An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL)
draft-ietf-6man-rpl-routing-header-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the Yes position for Jari Arkko |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Ralph Droms |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Stephen Farrell |
2012-01-12
|
07 | Jean Mahoney | Request for Telechat review by GENART Completed. Reviewer: Miguel Garcia. |
2012-01-12
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Miguel Garcia |
2012-01-12
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Miguel Garcia |
2012-01-10
|
07 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2012-01-10
|
07 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2012-01-10
|
07 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2011-12-21
|
07 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-12-20
|
07 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-12-20
|
07 | (System) | IANA Action state changed to In Progress |
2011-12-20
|
07 | Amy Vezza | IESG state changed to Approved-announcement sent |
2011-12-20
|
07 | Amy Vezza | IESG has approved the document |
2011-12-20
|
07 | Amy Vezza | Closed "Approve" ballot |
2011-12-20
|
07 | Amy Vezza | Approval announcement text regenerated |
2011-12-20
|
07 | Amy Vezza | Ballot writeup text changed |
2011-12-20
|
07 | Jari Arkko | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup. |
2011-12-18
|
07 | Ralph Droms | [Ballot comment] Comment added on 11/30. The working group summary is pretty terse. I think it would be helpful to explain that the design and … [Ballot comment] Comment added on 11/30. The working group summary is pretty terse. I think it would be helpful to explain that the design and use of the option morphed several times during the working group discussion before it arrived at its current state. Also, the working group summary should refer to the roll (not RPL) working group. Comment added on 12/18. In the second paragraph, section 4.1, is RFC 2119 language needed in this sentence? In the case that the source route is longer than the original datagram's IPv6 Hop Limit, only the initial hops (determined by the original datagram's IPv6 Hop Limit) should be included in the SRH. |
2011-12-18
|
07 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss |
2011-12-15
|
07 | (System) | New version available: draft-ietf-6man-rpl-routing-header-07.txt |
2011-12-15
|
07 | Cindy Morgan | Removed from agenda for telechat |
2011-12-15
|
07 | Ralph Droms | [Ballot discuss] Edited on 12/16/2011 1. I think there is an inadvertent omission of some text. From section 4.2: When forwarding an IPv6 datagram … [Ballot discuss] Edited on 12/16/2011 1. I think there is an inadvertent omission of some text. From section 4.2: When forwarding an IPv6 datagram that contains a SRH with a non-zero Segments Left value, if the IPv6 Destination Address is not on-link, a router SHOULD send an ICMP Destination Unreachable (ICMPv6 Type 1) message with ICMPv6 Code set to (TBD by IANA) to the packet's Source Address. There should also be text explicitly requiring that the router drops the datagram. 2. Cleared, based on first paragraph of section 4.1 and integration of (former) section 5 into section 4. 3. (Added regarding new text in rev -06) I understand the purpose of the new text. I think clarification is needed: * in the case the source route is longer than the Hop Limit in the original datagram, only the initial hops (determined by the Hop Limit) should be include in the SRH. I think an implementor would likely infer the correct behavior but clarification would be good * the references to Hop Limit should indicate if it's the Hop Limit in the original datagram or the Hop Limit in the tunnel header |
2011-12-14
|
07 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss |
2011-12-14
|
07 | Jari Arkko | Placed on agenda for telechat - 2011-12-15 |
2011-12-14
|
07 | Jari Arkko | Ballot writeup text changed |
2011-12-14
|
07 | Stephen Farrell | [Ballot discuss] Same discuss point as for the other RPL doc. Should have the same solution as well. What countermeasures exist for the attacks listed … [Ballot discuss] Same discuss point as for the other RPL doc. Should have the same solution as well. What countermeasures exist for the attacks listed in section 6? I guess at least some hop-by-hop authentication and integrity would provide some accountability and prevent some spoofs. Doesn't RPL have some such mechanism that can be used? If so, then wouldn't it be right to RECOMMEND support for that and maybe even use of that? |
2011-12-14
|
07 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2011-12-14
|
07 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2011-12-14
|
07 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-12-14
