draft-ietf-6lo-rfc6775-update-03.txt   draft-ietf-6lo-rfc6775-update-04.txt 
6lo P. Thubert, Ed. 6lo P. Thubert, Ed.
Internet-Draft cisco Internet-Draft cisco
Updates: 6775 (if approved) E. Nordmark Updates: 6775 (if approved) E. Nordmark
Intended status: Standards Track Intended status: Standards Track
Expires: October 29, 2017 S. Chakrabarti Expires: November 2, 2017 S. Chakrabarti
April 27, 2017 May 1, 2017
An Update to 6LoWPAN ND An Update to 6LoWPAN ND
draft-ietf-6lo-rfc6775-update-03 draft-ietf-6lo-rfc6775-update-04
Abstract Abstract
This specification updates RFC 6775 - 6LoWPAN Neighbor Discovery, to This specification updates RFC 6775 - 6LoWPAN Neighbor Discovery, to
clarify the role of the protocol as a registration technique, clarify the role of the protocol as a registration technique,
simplify the registration operation in 6LoWPAN routers, and provide simplify the registration operation in 6LoWPAN routers, and provide
enhancements to the registration capabilities, in particular for the enhancements to the registration capabilities, in particular for the
registration to a Backbone Router for proxy ND operations. registration to a Backbone Router for proxy ND operations.
Status of This Memo Status of This Memo
skipping to change at page 1, line 36 skipping to change at page 1, line 36
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 29, 2017. This Internet-Draft will expire on November 2, 2017.
Copyright Notice Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 24 skipping to change at page 2, line 24
5.1. Extended Address Registration Option . . . . . . . . . . 6 5.1. Extended Address Registration Option . . . . . . . . . . 6
5.2. Transaction ID . . . . . . . . . . . . . . . . . . . . . 6 5.2. Transaction ID . . . . . . . . . . . . . . . . . . . . . 6
5.3. Owner Unique ID . . . . . . . . . . . . . . . . . . . . . 7 5.3. Owner Unique ID . . . . . . . . . . . . . . . . . . . . . 7
5.4. Registering the Target Address . . . . . . . . . . . . . 8 5.4. Registering the Target Address . . . . . . . . . . . . . 8
5.5. Link-Local Addresses and Registration . . . . . . . . . . 8 5.5. Link-Local Addresses and Registration . . . . . . . . . . 8
5.6. Maintaining the Registration States . . . . . . . . . . . 10 5.6. Maintaining the Registration States . . . . . . . . . . . 10
6. Updated ND Options . . . . . . . . . . . . . . . . . . . . . 11 6. Updated ND Options . . . . . . . . . . . . . . . . . . . . . 11
6.1. New 6LoWPAN capability Bits in the Capability Indication 6.1. New 6LoWPAN capability Bits in the Capability Indication
Option . . . . . . . . . . . . . . . . . . . . . . . . . 11 Option . . . . . . . . . . . . . . . . . . . . . . . . . 11
6.2. The Enhanced Address Registration Option (EARO) . . . . . 12 6.2. The Enhanced Address Registration Option (EARO) . . . . . 12
7. Backward Compatibility . . . . . . . . . . . . . . . . . . . 15 7. Backward Compatibility . . . . . . . . . . . . . . . . . . . 14
7.1. Discovering the capabilities of an ND peer . . . . . . . 15 7.1. Discovering the capabilities of an ND peer . . . . . . . 14
7.1.1. Using the E Flag in the CIO . . . . . . . . . . . . . 15 7.1.1. Using the E Flag in the CIO . . . . . . . . . . . . . 14
7.1.2. Using the T Flag in the EARO . . . . . . . . . . . . 15 7.1.2. Using the T Flag in the EARO . . . . . . . . . . . . 15
7.2. Legacy 6LoWPAN Node . . . . . . . . . . . . . . . . . . . 16 7.2. Legacy 6LoWPAN Node . . . . . . . . . . . . . . . . . . . 15
7.3. Legacy 6LoWPAN Router . . . . . . . . . . . . . . . . . . 16 7.3. Legacy 6LoWPAN Router . . . . . . . . . . . . . . . . . . 16
7.4. Legacy 6LoWPAN Border Router . . . . . . . . . . . . . . 16 7.4. Legacy 6LoWPAN Border Router . . . . . . . . . . . . . . 16
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17 8. Security Considerations . . . . . . . . . . . . . . . . . . . 16
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 20 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 19
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 20 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 20
11.1. Normative References . . . . . . . . . . . . . . . . . . 20 11.1. Normative References . . . . . . . . . . . . . . . . . . 20
11.2. Informative References . . . . . . . . . . . . . . . . . 21 11.2. Informative References . . . . . . . . . . . . . . . . . 21
11.3. External Informative References . . . . . . . . . . . . 24 11.3. External Informative References . . . . . . . . . . . . 23
