Skip to main content

Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)
draft-ietf-lpwan-coap-static-context-hc-19

Revision differences

Document history

Date Rev. By Action
2021-06-22
19 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2021-05-26
19 (System) RFC Editor state changed to AUTH48
2021-04-27
19 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2021-04-07
19 (System) RFC Editor state changed to AUTH from EDIT
2021-03-08
19 (System) IANA Action state changed to No IANA Actions from In Progress
2021-03-08
19 (System) RFC Editor state changed to EDIT
2021-03-08
19 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2021-03-08
19 (System) Announcement was received by RFC Editor
2021-03-08
19 (System) IANA Action state changed to In Progress
2021-03-08
19 (System) Removed all action holders (IESG state changed)
2021-03-08
19 Cindy Morgan IESG state changed to Approved-announcement sent from IESG Evaluation::AD Followup
2021-03-08
19 Cindy Morgan IESG has approved the document
2021-03-08
19 Cindy Morgan Closed "Approve" ballot
2021-03-08
19 Cindy Morgan Ballot approval text was generated
2021-03-08
19 Cindy Morgan Ballot writeup was changed
2021-03-08
19 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-03-08
19 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-19.txt
2021-03-08
19 (System) New version approved
2021-03-08
19 (System) Request for posting confirmation emailed to previous authors: Ana Minaburo , Laurent Toutain , Ricardo Andreasen , lpwan-chairs@ietf.org
2021-03-08
19 Ana Minaburo Uploaded new revision
2021-03-04
18 Éric Vyncke As promised by Ana by incorporating the last comments from Ben Kaduk.
2021-03-04
18 (System) Changed action holders to Laurent Toutain, Ricardo Andreasen, Ana Minaburo (IESG state changed)
2021-03-04
18 Éric Vyncke IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup
2021-03-01
18 Benjamin Kaduk
[Ballot comment]
Thanks for the updates in the -17 and -18, they do address my remaining
Discuss points and most of my comments.  I do …
[Ballot comment]
Thanks for the updates in the -17 and -18, they do address my remaining
Discuss points and most of my comments.  I do have a few further
remarks, most notably a suggested rephrasing for the security
considerations section, but I believe they are all editorial in nature.

Section 5

nit: s/based header/basic header/

nit: s/stock/incorporate/ (or similar)

Section 5.3.1

  SCHC will send the second element of the URI-Path with the length
  (i.e., 0x2 X 6) followed by the query option (i.e., 0x05 "eth0").

I don't think I understand where the 0x05 comes from -- aren't there
only four non-NUL characters in "eth0"?

Section 6.3

(nit) I think the "The [RFC7967] defines a No-Response option limiting
the responses made by a server to a request" was better than the current
"The [RFC7967] defines a No-Response".

Section 7.1

  Note that a client located in an Application Server sending a request
  to a server located in the Device may not be compressed through this
  Rule since the MID will not start with 7 bits equal to 0.  A CoAP

nit(?): I am not 100% sure I understand the specifics here, but I think
the concern is just that the CoAP client in the Application Server might
be using the simple "single Message ID" strategy for all its outbound
requests, and thus might use more than 9 bits of message-ID space and
achieve the "not start with 7 bits equal to 0" condition.  As far as I
can tell, though, there is no fundamental reason why such requests would
*always* have a MID that does not start with 7 bits equal to zero, so I
would suggest s/will not/might not/.

Section 7.3

I recognize the width constraints of the table, but in Figure 13 the
"mapp-sent" CDA is not a term that seems to be used anywhere else in the
document.  I believe that it is okay to format this with a line break,
so that "mapping-" is on the first line and "sent" on the second.

  must include it without compression.  The use of integrity translates
  into an overhead in total message length, limiting the amount of
  compression that can be achieved and plays into the cost of adding
  security to the exchange.

nit: s/integrity/integrity protection/

  The piv field lends itself to having some bits masked off with "MSB"
  MO and "LSB" CDA.  This SCHC description could be useful in
  applications where the message frequency is low such as LPWAN
  technologies.  Note that compressing the sequence numbers may reduce
  the maximum number of sequence numbers used in an exchange.  Once the
  sequence number exceeds the maximum value, the OSCORE keys need to be
  re-established.