|
06 | (System) | New version available: draft-ietf-6man-rpl-routing-header-06.txt |
2011-12-01
|
07 | Cindy Morgan | Removed from agenda for telechat |
2011-12-01
|
07 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-12-01
|
07 | Jari Arkko | [Ballot discuss] Holding a discuss for IANA: IESG: IANA has questions about draft-ietf-6man-rpl-routing-header-04.txt: The IANA Considerations section asks us to register the following: 1) … [Ballot discuss] Holding a discuss for IANA: IESG: IANA has questions about draft-ietf-6man-rpl-routing-header-04.txt: The IANA Considerations section asks us to register the following: 1) a Routing Type at http://www.iana.org/assignments/ipv6-parameters 2) a code under "Destination Unreachable" in the ICMPv6 "Code" Fields registry at http://www.iana.org/assignments/icmpv6-parameters However, it does not tell us how to fill in the description field for these registrations. We could guess that the description for the latter might be "the router cannot satisfy the strict source-route requirement," but the document isn't clear. Please add the precise text you want us to use in the registry for both registrations. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thanks, Amanda Baber IANA |
2011-12-01
|
07 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Discuss from Yes |
2011-12-01
|
07 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-30
|
07 | Ralph Droms | [Ballot comment] Comment added on 11/30. The working group summary is pretty terse. I think it would be helpful to explain that the design and … [Ballot comment] Comment added on 11/30. The working group summary is pretty terse. I think it would be helpful to explain that the design and use of the option morphed several times during the working group discussion before it arrived at its current state. Also, the working group summary should refer to the roll (not RPL) working group. |
2011-11-30
|
07 | Ralph Droms | [Ballot comment] Comment added on 11/30. The |
2011-11-30
|
07 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-30
|
07 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-30
|
07 | Sean Turner | [Ballot discuss] I'm stepping right out of my knowledge box so I might get back in it quite quickly: I find it interesting that you've … [Ballot discuss] I'm stepping right out of my knowledge box so I might get back in it quite quickly: I find it interesting that you've modeled SRH on SSSR: The function of SRH is intended to be very similar to IPv4's Strict Source and Record Route option [RFC0791]. but RFC 6274 says this about the SSSR option: As with the LSRR, while the SSSR option may be of help in debugging some network problems, its security implications outweigh any legitimate use of it. Some of the security implications are as follows: Among other things, the option can be used to: o Bypass firewall rules o Reach otherwise unreachable Internet systems o Establish TCP connections in a stealthy way o Learn about the topology of a network o Perform bandwidth-exhaustion attacks I guess the ship may have sailed but I'm curious why one thinks is not worth using but this is modeling behavior after it. Are these issues introduced now as well? |
2011-11-30
|
07 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-30
|
07 | Sean Turner | [Ballot discuss] I'm stepping right out of my knowledge box so I might get back in it quite quickly: I find it interesting that you've … [Ballot discuss] I'm stepping right out of my knowledge box so I might get back in it quite quickly: I find it interesting that you've modeled SRH on SSSR: The function of SRH is intended to be very similar to IPv4's Strict Source and Record Route option [RFC0791]. but RFC 6274 says this about the SSSR option: As with the LSRR, while the SSSR option may be of help in debugging some network problems, its security implications outweigh any legitimate use of it. I guess the ship may have sailed but I'm curious why one thinks is not worth using but this is modeling behavior after it. |
2011-11-30
|
07 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded |
2011-11-30
|