Appendix A. Applicability and Requirements Served . . . . . . . 24 Appendix A. Applicability and Requirements Served . . . . . . . 24
Appendix B. Requirements . . . . . . . . . . . . . . . . . . . . 25 Appendix B. Requirements . . . . . . . . . . . . . . . . . . . . 24
B.1. Requirements Related to Mobility . . . . . . . . . . . . 25 B.1. Requirements Related to Mobility . . . . . . . . . . . . 25
B.2. Requirements Related to Routing Protocols . . . . . . . . 26 B.2. Requirements Related to Routing Protocols . . . . . . . . 25
B.3. Requirements Related to the Variety of Low-Power Link B.3. Requirements Related to the Variety of Low-Power Link
types . . . . . . . . . . . . . . . . . . . . . . . . . . 27 types . . . . . . . . . . . . . . . . . . . . . . . . . . 26
B.4. Requirements Related to Proxy Operations . . . . . . . . 27 B.4. Requirements Related to Proxy Operations . . . . . . . . 27
B.5. Requirements Related to Security . . . . . . . . . . . . 28 B.5. Requirements Related to Security . . . . . . . . . . . . 27
B.6. Requirements Related to Scalability . . . . . . . . . . . 29 B.6. Requirements Related to Scalability . . . . . . . . . . . 28
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 29 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 29
1. Introduction 1. Introduction
RFC 6775, the "Neighbor Discovery Optimization for IPv6 over Low- RFC 6775, the "Neighbor Discovery Optimization for IPv6 over Low-
Power Wireless Personal Area Networks (6LoWPANs)" [RFC6775] Power Wireless Personal Area Networks (6LoWPANs)" [RFC6775]
introduced a proactive registration mechanism to IPv6 Neighbor introduced a proactive registration mechanism to IPv6 Neighbor
Discovery (ND) services that is well suited to nodes belonging to a Discovery (ND) services that is well suited to nodes belonging to a
Low Power Lossy Network (LLN). Low Power Lossy Network (LLN).
The scope of this draft is an IPv6 LLN, which can be a simple star or The scope of this draft is an IPv6 LLN, which can be a simple star or
a more complex mesh topology. The LLN may be anchored at an IPv6 a more complex mesh topology. The LLN may be anchored at an IPv6
Backbone Router (6BBR) [I-D.ietf-6lo-backbone-router]. The 6BBRs Backbone Router (6BBR) [I-D.ietf-6lo-backbone-router]. The 6BBRs
interconnect the LLNs over a Backbone Link and emulate that the LLN interconnect the LLNs over a Backbone Link and emulate that the LLN
nodes are present on the Backbone using proxy-ND operations. nodes are present on the Backbone using proxy-ND operations.
This specification modifies and extends the behaviour and protocol This specification modifies and extends the behavior and protocol
elements of RFC 6775 [RFC6775] to enable additional capabilities, in elements of RFC 6775 [RFC6775] to enable additional capabilities, in
particular the registration to a 6BBR for proxy ND operations. particular the registration to a 6BBR for proxy ND operations.
2. Considerations On Registration Rejection 2. Considerations On Registration Rejection
The purpose of the Address Registration Option (ARO) RFC 6775 The purpose of the Address Registration Option (ARO) RFC 6775
[RFC6775] and of the Extended ARO (EARO) that is introduced in this [RFC6775] and of the Extended ARO (EARO) that is introduced in this
document is to facilitate duplicate address detection (DAD) for hosts document is to facilitate duplicate address detection (DAD) for hosts
and pre-populate Neighbor Cache Entries (NCE) [RFC4861] in the and pre-populate Neighbor Cache Entries (NCE) [RFC4861] in the
routers to reduce the need for sending multicast neighbor routers to reduce the need for sending multicast neighbor
skipping to change at page 8, line 7 skipping to change at page 8, line 7
Networks" [I-D.ietf-6lo-ap-nd]. Networks" [I-D.ietf-6lo-ap-nd].
In any fashion, it is recommended that the node stores the unique Id In any fashion, it is recommended that the node stores the unique Id
or the keys used to generate that ID in persistent memory. or the keys used to generate that ID in persistent memory.
Otherwise, it will be prevented to re-register after a reboot that Otherwise, it will be prevented to re-register after a reboot that
would cause a loss of memory until the Backbone Router times out the would cause a loss of memory until the Backbone Router times out the
registration. registration.