nit: s/maximum number of sequence numbers used in an exchange/maximum
number of sequence numbers that can be used in an exchange/

Section 9

The change to say that "when using another layer two, integrity
protection is mandatory" is enough to address my discuss point, but the
section as a whole is still fairly inscrutable in general.  If it's
useful, here's my take on how it could be written -- feel free to ignore
or take whichever parts you do/don't want.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

The use of SCHC header compression for CoAP header fields only affects
the representation of the header information.  SCHC header compression
itself does not increase or decrease the overall level of security of
the communication.  When the connection does not use a security protocol
(such as OSCORE, DTLS, etc.), it is necessary to use a layer-two
security mechanism to protect the SCHC messages.

If LPWAN is the layer-two technology, the SCHC security considerations
of [RFC8724] continue to apply.  When using another layer-two protocol,
use of a cryptographic integrity-protection mechanisms to protect the
SCHC headers is REQUIRED.  Such cryptographic integrity protection is
necessary in order to continue to provide the properties that [RFC8724]
relies upon.

When SCHC is used with OSCORE, the security considerations of [RFC8613]
continue to apply.

When SCHC is used with the OSCORE outer headers, the Initialization
Vector (IV) size in the Compression Residue must be carefully selected.
There is a tradeoff between compression efficiency (with a longer "MSB"
MO prefix) and the frequency at which the Device must renew its key
material (in order to prevent the IV from expanding to an uncompressable
value).  The key renewal operation itself requires several message
exchanges and requires energy-intensive computation, but the optimal
tradeoff will depend on the specifics of the device and expected usage
patterns.

If an attacker can introduce a corrupted SCHC-compressed packet onto a
link, DoS attacks are possible by causing excessive resource consumption
at the decompressor.  However, an attacker able to inject packets at the
link layer is also capable of other, potentially more damaging, attacks.

SCHC compression emits variable-length Compression Residues for some
CoAP fields.  In the compressed header representation, the length field
that is sent is not the length of the original header field but rather
the length of the Compression Residue that is being transmitted.  If a
corrupted packet arrives at the decompressor with a longer or shorter
length than the original compressed representation possessed, the SCHC
decompression procedures will detect an error and drop the packet.

SCHC header compression rules MUST remain tightly coupled between
compressor and decompressor.  If the compression rules get out of sync,
a Compression Residue might be decompressed differently at the receiver
than the initial message submitted to compression procedures.
Accordingly, any time the context Rules are updated on an OSCORE
endpoint, that endpoint MUST trigger OSCORE key re-establishment.
Similar procedures may be appropriate to signal Rule udpates when other
message-protection mechanisms are in use.
2021-03-01
18 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2021-01-21
18 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-18.txt
2021-01-21
18 (System) New version approved
2021-01-21
18 (System) Request for posting confirmation emailed to previous authors: Ana Minaburo , Laurent Toutain , Ricardo Andreasen
2021-01-21
18 Ana Minaburo Uploaded new revision
2021-01-21
17 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-17.txt
2021-01-21
17 (System) New version approved
2021-01-21
17 (System) Request for posting confirmation emailed to previous authors: Ana Minaburo , Laurent Toutain , Ricardo Andreasen
2021-01-21
17 Ana Minaburo Uploaded new revision
2020-12-10
16 Benjamin Kaduk
[Ballot discuss]
This point from my previous review does not seem to be addressed:

While the expanded security considerations do cover several important
points, I …
[Ballot discuss]
This point from my previous review does not seem to be addressed:

While the expanded security considerations do cover several important
points, I think it's important to specifically state that the RFC 8724
procedures assume that SCHC is implemented on top of LPWAN technologies
that implement security mechanisms.  I think we also need to specify
that either (a) this assumption remains for the CoAP usage of SCHC, or
that (b) CoAP has use cases outside of LPWAN, and when SCHC is used in
those non-LPWAN cases, the attacks (such as are now described in the
-15) are more readily performed than in the secure LPWAN environment
when no other integrity protection mechanism is in place for the
compressed packets.