07 | Adrian Farrel | [Ballot comment] I have no objection to the publication of this document, but I have a number of small editorial questions/comments that I hope you … [Ballot comment] I have no objection to the publication of this document, but I have a number of small editorial questions/comments that I hope you will address along the way. Section 2 First, RPL routers implement a strict source route policy where each and every IPv6 hop is specified within the SRH. appears to be in conflict with 2. If the SRH only specifies a subset of the path from source to destination, the router uses IPv6-in-IPv6 tunneling [RFC2473] This probably just needs clarifying text in the paragraph. There is explanation of when the situation occurs (after the numbered list). --- Section 3 Next Header Shouldn't your base reference be RFC 2460? If IPv6 was to choose to diverge from IPv4, which one would you follow? --- Section 3 Routing Type You do not mention the use to which this field is put anywhere in your document. It should probably go here. --- Section 3 Reserved You have not said how the Reserved field is handled. --- It would have been useful to state (section 4.1?) how "segments left" is set on the initial SRH and whether the first entry in the address list includes the source node. --- Section 4.2 else if 2 or more entries in Address[1..n] are assigned to local interface and are separated by at least one address not assigned to local interface { This check is more specific than the text previously indicated. This is the first mention of non-adjacent repeat addressing. --- Section 4.2 swap the IPv6 Destination Address and Address[i] Do you really mean swap? Or do you just want to set DstA = Address[i] ? --- Section 4.2 I'm surprised that you check and decrement the hop limit so late in the cycle. |
2011-11-30
|
07 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-29
|
07 | Ralph Droms | [Ballot discuss] I have two Discuss issue that should be easy to resolve. 1. I think there is an inadvertent omission of some text. From … [Ballot discuss] I have two Discuss issue that should be easy to resolve. 1. I think there is an inadvertent omission of some text. From section 4.2: When forwarding an IPv6 datagram that contains a SRH with a non-zero Segments Left value, if the IPv6 Destination Address is not on-link, a router SHOULD send an ICMP Destination Unreachable (ICMPv6 Type 1) message with ICMPv6 Code set to (TBD by IANA) to the packet's Source Address. There should also be text explicitly requiring that the router drops the datagram. 2. This issue requires a little clarification before I can provide an actionable Discuss issue. Is it possible to deploy RPL in a network in which not all of the nodes in the network participate in RPL? E.g., can there be "leaf" nodes, the equivalent of hosts, that do not participate in RLL and that exchange datagrams with immediate neighbors that are RPL routers? If so, I think there needs to be additional text similar to that in section 5 describing how a RPL router must ensure that it doesn't forward a datagram containing an SRH to a non-RPL leaf node. |
2011-11-29
|
07 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded |
2011-11-29
|
07 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-29
|
07 | Robert Sparks | [Ballot comment] Please double-check the first paragraph of section 4 to make sure that "ICMPv6 errors generated by inserting the RPL option" is really what … [Ballot comment] Please double-check the first paragraph of section 4 to make sure that "ICMPv6 errors generated by inserting the RPL option" is really what you mean to say - are you talking about errors that resulted from inserting the option itself, or possibly other ICMP errors that might result from other data in the tunnel header? |
2011-11-29
|
07 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-28
|
07 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-28
|
07 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-28
|
07 | Stephen Farrell | [Ballot comment] - how are RPL routers supposed to know which of them are border routers at what point in time? Doesn't needing to know … [Ballot comment] - how are RPL routers supposed to know which of them are border routers at what point in time? Doesn't needing to know this further constrain the applicability of this scheme? - is it allowed for a RPL router to just drop an SRH and replace it with an entirely new SRH? - s1, "necessary mechanisms" is a bit odd, be better to name them if they're known/agreed already. - 6.1 seems to imply that all the attacks listed can be mounted from within the LLN. Truth in advertising would call for saying that explicitly. |
2011-11-28
|
07 | Stephen Farrell | [Ballot discuss] Same discuss point as for the other RPL doc. Should have the same solution as well. What countermeasures exist for the attacks listed … [Ballot discuss] Same discuss point as for the other RPL doc. Should have the same solution as well. What countermeasures exist for the attacks listed in section 6? I guess at least some hop-by-hop authentication and integrity would provide some accountability and prevent some spoofs. Doesn't RPL have some such mechanism that can be used? If so, then wouldn't it be right to RECOMMEND support for that and maybe even use of that? |
2011-11-28
|
07 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to Discuss from No Objection |
2011-11-27
|