5.4. Registering the Target Address 5.4. Registering the Target Address
This specification changes the behaviour of the 6LN and the 6LR so This specification changes the behavior of the 6LN and the 6LR so
that the Registered Address is found in the Target Address field of that the Registered Address is found in the Target Address field of
the NS and NA messages as opposed to the Source Address. the NS and NA messages as opposed to the Source Address.
The reason for this change is to enable proxy-registrations on behalf The reason for this change is to enable proxy-registrations on behalf
of other nodes in Route-Over meshes, for instance to enable that a of other nodes in Route-Over meshes, for instance to enable that a
RPL root registers addresses on behalf LLN nodes that are deeper in a RPL root registers addresses on behalf LLN nodes that are deeper in a
6TiSCH mesh, as discussed in Appendix B.4. In that case, the 6TiSCH mesh, as discussed in Appendix B.4. In that case, the
Registering Node MUST indicate its own address as source of the ND Registering Node MUST indicate its own address as source of the ND
message and its MAC address in the Source Link-Layer Address Option message and its MAC address in the Source Link-Layer Address Option
(SLLAO), since it still expects to get the packets and route them (SLLAO), since it still expects to get the packets and route them
skipping to change at page 9, line 36 skipping to change at page 9, line 36
It is desired that a 6LR does not need to modify its state associated It is desired that a 6LR does not need to modify its state associated
to the Source Address of an NS(EARO) message. For that reason, when to the Source Address of an NS(EARO) message. For that reason, when
possible, it is RECOMMENDED to use an address that is already possible, it is RECOMMENDED to use an address that is already
registered with a 6LR registered with a 6LR
When registering to a 6LR that conforms this specification, a node When registering to a 6LR that conforms this specification, a node
MUST use a Link-Local address as the source address of the MUST use a Link-Local address as the source address of the
registration, whatever the type of IPv6 address that is being registration, whatever the type of IPv6 address that is being
registered. That Link-Local Address MUST be either already registered. That Link-Local Address MUST be either already
registrered, or the address that is being registered. registered, or the address that is being registered.
When a Registering Node does not have an already-registered address, When a Registering Node does not have an already-registered address,
it MUST register a Link-Local address, using it as both the Source it MUST register a Link-Local address, using it as both the Source
and the Target Address of an NS(EARO) message. In that case, it is and the Target Address of an NS(EARO) message. In that case, it is
RECOMMENDED to use a Link-Local address that is (expected to be) RECOMMENDED to use a Link-Local address that is (expected to be)
globally unique, e.g. derived from a burn-in MAC address. An EARO globally unique, e.g. derived from a burn-in MAC address. An EARO
option in the response NA indicates that the 6LR supports this option in the response NA indicates that the 6LR supports this
specification. specification.
Since there is no DAR/DAC exchange for Link-Local addresses, the 6LR Since there is no DAR/DAC exchange for Link-Local addresses, the 6LR
skipping to change at page 11, line 28 skipping to change at page 11, line 28
DAC message bearing a Status of 0 "Success". If it is not the DAC message bearing a Status of 0 "Success". If it is not the
freshest, then a Status 2 "Moved" is returned instead, and the freshest, then a Status 2 "Moved" is returned instead, and the
existing entry is conserved. The 6LBR SHOULD conserve the address in existing entry is conserved. The 6LBR SHOULD conserve the address in
a DELAY state for a configurable period of time, so as to protect a a DELAY state for a configurable period of time, so as to protect a
mobile node that deregistered from one 6LR and did not register yet mobile node that deregistered from one 6LR and did not register yet
to a new one. to a new one.
6. Updated ND Options 6. Updated ND Options
This specification does not introduce new options, but it modifies This specification does not introduce new options, but it modifies
existing ones and updates the associated behaviours as follow: existing ones and updates the associated behaviors as follow:
6.1. New 6LoWPAN capability Bits in the Capability Indication Option 6.1. New 6LoWPAN capability Bits in the Capability Indication Option
This specification defines a number of capability bits in the CIO This specification defines a number of capability bits in the CIO
that was introduced by RFC 7400 [RFC7400]. that was introduced by RFC 7400 [RFC7400].
Support for this specification is indicated by setting the "E" flag Support for this specification is indicated by setting the "E" flag
in a CIO option. Routers that are capable of acting as 6LR, 6LBR and in a CIO option. Routers that are capable of acting as 6LR, 6LBR and
6BBR SHOULD set the L, B andP flags, respectively. 6BBR SHOULD set the L, B and P flags, respectively.