I'm also still a bit confused by the examples in Section 2 -- the prose
says:

  In the first example, Figure 1, a Rule compresses the complete header
  stack from IPv6 to CoAP.  In this case, SCHC C/D (Static Context
  Header Compression Compressor/Decompressor) is performed at the
  device and the application.  The host communicating with the device
  does not implement SCHC C/D.

but the figure itself shows a box for SCHC in the NGW, and does not show
such a box in the Application.  How is the figure consistent with the
quoted prose?  (The new paragraph added after the figure seems to match
up more naturally with the figure; was the paragraph before the figure
intended to be deleted?)
2020-12-10
16 Benjamin Kaduk
[Ballot comment]
A few final editorial notes/nits.

Section 1

  REST-based (Representational state transfer) services.  Although CoAP
  was designed for Low-Power Wireless Personal Area …
[Ballot comment]
A few final editorial notes/nits.

Section 1

  REST-based (Representational state transfer) services.  Although CoAP
  was designed for Low-Power Wireless Personal Area Networks (6LoWPAN),
  a CoAP header's size is still too large for LPWAN (Low Power Wide
  Area Networks) and some compression of the CoAP header is required

I confess I read this too fast the first time and thought the "6LoWPAN"
was another "LPWAN" (which would be a pretty strange thing to say,
effectively that CoAP failed at its mission).  I can't speak with
certainty one way or the other whether 6LoWPAN was the sole focus of
CoAP development, so if you can't speak with certainty either, the more
generic "constrained devices" might be a better choice.

  RuleID and some residual bits.  Thus, different Rules may correspond
  to divers protocols packets that a device expects to send or receive.

nits: s/divers protocols/diverse protocol/

  In that case, a Compression/Decompression Action (CDA) associated
  with each field give the method to compress and decompress each

nit: s/give/gives/

Section 2

  This use case needs an end-to-end context initialization between the
  device and the application and is out-of-scope of this document.

nit: s/and is out-of-scope/that is out of scope/

  In the case of several SCHC instances, as shown in Figure 3 and
  Figure 3, the rulesets may come from different provisioning domains.

Was one of the '3's supposed to be a '2'?

Section 3.1

  o  The CoAP protocol is asymmetric; the headers are different for a
      request or a response.  For example, the URI-Path option is
      mandatory in the request, and it may not be present in the
      response.  A request may contain an Accept option, and the
      response may include a Content-Format option.  [...]

I'd suggest to replace all the "may"s with "might"s, but that's mostly
editorial.  ("Might" is much less likely to be misread as granting
permission as opposed to indicating a possibility.)

Section 7.3

nitty nit: Figures 18 and 21 list the FL for CoAP Token as just "tkl",
but "tkl" measures bytes and FL measures bits, so in some sense it is
off by a factor of 8.  (Indicating this while still fitting in the table
width seems nearly impossible, though.  Perhaps just some prose to
relate TKL to tkl would be enough.)

Section 9

My previous comments on the security considerations section do not
appear to have been acted upon; I believe they remain relevant and will
duplicate them here:

The need for additional English review is particularly pronounced in the
new text here.  (I am not attempting to note all instances that would
benefit from extra attention.)

  DoS attacks are possible if an intruder can introduce a compressed
  SCHC corrupted packet onto the link and cause a compression

nit: I think this would be "introduce a corrupted SCHC compressed
packet".

  efficiency reduction.  However, an intruder having the ability to add

Usually I think of "compression efficiency" as relating to the ratio of
sizes between compressed and uncompressed form.  What seems to be
described here is instead the resource efficiency of the entity
performing the decompression function, so I'd suggest using a different
phrasing, such as "excessive resource consumption at the decompressor".

  SCHC compression returns variable-length Residues for some CoAP
  fields.  In the compressed header, the length sent is not the
  original header field length but the length of the Residue.  So if a
  corrupted packet comes to the decompressor with a longer or shorter
  length than the one in the original header, SCHC decompression will
  detect an error and drops the packet.