07 | Stephen Farrell | [Ballot comment] - how are RPL routers supposed to know which of them are border routers at what point in time? Doesn't needing to know … [Ballot comment] - how are RPL routers supposed to know which of them are border routers at what point in time? Doesn't needing to know this further constrain the applicability of this scheme? - is it allowed for a RPL router to just drop an SRH and replace it with an entirely new SRH? - s1, "necessary mechanisms" is a bit odd, be better to name them if they're known/agreed already. - 6.1 seems to imply that all the attacks listed can be mounted from within the LLN. Truth in advertising would call for saying that explicitly. |
2011-11-27
|
07 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-25
|
07 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-11-24
|
07 | Miguel García | Request for Telechat review by GENART Completed. Reviewer: Miguel Garcia. |
2011-11-22
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Miguel Garcia |
2011-11-22
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Miguel Garcia |
2011-11-22
|
07 | Jari Arkko | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2011-11-22
|
07 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2011-11-22
|
07 | Jari Arkko | Ballot has been issued |
2011-11-22
|
07 | Jari Arkko | Created "Approve" ballot |
2011-11-22
|
07 | Jari Arkko | Placed on agenda for telechat - 2011-12-01 |
2011-11-14
|
05 | (System) | New version available: draft-ietf-6man-rpl-routing-header-05.txt |
2011-11-08
|
07 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Chris Lonvick. |
2011-10-31
|
07 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-10-28
|
07 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Chris Lonvick |
2011-10-28
|
07 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Chris Lonvick |
2011-10-26
|
07 | Amanda Baber | IANA has questions. The IANA Considerations section asks us to register the following: 1) a Routing Type at http://www.iana.org/assignments/ipv6-parameters 2) a code under "Destination Unreachable" … IANA has questions. The IANA Considerations section asks us to register the following: 1) a Routing Type at http://www.iana.org/assignments/ipv6-parameters 2) a code under "Destination Unreachable" in the ICMPv6 "Code" Fields registry at http://www.iana.org/assignments/icmpv6-parameters However, it does not tell us how to fill in the description field for these registrations. We could guess that the description for the latter might be "the router cannot satisfy the strict source-route requirement," but the document isn't clear. Please add the precise text you want us to use in the registry for both registrations. |
2011-10-17
|
07 | Amy Vezza | Last call sent |
2011-10-17
|
07 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (An IPv6 Routing Header for Source Routes with RPL) to Proposed Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'An IPv6 Routing Header for Source Routes with RPL' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-10-31. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract In Low power and Lossy Networks (LLNs), memory constraints on routers may limit them to maintaining at most a few routes. In some configurations, it is necessary to use these memory constrained routers to deliver datagrams to nodes within the LLN. The Routing for Low Power and Lossy Networks (RPL) protocol can be used in some deployments to store most, if not all, routes on one (e.g. the Directed Acyclic Graph (DAG) root) or few routers and forward the IPv6 datagram using a source routing technique to avoid large routing tables on memory constrained routers. This document specifies a new IPv6 Routing header type for delivering datagrams within a RPL domain. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-6man-rpl-routing-header/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-6man-rpl-routing-header/ No IPR declarations have been submitted directly on this I-D. |
2011-10-17
|
07 | Jari Arkko | Last Call was requested |
2011-10-17
|
07 | Jari Arkko | State changed to Last Call Requested from AD Evaluation::AD Followup. |
2011-10-17
|
07 | Jari Arkko | Last Call text changed |
2011-10-17
|
07 | (System) | Ballot writeup text was added |
2011-10-17
|
07 | (System) | Last call text was added |
2011-10-17
|
07 | (System) | Ballot approval text was added |
2011-10-11
|
07 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-10-11
|
04 | (System) | New version available: draft-ietf-6man-rpl-routing-header-04.txt |
2011-06-10
|