Those flags are not mutually exclusive and if a router is capable of Those flags are not mutually exclusive and if a router is capable of
multiple roles, it SHOULD set all the related flags. multiple roles, it SHOULD set all the related flags.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length = 1 |_____________________|L|B|P|E|G| | Type | Length = 1 |_____________________|L|B|P|E|G|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |_______________________________________________________________|
|_______________________________________________________________| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 1: New capability Bits L, B, P, E in the CIO Figure 1: New capability Bits L, B, P, E in the CIO
Option Fields Option Fields
Type: 36 Type: 36
L: Node is a 6LR, it can take registrations. L: Node is a 6LR, it can take registrations.
B: Node is a 6LBR. B: Node is a 6LBR.
P: Node is a 6BBR, proxying for nodes on this link. P: Node is a 6BBR, proxying for nodes on this link.
E: This specification is supported and applied. E: This specification is supported and applied.
skipping to change at page 14, line 26 skipping to change at page 14, line 12
| | rejection of a proxy registration to a Backbone Router | | | rejection of a proxy registration to a Backbone Router |
| | | | | |
| 5 | Proof requested: The registering node is challenged for | | 5 | Proof requested: The registering node is challenged for |
| | owning the registered address or for being an acceptable | | | owning the registered address or for being an acceptable |
| | proxy for the registration. This Status is expected in | | | proxy for the registration. This Status is expected in |
| | asynchronous messages from a registrar (6LR, 6LBR, 6BBR) | | | asynchronous messages from a registrar (6LR, 6LBR, 6BBR) |
| | to indicate that the registration state is removed, for | | | to indicate that the registration state is removed, for |
| | instance due to time out of a lifetime, or a movement. It | | | instance due to time out of a lifetime, or a movement. It |
| | is used for instance by a 6BBR in a NA(ARO) message to | | | is used for instance by a 6BBR in a NA(ARO) message to |
| | indicate that the ownership of the proxy state on the | | | indicate that the ownership of the proxy state on the |
| | backbone was transfered to another 6BBR, which is | | | backbone was transferred to another 6BBR, which is |
| | indicative of a movement of the device. The receiver of | | | indicative of a movement of the device. The receiver of |
| | the NA is the device that has performed a registration | | | the NA is the device that has performed a registration |
| | that is now stale and it should clean up its state. | | | that is now stale and it should clean up its state. |
| | | | | |
| 6 | Duplicate Source Address: The address used as source of | | 6 | Duplicate Source Address: The address used as source of |
| | the NS(ARO) conflicts with an existing registration. | | | the NS(ARO) conflicts with an existing registration. |
| | | | | |
| 7 | Invalid Source Address: The address used as source of the | | 7 | Invalid Source Address: The address used as source of the |
| | NS(ARO) is not a Link-Local address as prescribed by this | | | NS(ARO) is not a Link-Local address as prescribed by this |
| | document. | | | document. |
skipping to change at page 16, line 35 skipping to change at page 16, line 22
the 6LN was a legacy node. the 6LN was a legacy node.
An updated 6LN will always use an EARO option in the registration NS An updated 6LN will always use an EARO option in the registration NS
message, whereas a legacy 6LN will always areply with an ARO option message, whereas a legacy 6LN will always areply with an ARO option
in the NA message. So from that first registration, the updated 6LN in the NA message. So from that first registration, the updated 6LN
can figure whether the 6LR supports this specification or not. can figure whether the 6LR supports this specification or not.
When facing a legacy 6LR, an updated 6LN may attempt to find an When facing a legacy 6LR, an updated 6LN may attempt to find an
alternate 6LR that is updated. In order to be backward compatible, alternate 6LR that is updated. In order to be backward compatible,
based on the discovery that a 6LR is legacy, the 6LN needs to based on the discovery that a 6LR is legacy, the 6LN needs to
fallback to legacy behaviour and source the packet with the fallback to legacy behavior and source the packet with the registered
registrered address. address.
The main difference is that the updated 6LN SHOULD use an EARO in the The main difference is that the updated 6LN SHOULD use an EARO in the
request regardless of the type of 6LN, legacy or updated request regardless of the type of 6LN, legacy or updated
7.4. Legacy 6LoWPAN Border Router 7.4. Legacy 6LoWPAN Border Router
With this specification, the DAR/DAC transports an EARO option as With this specification, the DAR/DAC transports an EARO option as
opposed to an ARO option. As described for the NS/NA exchange, opposed to an ARO option. As described for the NS/NA exchange,
devices that support this specification always use an EARO option and devices that support this specification always use an EARO option and
all the associated behaviour. all the associated behavior.