I don't think I understand the mechanism being described here.  It
sounds as if there is supposed to be some error-checking ability between
the recovered (uncompressed) text and the original header, but I don't
see such a mechanism.  The length in the compressed packet is used to
interpret the residue and produce the recovered (uncompressed) value,
but the original packet is not available for comparison at that time.
If the length in the compressed packet is modified, then the
decompressor will get desychronized from the bit stream and start trying
to parse "random" data as the rest of the packet; that would be expected
to usually produce an error eventually, but I'm not convinced that this
is the mechanism referred to by "detect an error and drops [sic] the
packet".

The secdir review of the -15 made some good points and suggestions,
including pointing out in the security considerations that the typical
compression attacks we worry about aren't an issue here (and why).
2020-12-10
16 Benjamin Kaduk Ballot comment and discuss text updated for Benjamin Kaduk
2020-10-20
16 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-10-20
16 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-10-20
16 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-16.txt
2020-10-20
16 (System) New version approved
2020-10-20
16 (System) Request for posting confirmation emailed to previous authors: Ricardo Andreasen , lpwan-chairs@ietf.org, Laurent Toutain , Ana Minaburo
2020-10-20
16 Ana Minaburo Uploaded new revision
2020-07-16
15 Tero Kivinen Request for Telechat review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman. Submission of review completed at an earlier date.
2020-07-16
15 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-07-16
15 Robert Wilton
[Ballot comment]
Thanks for this document.  A couple of minor comments:

1.  Introduction

  SCHC is a general mechanism that can be applied to different …
[Ballot comment]
Thanks for this document.  A couple of minor comments:

1.  Introduction

  SCHC is a general mechanism that can be applied to different
  protocols, the exact Rules to be used depend on the protocol and the
  application.  The section 10 of the [rfc8724] describes the
  compression scheme for IPv6 and UDP headers.  This document targets
  the CoAP header compression using SCHC.

So what does this document actually define?

I read it as providing a mix of constraints that apply when encoding some CoAP fields in SDHC rules, and in other cases it provides guidance on how CoAP fields can be encoded in SDHC rules.  Is my understanding correct?  If so, a bit of text at the end of the introduction might be helpful.

Related to this, I note that some of the sub-sections in section 5 make use of RFC 2119 language and others don't.  Possibly the document would be more internally consistent if all the sub-sections in section 5 used 2119 language.


    2.  Applying SCHC to CoAP headers

    In the second example, Figure 2, ...  This use case realizes an End-to-
      End context initialization between the sender and the receiver and is
      out-of-scope of this document.
   
    ...
   
    This document focuses on CoAP compression represented in
    the dashed boxes in the previous figures.
   
These two comments seem to conflict with each other as to whether the second use case is covered or not?

    7.3.  Example OSCORE Compression

    Plaintext can be compressed up to only 1 byte (size of the RuleID).

"compressed down" would read better than "compressed up"

Thanks,
Rob
2020-07-16
15 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-07-16
15 Murray Kucherawy
[Ballot comment]
Thanks for addressing Alexey's and Francesca's earlier DISCUSS positions.

Abstract:

OLD:
  This draft defines the way Static Context Header Compression (SCHC)
  …
[Ballot comment]
Thanks for addressing Alexey's and Francesca's earlier DISCUSS positions.

Abstract:

OLD:
  This draft defines the way Static Context Header Compression (SCHC)
  header compression can be applied to the Constrained Application
  Protocol (CoAP). [...]
NEW:
  This draft defines the way Static Context Header Compression (SCHC)
  can be applied to the Constrained Application Protocol (CoAP). [...]

Generally, "SCHC header compression" everywhere beyond the Abstract seems redundant to me and can be replaced with just "SCHC".

Section 1:

* The text here introduces several terms with curious capitalization, such as "End-to-End" and "Rules".  If they have special meaning, they should be explicitly defined somewhere, otherwise I suggest just leaving them all lowercase.

