the security considerations of RFC 4919 [RFC4919] and RFC 4944 [RFC4944] apply as well.

NEW:

Security issues are described in Section 5.4.  The security considerations in RFC 4919 [RFC4919] and RFC 4944 [RFC4944] apply as well.
2010-05-18
10 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to Discuss from No Objection by Sean Turner
2010-05-18
10 Sean Turner
[Ballot comment]
I am debating whether to make this a DISCUSS:

Should this document discuss ways to mitigate the threats in RFC 4593 (Generic Threats …
[Ballot comment]
I am debating whether to make this a DISCUSS:

Should this document discuss ways to mitigate the threats in RFC 4593 (Generic Threats to Routing Protocols)?
2010-05-18
10 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner
2010-05-16
10 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-05-13
10 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-05-03
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Glen Zorn
2010-05-03
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Glen Zorn
2010-04-30
10 Ralph Droms Placed on agenda for telechat - 2010-05-20 by Ralph Droms
2010-04-29
10 Amanda Baber IANA comments:

As described in the IANA Considerations section, we understand this
document to have NO IANA Actions.
2010-04-29
10 Amy Vezza Last call sent
2010-04-29
10 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-04-29
10 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2010-04-29
10 Ralph Droms Ballot has been issued by Ralph Droms
2010-04-29
10 Ralph Droms Created "Approve" ballot
2010-04-29
10 Ralph Droms State Changes to Last Call Requested from AD Evaluation by Ralph Droms
2010-04-29
10 Ralph Droms Last Call was requested by Ralph Droms
2010-04-29
10 (System) Ballot writeup text was added
2010-04-29
10 (System) Last call text was added
2010-04-29
10 (System) Ballot approval text was added
2010-04-29
10 Ralph Droms State Changes to AD Evaluation from Publication Requested by Ralph Droms
2010-04-29
10 Ralph Droms [Note]: 'Geoff Mulligan (geoff@proto6.com) is the document shepherd.' added by Ralph Droms
2010-04-13
10 Amy Vezza
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

Geoff Mulligan is the document shepherd.  I have personally reviewed the
document and believe it is ready for publication as an Informational RFC.


  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed? 

The document has undergone a thorough review by the 6lowpan WG
and I don't have concerns about the breadth of review.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

I don't think the document needs broader review.


  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

I'm not uncomfortable with any part of this document and I don't
have any specific concerns.  There has been no IPR disclosures
related to this document.  We have actually done several WGLC's
and the WG has reached consensus on this document.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it? 

There is strong consensus within the 6lowpan WG to publish this document.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

On a single person, JP Vasseur, has indicated discontent with the
document.  He seems to feel the document is unnecessary because,
in his opinion, it overlaps with the ROLL WG work.  This
document, though, is specific to 6lowpan and references the
documents of ROLL.  ROLLs work is not specific to 6lowpan networks.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

Just a nit about the date and the trust provision.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

Yes the has split normative and informative references.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The section exists.  There are no IANA actions.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

Not applicable

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

    Technical Summary

This document provides the problem statement and design space for
6LoWPAN routing.  It defines the routing requirements for 6LoWPAN
networks, considering the low-power and other particular
characteristics of the devices and links.  The purpose of this
document is not to recommend specific solutions, but to provide
general, layer-agnostic guidelines about the design of 6LoWPAN
routing, which can lead to further analysis and protocol design.

    Working Group Summary
        Was there anything in WG process that is worth noting? For
        example, was there controversy about particular points or
        were there decisions where the consensus was particularly
        rough?

This document completed WGLC.

    Document Quality

This document was well reviewed by the 6lowpan WG.
2010-04-13
10 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2010-04-13
10 Amy Vezza [Note]: 'Geoff Mulligan (geoff@proto6.com) is the document shepherd.' added by Amy Vezza
2010-03-08
06 (System) New version available: draft-ietf-6lowpan-routing-requirements-06.txt
2010-02-22
05 (System) New version available: draft-ietf-6lowpan-routing-requirements-05.txt
2010-01-29
10 (System) Document has expired
2009-07-28
04 (System) New version available: draft-ietf-6lowpan-routing-requirements-04.txt
2009-07-13
03 (System) New version available: draft-ietf-6lowpan-routing-requirements-03.txt
2009-03-25
02 (System) New version available: draft-ietf-6lowpan-routing-requirements-02.txt
2009-03-09
01 (System) New version available: draft-ietf-6lowpan-routing-requirements-01.txt
2008-11-19
00 (System) New version available: draft-ietf-6lowpan-routing-requirements-00.txt