8. Security Considerations 8. Security Considerations
This specification extends RFC 6775 [RFC6775], and the security This specification extends RFC 6775 [RFC6775], and the security
section of that draft also applies to this as well. In particular, section of that draft also applies to this as well. In particular,
it is expected that the link layer is sufficiently protected to it is expected that the link layer is sufficiently protected to
prevent a rogue access, either by means of physical or IP security on prevent a rogue access, either by means of physical or IP security on
the Backbone Link and link layer cryptography on the LLN. This the Backbone Link and link layer cryptography on the LLN. This
specification also expects that the LLN MAC provides secure unicast specification also expects that the LLN MAC provides secure unicast
to/from the Backbone Router and secure Broadcast from the Backbone to/from the Backbone Router and secure Broadcast from the Backbone
skipping to change at page 20, line 44 skipping to change at page 20, line 22
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>. <http://www.rfc-editor.org/info/rfc2119>.
[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
Architecture", RFC 4291, DOI 10.17487/RFC4291, February Architecture", RFC 4291, DOI 10.17487/RFC4291, February
2006, <http://www.rfc-editor.org/info/rfc4291>. 2006, <http://www.rfc-editor.org/info/rfc4291>.
[RFC4429] Moore, N., "Optimistic Duplicate Address Detection (DAD)
for IPv6", RFC 4429, DOI 10.17487/RFC4429, April 2006,
<http://www.rfc-editor.org/info/rfc4429>.
[RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman,
"Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861,
DOI 10.17487/RFC4861, September 2007, DOI 10.17487/RFC4861, September 2007,
<http://www.rfc-editor.org/info/rfc4861>. <http://www.rfc-editor.org/info/rfc4861>.
[RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless
Address Autoconfiguration", RFC 4862, Address Autoconfiguration", RFC 4862,
DOI 10.17487/RFC4862, September 2007, DOI 10.17487/RFC4862, September 2007,
<http://www.rfc-editor.org/info/rfc4862>. <http://www.rfc-editor.org/info/rfc4862>.
[RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy
Extensions for Stateless Address Autoconfiguration in
IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007,
<http://www.rfc-editor.org/info/rfc4941>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226, IANA Considerations Section in RFCs", BCP 26, RFC 5226,
DOI 10.17487/RFC5226, May 2008, DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>. <http://www.rfc-editor.org/info/rfc5226>.
[RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6 [RFC6282] Hui, J., Ed. and P. Thubert, "Compression Format for IPv6
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282, Datagrams over IEEE 802.15.4-Based Networks", RFC 6282,
DOI 10.17487/RFC6282, September 2011, DOI 10.17487/RFC6282, September 2011,
<http://www.rfc-editor.org/info/rfc6282>. <http://www.rfc-editor.org/info/rfc6282>.
[RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
Low-Power and Lossy Networks", RFC 6550,
DOI 10.17487/RFC6550, March 2012,
<http://www.rfc-editor.org/info/rfc6550>.
[RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C. [RFC6775] Shelby, Z., Ed., Chakrabarti, S., Nordmark, E., and C.
Bormann, "Neighbor Discovery Optimization for IPv6 over Bormann, "Neighbor Discovery Optimization for IPv6 over
Low-Power Wireless Personal Area Networks (6LoWPANs)", Low-Power Wireless Personal Area Networks (6LoWPANs)",
RFC 6775, DOI 10.17487/RFC6775, November 2012, RFC 6775, DOI 10.17487/RFC6775, November 2012,
<http://www.rfc-editor.org/info/rfc6775>. <http://www.rfc-editor.org/info/rfc6775>.
[RFC7400] Bormann, C., "6LoWPAN-GHC: Generic Header Compression for [RFC7400] Bormann, C., "6LoWPAN-GHC: Generic Header Compression for
IPv6 over Low-Power Wireless Personal Area Networks IPv6 over Low-Power Wireless Personal Area Networks
(6LoWPANs)", RFC 7400, DOI 10.17487/RFC7400, November (6LoWPANs)", RFC 7400, DOI 10.17487/RFC7400, November
2014, <http://www.rfc-editor.org/info/rfc7400>. 2014, <http://www.rfc-editor.org/info/rfc7400>.
[RFC7934] Colitti, L., Cerf, V., Cheshire, S., and D. Schinazi,
"Host Address Availability Recommendations", BCP 204,
RFC 7934, DOI 10.17487/RFC7934, July 2016,
<http://www.rfc-editor.org/info/rfc7934>.
11.2. Informative References 11.2. Informative References
[I-D.chakrabarti-nordmark-6man-efficient-nd] [I-D.chakrabarti-nordmark-6man-efficient-nd]
Chakrabarti, S., Nordmark, E., Thubert, P., and M. Chakrabarti, S., Nordmark, E., Thubert, P., and M.