07 | Jari Arkko | State changed to AD Evaluation::Revised ID Needed from AD Evaluation. I have reviewed this draft. I have a number of comments, most of which are … State changed to AD Evaluation::Revised ID Needed from AD Evaluation. I have reviewed this draft. I have a number of comments, most of which are at this point questions and discussion items. The comments are included below in three categories: technical comments, editorial comments, and comments relating to feedback from other people that may not been fully handled yet. In general, the draft is well written and largely ready to move to a Proposed Standard RFC. However, there are a couple of issues that we need to discuss: MTU requirements, recommendations to consider alternative designs that exist only as Internet Drafts, and the feasibility of the loop check. I also need to apologize that it has taken far too long for me to do this review. There's no good excuse, but I've had some number of other documents in the queue this spring, day job requirements, and I knew I needed to review this document carefully. The rpl-option draft is next on my reading queue, probably reviewed by Monday. Technical: ======= > links within a RPL domain SHOULD have > a MTU of at least 1280 + 40 (outer IP header) + SRH_MAX_SIZE (+ > additional extension headers or options needed within RPL domain) > octets. I thought that 6LOWPAN was an important link layer for the application of RPL. Yet, RFC 4944 specifies a MTU of 1280 octets. The above requirement seems to be in contradiction with what is available on 6LOWPAN. Am I missing some extension of 6LOWPAN that changes the MTU, or some other link layer that is expected to be used with RPL? If I'm not missing anything, wouldn't this cause a problem? It would seem that either you cannot run RPL on 6LOWPAN, run 6LOWPAN on non standard MTU values (and we know MTU negotiation is difficult), or you have to change the expectations of other nodes in the IPv6 Internet about the minimum assured MTU. Please clarify/resolve/tell me what I am missing. > A common network configuration for a RPL domain is that all nodes > within a LLN share a common prefix. The SRH introduces the CmprI, > CmprE, and Pad fields to allow compaction of the Address[1..n] vector > when all entries share the same prefix as the IPv6 Destination > Address field of the packet carrying the SRH. So all segments are treated based on how many bytes they have in common with the destination address. But the destination address keeps changing as we go through the intermediate hops. Is it necessary to clarify that the comparison/shared prefix is with the final destination address, NOT the address that happens to be in the destination address field currently? > In very specific cases, IPv6-in-IPv6 tunneling may be undesirable due > to the added cost and complexity required to process and carry a > datagram with two IPv6 headers. [I-D.hui-6man-rpl-headers] describes > how to avoid using IPv6-in-IPv6 tunneling in such specific cases and > the risks involved. This sounds like a recommendation to do something in a draft that has not been through the working group and approved as the something that is a sound practice. Unless the reference is normative, I think it is inappropriate to refer to an Internet draft in this manner. What I would recommend is to (1) change the "... SHOULD use IPv6-in-IPv6 tunneling ..." statement to a MUST in this draft, (2) remove the above text, and (3) make the corresponding changes to Section 5. Then we can take hui-6man-rpl-headers through the working group and provide a second, more light-weight approach that extends what we have RFC-to-be-draft-ietf-6man-rpl-routing-header. (FWIW, I think the problem begins when one adds the first byte to a packet somewhere along the route. It does not not matter so much how many bytes one adds, just the SRH or also the IP header. Most of the complications on MTUs and so one start at that point. In any case, SRHs may not be trivially small either. Assuming 64-bit prefix compression an SRH for 4 hops would be 40 bytes.) > If such addresses appear more than once and are separated by at least > one address not assigned to that router, the router MUST drop the > packet and SHOULD send an ICMP Parameter Problem, Code 0, to the > Source Address. ... > else if 2 or more entries in Address[1..n] are assigned to > local interface and are separated by at least one > address not assigned to local interface { > discard the packet > } The text and the code appear to disagree about whether to send an ICMP Parameter Problem message. Please align. I assume that an ICMP message is needed. > Because this document specifies that SRH is only for use within a RPL > domain, such attacks cannot be mounted from outside the RPL domain. > As described in Section 5, RPL Border Routers MUST drop datagrams > entering or exiting the RPL domain that contain a SRH in the IPv6 > Extension headers. This is good, and I think the security considerations are sufficient. However, I