* "... some bits to be sent, these values are ..." -- comma splice; start a new sentence here

* "... applied to different protocols, the exact Rules to be used ..." -- same

Section 2:

* "... defined in [rfc8724] document." -- remove "document"

Section 3.1:

* "The field Code have as well the same behavior, the 0.0X code format value in the request and Y.ZZ code format in the response." -- I'm afraid I don't understand this.

Section 4.3:

* "The code field indicates the Request Method used in CoAP, a IANA registry [rfc7252]." -- I can't parse this.  Does that mean the code field's possible values are listed in an IANA registry?  Which one?

Section 4.4:

* "... and the Least Significant Bits (LSB) CDA, see section ..." -- the stuff after the comma should be parenthesized instead; there are several instances of this in the document
2020-07-16
15 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2020-07-16
15 Murray Kucherawy
[Ballot comment]
Abstract:

OLD:
  This draft defines the way Static Context Header Compression (SCHC)
  header compression can be applied to the Constrained Application …
[Ballot comment]
Abstract:

OLD:
  This draft defines the way Static Context Header Compression (SCHC)
  header compression can be applied to the Constrained Application
  Protocol (CoAP). [...]
NEW:
  This draft defines the way Static Context Header Compression (SCHC)
  can be applied to the Constrained Application Protocol (CoAP). [...]

Generally, "SCHC header compression" everywhere beyond the Abstract seems redundant to me and can be replaced with just "SCHC".

Section 1:

* The text here introduces several terms with curious capitalization, such as "End-to-End" and "Rules".  If they have special meaning, they should be explicitly defined somewhere, otherwise I suggest just leaving them all lowercase.

* "... some bits to be sent, these values are ..." -- comma splice; start a new sentence here

* "... applied to different protocols, the exact Rules to be used ..." -- same

Section 2:

* "... defined in [rfc8724] document." -- remove "document"

Section 3.1:

* "The field Code have as well the same behavior, the 0.0X code format value in the request and Y.ZZ code format in the response." -- I'm afraid I don't understand this.

Section 4.3:

* "The code field indicates the Request Method used in CoAP, a IANA registry [rfc7252]." -- I can't parse this.  Does that mean the code field's possible values are listed in an IANA registry?  Which one?

Section 4.4:

* "... and the Least Significant Bits (LSB) CDA, see section ..." -- the stuff after the comma should be parenthesized instead; there are several instances of this in the document
2020-07-16
15 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-07-15
15 Erik Kline
[Ballot comment]
[[ comments ]]

[ section 1 ]

* "interop" -> "inter-operate"

[ section 2 ]

* "The host ... do not implement" -> …
[Ballot comment]
[[ comments ]]

[ section 1 ]

* "interop" -> "inter-operate"

[ section 2 ]

* "The host ... do not implement" -> "does not implement"

* Figure 2: "ene-to-end" -> "end-to-end"

* "and that they do not include" -> "and they do not include"

[ section 4.3 ]

* "cannot be compressed an the value" -> "cannot be compressed and the value"

[ section 5.0 ]

* "these assymetry" -> "this asymmetry"

[ section 5.3 ]

* "are a repeatable options" -> "are repeatable options"

[ section 9 ]

* "decompression will detect an error and drops the packet" ->
  "decompression will detect an error and drop the packet"
2020-07-15
15 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2020-07-15
15 Martin Duke
[Ballot comment]
Being new to both CoAP and SCHC, I found parts of this draft extremely tough going. Thanks very much for the examples; I …
[Ballot comment]
Being new to both CoAP and SCHC, I found parts of this draft extremely tough going. Thanks very much for the examples; I would have been totally lost without them. I trust that my comments here are mostly due to limited understanding, rather than some deeper issue...

Sec 1. I cannot parse this sentence at all: "CoAP is an End-to-End protocol at the application level, so CoAP
  compression requires to install common Rules between two hosts and IP
  Routing may be needed to allow End-to-End communication."

What are you trying to say here?

Sec 2. I do not understand the symbolism of these figures.