Wasserman, "IPv6 Neighbor Discovery Optimizations for Wasserman, "IPv6 Neighbor Discovery Optimizations for
Wired and Wireless Networks", draft-chakrabarti-nordmark- Wired and Wireless Networks", draft-chakrabarti-nordmark-
6man-efficient-nd-07 (work in progress), February 2015. 6man-efficient-nd-07 (work in progress), February 2015.
[I-D.delcarpio-6lo-wlanah] [I-D.delcarpio-6lo-wlanah]
Vega, L., Robles, I., and R. Morabito, "IPv6 over Vega, L., Robles, I., and R. Morabito, "IPv6 over
skipping to change at page 23, line 40 skipping to change at page 22, line 40
[RFC3971] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander, [RFC3971] Arkko, J., Ed., Kempf, J., Zill, B., and P. Nikander,
"SEcure Neighbor Discovery (SEND)", RFC 3971, "SEcure Neighbor Discovery (SEND)", RFC 3971,
DOI 10.17487/RFC3971, March 2005, DOI 10.17487/RFC3971, March 2005,
<http://www.rfc-editor.org/info/rfc3971>. <http://www.rfc-editor.org/info/rfc3971>.
[RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)", [RFC3972] Aura, T., "Cryptographically Generated Addresses (CGA)",
RFC 3972, DOI 10.17487/RFC3972, March 2005, RFC 3972, DOI 10.17487/RFC3972, March 2005,
<http://www.rfc-editor.org/info/rfc3972>. <http://www.rfc-editor.org/info/rfc3972>.
[RFC4429] Moore, N., "Optimistic Duplicate Address Detection (DAD)
for IPv6", RFC 4429, DOI 10.17487/RFC4429, April 2006,
<http://www.rfc-editor.org/info/rfc4429>.
[RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6 [RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6
over Low-Power Wireless Personal Area Networks (6LoWPANs): over Low-Power Wireless Personal Area Networks (6LoWPANs):
Overview, Assumptions, Problem Statement, and Goals", Overview, Assumptions, Problem Statement, and Goals",
RFC 4919, DOI 10.17487/RFC4919, August 2007, RFC 4919, DOI 10.17487/RFC4919, August 2007,
<http://www.rfc-editor.org/info/rfc4919>. <http://www.rfc-editor.org/info/rfc4919>.
[RFC4941] Narten, T., Draves, R., and S. Krishnan, "Privacy
Extensions for Stateless Address Autoconfiguration in
IPv6", RFC 4941, DOI 10.17487/RFC4941, September 2007,
<http://www.rfc-editor.org/info/rfc4941>.
[RFC6550] Winter, T., Ed., Thubert, P., Ed., Brandt, A., Hui, J.,
Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur,
JP., and R. Alexander, "RPL: IPv6 Routing Protocol for
Low-Power and Lossy Networks", RFC 6550,
DOI 10.17487/RFC6550, March 2012,
<http://www.rfc-editor.org/info/rfc6550>.
[RFC7102] Vasseur, JP., "Terms Used in Routing for Low-Power and [RFC7102] Vasseur, JP., "Terms Used in Routing for Low-Power and
Lossy Networks", RFC 7102, DOI 10.17487/RFC7102, January Lossy Networks", RFC 7102, DOI 10.17487/RFC7102, January
2014, <http://www.rfc-editor.org/info/rfc7102>. 2014, <http://www.rfc-editor.org/info/rfc7102>.
[RFC7217] Gont, F., "A Method for Generating Semantically Opaque [RFC7217] Gont, F., "A Method for Generating Semantically Opaque
Interface Identifiers with IPv6 Stateless Address Interface Identifiers with IPv6 Stateless Address
Autoconfiguration (SLAAC)", RFC 7217, Autoconfiguration (SLAAC)", RFC 7217,
DOI 10.17487/RFC7217, April 2014, DOI 10.17487/RFC7217, April 2014,
<http://www.rfc-editor.org/info/rfc7217>. <http://www.rfc-editor.org/info/rfc7217>.
[RFC7428] Brandt, A. and J. Buron, "Transmission of IPv6 Packets [RFC7428] Brandt, A. and J. Buron, "Transmission of IPv6 Packets
over ITU-T G.9959 Networks", RFC 7428, over ITU-T G.9959 Networks", RFC 7428,
DOI 10.17487/RFC7428, February 2015, DOI 10.17487/RFC7428, February 2015,
<http://www.rfc-editor.org/info/rfc7428>. <http://www.rfc-editor.org/info/rfc7428>.
[RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., [RFC7668] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B.,
Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low Shelby, Z., and C. Gomez, "IPv6 over BLUETOOTH(R) Low
Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015, Energy", RFC 7668, DOI 10.17487/RFC7668, October 2015,
<http://www.rfc-editor.org/info/rfc7668>. <http://www.rfc-editor.org/info/rfc7668>.