would be happier if the draft also recommended that by default, non-RPL routers and firewalls should drop packets with SRH. This would help ensure that SRH does not accidentally enter any network and expose some vulnerability. The practical effect that I'm looking for is, for instance, not having my Linux kernel process SRH unless I've configured it to use RPL. Editorial: ====== > In the above scenario, datagrams traveling from source, S, to > destination, D, have the following packet structure: > > > +------+------+------+--------//-+ > | IPv6 | IPv6 | IPv6 | Packet | > | Src | Dst | SRH | Payload | > +------+------+------+--------//-+ This figure is not as clear as it could be. Are the src and dst field referring to the IPv6 header fields? Would this picture be better if you showed the IPv6 header explicitly? Please clarify. > CmprE 4-bit unsigned integer. Number of prefix octets > from the segment that are elided. For example, a > SRH carrying a full IPv6 address in Addresses[n] > sets CmprE to 0. I understood the definition CmprI, but I do not understand this, at least not at the point of the above text. What is "the segment" that you are referring to above? SRH carries multiple segments. Please clarify. Little further down it becomes clear that CmprE refers to the compression of the last segment. Please make this clear already in the above text. Comments relating to feedback from others: ============================ The ADs have received a question from Joseph Reddy, who was asking if the set of addresses in the SRH should also include the source address of the node inserting the SRH. His justification for this was the need to be able to send an ICMP error back to this node. Do we have an answer? In April, Thomas Narten made some comments on the list and I didn't think that the discussion finished with any conclusion. Are his concerns (e.g., from his e-mail on April 29th) valid or not valid? I would like the working group to conclude this issue one way or the other. I refer to his comments regarding the feasibility of the loop check in particular. His e-mail is at http://www.ietf.org/mail-archive/web/ipv6/current/msg13887.html FWIW I agree with Thomas' editorial comment on Section 2 clarity. That should be easy to fix. Jari |
2011-06-09
|
07 | Jari Arkko | State changed to AD Evaluation from Publication Requested. |
2011-03-30
|
07 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Brian Haberman is the document shepherd for this document, has reviewed this version, and believes it is ready for IESG review. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This draft has been reviewed by both members of the 6man WG and the ROLL WG. The shepherd does not have concerns with the depth or breadth of these reviews. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has strong concurrence from a small number of WG participants. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? This draft passes all ID-nits checks. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. All references are in order. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The IANA Considerations are in order. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? N/A. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary In Low power and Lossy Networks (LLNs), memory constraints on routers may limit them to maintaining at most a few routes. In some configurations, it is necessary to use these memory constrained routers to deliver datagrams to nodes within the LLN. The Routing for Low Power and Lossy Networks (RPL) protocol can be used in some deployments to store most, if not all, routes on one (e.g. the Directed Acyclic Graph (DAG) root) or few routers and forward the IPv6 datagram using a source routing technique to avoid large routing tables on memory constrained routers. This document specifies a new IPv6 Routing header type for delivering datagrams within a RPL domain. Working Group Summary This document was reviewed by the 6man and RPL WGs and represents the consensus of those groups. Document Quality Several external groups have indicated their plans to carry out large-scale deployments using the RPL option defined in this document. |
2011-03-30
|
07 | Cindy Morgan | Draft added in state Publication Requested |
2011-03-30
|
07 | Cindy Morgan | [Note]: 'Brian Haberman (brian@innovationslab.net) is the document shepherd.' added |
2011-03-29
|
03 | (System) | New version available: draft-ietf-6man-rpl-routing-header-03.txt |
2011-03-13
|
02 | (System) | New version available: draft-ietf-6man-rpl-routing-header-02.txt |
2010-10-23
|
01 | (System) | New version available: draft-ietf-6man-rpl-routing-header-01.txt |
2010-07-26
|
00 | (System) | New version available: draft-ietf-6man-rpl-routing-header-00.txt |