- What are the many parentheses and dashed lines at the bottom of each one?

- I take it that the "SCHC" box implies that everything above it is header-compressed, up until it hits another "SCHC?" IIUC SCHC compresses one or two layers in the stack, rather than being a layer below.

- Finally, the explanation of dashed boxes vs dotted boxes is at the very end of the section. Please move it to before the first figure.

Sec 3. Expand "TV" on first use.

Sec 4.5. "  Token Value MUST NOT be sent as a variable length residue to avoid
  ambiguity with Token Length.  Therefore, Token Length value MUST be
  used to define the size of the Compression Residue."

After looking through the example, I think this means that because the Token Length is being repurposed, it is not available to define variable token lengths. Maybe switch the order of the sentences. It seems like the first flows from the second. In addition, for Token Value not to be sent as variable length, that imposes constraints on the rule set, right? It would be good to clarify exactly what a rule set must do to create this outcome.

Sec.5. s/these assmetry/this asymmetry
2020-07-15
15 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-07-15
15 Benjamin Kaduk
[Ballot discuss]
I don't think we quite managed to catch all the collatoral damage from
my previous discuss points on the -13.  In particular, while …
[Ballot discuss]
I don't think we quite managed to catch all the collatoral damage from
my previous discuss points on the -13.  In particular, while Sections
5.x no longer attempt to discuss directionality of CoAP Options, there
are some in-passing references to them in Section 3.1:

- There's a claim that URI-Path (though, spelled as "URI-path") is not
  present in the response, which is incorrect.

- There's a reference to a nonexistent "Content" option as being present
  only in a response, but the "Content-Format" option is allowed in both
  requests and responses.  (See, e.g., the PUT method for use of
  Content-Format in a request.)

- The "Accept" option is referenced as only being present in requests.
  This seems to be accurate as far as I can see in RFC 7252, though in
  light of the near-complete removal of such references from this
  document, perhaps it should also be removed.

While the expanded security considerations do cover several important
points, I think it's important to specifically state that the RFC 8724
procedures assume that SCHC is implemented on top of LPWAN technologies
that implement security mechanisms.  I think we also need to specify
that either (a) this assumption remains for the CoAP usage of SCHC, or
that (b) CoAP has use cases outside of LPWAN, and when SCHC is used in
those non-LPWAN cases, the attacks (such as are now described in the
-15) are more readily performed than in the secure LPWAN environment
when no other integrity protection mechanism is in place for the
compressed packets.

As Francesca noted on the -13, we need to acknowledge that there are and
will be in the future CoAP options that are not included in this
document and provide some indication of how they might be handled.
Whether that's to define new compression rules/guidance for them, always
send them as full residuals, or some other behavior can be decided in
the future on a per-option basis, but we can give some guidance here on
how we plan to support extensibility of options.

---

The -15 introduced some new text in the Introduction:

  CoAP is an End-to-End protocol at the application level, so CoAP
  compression requires to install common Rules between two hosts and IP

It's not entirely clear to me that this is true, given that CoAP proxies
are a first-class protocol feature.  OSCORE is probably fair to describe
as end-to-end, but CoAP itself may not be.

Also, the new examples in Section 2 are sufficiently hard to follow that
I can't be sure the figures and the prose descriptions are internally
consistent.  (See COMMENT for a few more specifics.)
2020-07-15
15 Benjamin Kaduk
[Ballot comment]
Thank you for the updates in response to my comments on the -13; they do
help.  I have a smaller volume of comments …
[Ballot comment]
Thank you for the updates in response to my comments on the -13; they do
help.  I have a smaller volume of comments this time around :)

Abstract

References are not allowed in the abstract, so you should probably just
write out "RFC 8724".

Introduction

  CoAP [rfc7252] is designed to easily interop with HTTP (Hypertext

What does "designed to easily interop with" mean?  CoAP and HTTP don't
interoperate directly, given that they are different protocols...

  done.  The context is known by both ends before transmission.  The
  way the context is configured, provisioned or exchanged is out of the
  scope of this document.