[RFC7934] Colitti, L., Cerf, V., Cheshire, S., and D. Schinazi,
"Host Address Availability Recommendations", BCP 204,
RFC 7934, DOI 10.17487/RFC7934, July 2016,
<http://www.rfc-editor.org/info/rfc7934>.
11.3. External Informative References 11.3. External Informative References
[IEEEstd802154] [IEEEstd802154]
IEEE, "IEEE Standard for Low-Rate Wireless Networks", IEEE, "IEEE Standard for Low-Rate Wireless Networks",
IEEE Standard 802.15.4, DOI 10.1109/IEEESTD.2016.7460875, IEEE Standard 802.15.4, DOI 10.1109/IEEESTD.2016.7460875,
<http://ieeexplore.ieee.org/document/7460875/>. <http://ieeexplore.ieee.org/document/7460875/>.
Appendix A. Applicability and Requirements Served Appendix A. Applicability and Requirements Served
This specification extends 6LoWPAN ND to sequence the registration This specification extends 6LoWPAN ND to sequence the registration
skipping to change at page 24, line 48 skipping to change at page 24, line 25
[I-D.ietf-6tisch-architecture] introduces how a 6LoWPAN ND host could [I-D.ietf-6tisch-architecture] introduces how a 6LoWPAN ND host could
connect to the Internet via a RPL mesh Network, but this requires connect to the Internet via a RPL mesh Network, but this requires
additions to the 6LOWPAN ND protocol to support mobility and additions to the 6LOWPAN ND protocol to support mobility and
reachability in a secured and manageable environment. This reachability in a secured and manageable environment. This
specification details the new operations that are required to specification details the new operations that are required to
implement the 6TiSCH architecture and serves the requirements listed implement the 6TiSCH architecture and serves the requirements listed
in Appendix B.2. in Appendix B.2.
The term LLN is used loosely in this specification to cover multiple The term LLN is used loosely in this specification to cover multiple
types of WLANs and WPANs, including Low-Power Wi-Fi, BLUETOOTH(R) Low types of WLANs and WPANs, including Low-Power Wi-Fi, BLUETOOTH(R) Low
Energy, IEEE std 802.11AH and IEEE std 802.15.4 wireless meshes, so Energy, IEEE Std.802.11AH and IEEE Std.802.15.4 wireless meshes, so
as to address the requirements discussed in Appendix B.3 as to address the requirements discussed in Appendix B.3
This specification can be used by any wireless node to associate at This specification can be used by any wireless node to associate at
Layer-3 with a 6BBR and register its IPv6 addresses to obtain routing Layer-3 with a 6BBR and register its IPv6 addresses to obtain routing
services including proxy-ND operations over the backbone, effectively services including proxy-ND operations over the backbone, effectively
providing a solution to the requirements expressed in Appendix B.4. providing a solution to the requirements expressed in Appendix B.4.
"Efficiency aware IPv6 Neighbor Discovery Optimizations" "Efficiency aware IPv6 Neighbor Discovery Optimizations"
[I-D.chakrabarti-nordmark-6man-efficient-nd] suggests that 6LoWPAN ND [I-D.chakrabarti-nordmark-6man-efficient-nd] suggests that 6LoWPAN ND
[RFC6775] can be extended to other types of links beyond IEEE Std. [RFC6775] can be extended to other types of links beyond IEEE Std.
skipping to change at page 27, line 7 skipping to change at page 26, line 26
option, a RPLInstanceID. option, a RPLInstanceID.
Req2.3: Multicast operations SHOULD be supported and optimized, for Req2.3: Multicast operations SHOULD be supported and optimized, for
instance using BIER or MPL. Whether ND is appropriate for the instance using BIER or MPL. Whether ND is appropriate for the
registration to the 6BBR is to be defined, considering the additional registration to the 6BBR is to be defined, considering the additional
burden of supporting the Multicast Listener Discovery Version 2 burden of supporting the Multicast Listener Discovery Version 2
[RFC3810] (MLDv2) for IPv6. [RFC3810] (MLDv2) for IPv6.