(editorial) I'd suggest rephrasing to something more like "The SCHC
compression scheme assumes as a prerequisite that the static context is
known to both endpoints before transmission."

  CoAP is an End-to-End protocol at the application level, so CoAP
  compression requires to install common Rules between two hosts and IP
  Routing may be needed to allow End-to-End communication.  Therefore,
  SCHC compression may apply at two different levels, one to compress
  IP and UDP as described in [rfc8724] in the LPWAN network and another
  at the application level.  These two compressions may be independent.

I think you want to reframe this in terms of the potential for there to
be multiple IP (UDP seems perhaps less likely?) entities processing the
packet between CoAP entities that process the packet, and note that the
IP compression may be removed by an intermediary in situations where
configured to do so.

  The Compression Rules can be set up by two independent entities and
  are out of the scope of this document.  In both cases, SCHC mechanism
  remains the same.

(nit) I don't think "remains the same" is the best wording here; there
are clearly going to be differences of some form between compression at
the UDP layer and compression at the CoAP layer, even though the overall
structure/procedures for compressing/decompressing at those layers are
analogous to each other.

  A Matching Operator (MO) is associated to each header field
  description.  The Rule is selected if all the MOs fit the TVs for all
  fields of the incoming header.

I strongly suggest reiterating that the presence of a header field that
does not have a corresponding MO in the Rule means that the Rule does
not apply to that packet.

  After applying the compression there may be some bits to be sent,
  these values are called Compression Residues.

nit: comma splice.

Section 2

I think that these examples would benefit from a fair bit more
description/discussion text.  For example, if SCHC in Figure 1 is
supposed to be compressing everything from IPv6 to CoAP, why is SCHC
beween LPWAN and IPv6 (vs above IPv6), and why does the full stack still
appear at the 'device'?  If the Sender and Receiver are to be the device
and App, then why is SCHC not apparent at the Receiver (app)?  I can't
find a consistent way to interpret the text and the figure.
(Figures 2 and 3 have both dotted lines and dashed lines.  Why are they
different?  Etc.)

Section 3.1

  o  The CoAP protocol is asymmetric, the headers are different for a
      request or a response.  For example, the URI-path option is

nit: comma splice.

  o  Headers in IPv6 and UDP have a fixed size.  The size is not sent
      as part of the Compression Residue, but is defined in the Rule.
      Some CoAP header fields have variable lengths, so the length is
      also specified in the Field Description.  For example, the Token

RFC 8724 uses "Field Descriptor", not "Field Description".

Section 5

  the description of the Option by using in the Field ID the Option
  Number built from D-T; in TV, the Option Value; and the Option Length
  uses section 7.4 of RFC8724.  When the Option Length has a wellknown

(It looks like the subsections of 7.4 are also important, though we
probably don't need to literally say "section 7.4 and subsections".)

Section 5.2

I'm still confused why Max-Age, Uri-Host, and Uri-Port are in the same
section.  We talk about "the duration", but that seems to only apply to
Max-Age.

  Otherwise these options can be sent as a Compression Residue (fixed
  or variable length).

I'm not sure that there's going to be a practical scenario where a
fixed-length residue is workable for anay of these three CoAP Options.

Section 5.4

As far as I can tell, Proxy-URI and Proxy-Scheme are indeed
unidirectional (only sent in requests).  It would perhaps be appropriate
to codify this restirction in the compression rules, though I can
understand if the general desire is to not add an additional layer of
restrictions beyond the core CoAP specificiation.

Section 6.2

  Since an RST message may be sent to inform a server that the client
  does not require Observe response, a Rule MUST allow the transmission
  of this message.

Is this saying that if you have a rule that allows sending Observe, you
MUST also have a rule allowing RST?  It might be worth making that more
explicit.

Section 6.4

  The first byte specifies the content of the OSCORE options using
  flags.  The three most significant bits of this byte are reserved and

nit: s/options/option/.