B.3. Requirements Related to the Variety of Low-Power Link types B.3. Requirements Related to the Variety of Low-Power Link types
6LoWPAN ND [RFC6775] was defined with a focus on IEEE std 802.15.4 6LoWPAN ND [RFC6775] was defined with a focus on IEEE Std.802.15.4
and in particular the capability to derive a unique Identifier from a and in particular the capability to derive a unique Identifier from a
globally unique MAC-64 address. At this point, the 6lo Working Group globally unique MAC-64 address. At this point, the 6lo Working Group
is extending the 6LoWPAN Header Compression (HC) [RFC6282] technique is extending the 6LoWPAN Header Compression (HC) [RFC6282] technique
to other link types ITU-T G.9959 [RFC7428], Master-Slave/Token- to other link types ITU-T G.9959 [RFC7428], Master-Slave/Token-
Passing [I-D.ietf-6lo-6lobac], DECT Ultra Low Energy Passing [I-D.ietf-6lo-6lobac], DECT Ultra Low Energy
[I-D.ietf-6lo-dect-ule], Near Field Communication [I-D.ietf-6lo-nfc], [I-D.ietf-6lo-dect-ule], Near Field Communication [I-D.ietf-6lo-nfc],
IEEE std 802.11ah [I-D.delcarpio-6lo-wlanah], as well as IEEE1901.2 IEEE Std.802.11ah [I-D.delcarpio-6lo-wlanah], as well as IEEE1901.2
Narrowband Powerline Communication Networks Narrowband Powerline Communication Networks
[I-D.popa-6lo-6loplc-ipv6-over-ieee19012-networks] and BLUETOOTH(R) [I-D.popa-6lo-6loplc-ipv6-over-ieee19012-networks] and BLUETOOTH(R)
Low Energy [RFC7668]. Low Energy [RFC7668].
Related requirements are: Related requirements are:
Req3.1: The support of the registration mechanism SHOULD be extended Req3.1: The support of the registration mechanism SHOULD be extended
to more LLN links than IEEE std 802.15.4, matching at least the LLN to more LLN links than IEEE Std.802.15.4, matching at least the LLN
links for which an "IPv6 over foo" specification exists, as well as links for which an "IPv6 over foo" specification exists, as well as
Low-Power Wi-Fi. Low-Power Wi-Fi.
Req3.2: As part of this extension, a mechanism to compute a unique Req3.2: As part of this extension, a mechanism to compute a unique
Identifier should be provided, with the capability to form a Link- Identifier should be provided, with the capability to form a Link-
Local Address that SHOULD be unique at least within the LLN connected Local Address that SHOULD be unique at least within the LLN connected
to a 6LBR discovered by ND in each node within the LLN. to a 6LBR discovered by ND in each node within the LLN.
Req3.3: The Address Registration Option used in the ND registration Req3.3: The Address Registration Option used in the ND registration
SHOULD be extended to carry the relevant forms of unique Identifier. SHOULD be extended to carry the relevant forms of unique Identifier.
skipping to change at page 28, line 50 skipping to change at page 28, line 19
their respective roles, as well as with the 6LoWPAN Node for the role their respective roles, as well as with the 6LoWPAN Node for the role
of 6LR. of 6LR.
Req5.2: 6LoWPAN ND security mechanisms SHOULD provide a mechanism for Req5.2: 6LoWPAN ND security mechanisms SHOULD provide a mechanism for
the 6LR and the 6LBR to validate new registration of authorized the 6LR and the 6LBR to validate new registration of authorized
nodes. Joining of unauthorized nodes MUST be impossible. nodes. Joining of unauthorized nodes MUST be impossible.
Req5.3: 6LoWPAN ND security mechanisms SHOULD lead to small packet Req5.3: 6LoWPAN ND security mechanisms SHOULD lead to small packet
sizes. In particular, the NS, NA, DAR and DAC messages for a re- sizes. In particular, the NS, NA, DAR and DAC messages for a re-
registration flow SHOULD NOT exceed 80 octets so as to fit in a registration flow SHOULD NOT exceed 80 octets so as to fit in a
secured IEEE std 802.15.4 [IEEEstd802154] frame. secured IEEE Std.802.15.4 [IEEEstd802154] frame.
Req5.4: Recurrent 6LoWPAN ND security operations MUST NOT be Req5.4: Recurrent 6LoWPAN ND security operations MUST NOT be
computationally intensive on the LoWPAN Node CPU. When a Key hash computationally intensive on the LoWPAN Node CPU. When a Key hash
calculation is employed, a mechanism lighter than SHA-1 SHOULD be calculation is employed, a mechanism lighter than SHA-1 SHOULD be
preferred. preferred.
Req5.5: The number of Keys that the 6LoWPAN Node needs to manipulate Req5.5: The number of Keys that the 6LoWPAN Node needs to manipulate
SHOULD be minimized. SHOULD be minimized.
Req5.6: The 6LoWPAN ND security mechanisms SHOULD enable the Req5.6: The 6LoWPAN ND security mechanisms SHOULD enable the
 End of changes. 34 change blocks. 
59 lines changed or deleted 57 lines changed or added

This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/