  This specification recommends identifying the OSCORE Option and the
  fields it contains Conceptually, it discerns up to 4 distinct pieces
  of information within the OSCORE option: the flag bits, the piv, the

I'm not sure what was intended to happen here.  Either there's a missing
full stop or a wrongly capitalized word, at a start, but perhaps there
was also supposed to be some additional rewording to join the sentences
together more fluidly.

  The OSCORE Option shows superimposed these four fields using the
  format Figure 6, the CoAP OSCORE_kidctxt field includes the size bits
  s.

The rewording went awry here.  I think it's supposed to be more like
"Figure 6 shows the OSCORE Option format with those four fields
superimposed on it.  Note that the CoAP OSCORE_kidctxt field includes
the size octet s".

(Also, I am not sure I've seen the "ctxt" abbreviation anywhere other
than this document.  Just "ctx" seems much more common in my
experience.)

Section 7.1

  immediately acknowledged by the Device.  For this simple scenario,
  the Rules are described Figure 7.

nit: "described in".

Section 9

The need for additional English review is particularly pronounced in the
new text here.  (I am not attempting to note all instances that would
benefit from extra attention.)

  DoS attacks are possible if an intruder can introduce a compressed
  SCHC corrupted packet onto the link and cause a compression

nit: I think this would be "introduce a corrupted SCHC compressed
packet".

  efficiency reduction.  However, an intruder having the ability to add

Usually I think of "compression efficiency" as relating to the ratio of
sizes between compressed and uncompressed form.  What seems to be
described here is instead the resource efficiency of the entity
performing the decompression function, so I'd suggest using a different
phrasing, such as "excessive resource consumption at the decompressor".

  SCHC compression returns variable-length Residues for some CoAP
  fields.  In the compressed header, the length sent is not the
  original header field length but the length of the Residue.  So if a
  corrupted packet comes to the decompressor with a longer or shorter
  length than the one in the original header, SCHC decompression will
  detect an error and drops the packet.

I don't think I understand the mechanism being described here.  It
sounds as if there is supposed to be some error-checking ability between
the recovered (uncompressed) text and the original header, but I don't
see such a mechanism.  The length in the compressed packet is used to
interpret the residue and produce the recovered (uncompressed) value,
but the original packet is not available for comparison at that time.
If the length in the compressed packet is modified, then the
decompressor will get desychronized from the bit stream and start trying
to parse "random" data as the rest of the packet; that would be expected
to usually produce an error eventually, but I'm not convinced that this
is the mechanism referred to by "detect an error and drops [sic] the
packet".

The secdir review of the -15 made some good points and suggestions,
including pointing out in the security considerations that the typical
compression attacks we worry about aren't an issue here (and why).
2020-07-15
15 Benjamin Kaduk Ballot comment and discuss text updated for Benjamin Kaduk
2020-07-13
15 Tero Kivinen Request for Telechat review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman.
2020-07-13
15 Roman Danyliw [Ballot comment]
I support Ben Kaduk's DISCUSS position.

Thank you for addressing my DISCUSS and COMMENT points.
2020-07-13
15 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2020-07-10
15 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-07-10
15 Tero Kivinen Request for Telechat review by SECDIR is assigned to Charlie Kaufman
2020-07-10
15 Tero Kivinen Request for Telechat review by SECDIR is assigned to Charlie Kaufman
2020-07-08
15 Éric Vyncke
[Ballot comment]
Thank you for addressing my COMMENTs raised in March 2020 and thank you for also addressing other DISCUSS and COMMENT from the March …
[Ballot comment]
Thank you for addressing my COMMENTs raised in March 2020 and thank you for also addressing other DISCUSS and COMMENT from the March 2020 IEGS evaluation.

Regards

-éric
2020-07-08
15 Éric Vyncke [Ballot Position Update] Position for Éric Vyncke has been changed to Yes from No Objection
2020-07-06
15 Éric Vyncke Telechat date has been changed to 2020-07-16 from 2020-03-19
2020-07-06
15 Éric Vyncke IESG state changed to IESG Evaluation from IESG Evaluation::AD Followup
2020-07-03
15 Magnus Westerlund [Ballot comment]
Thanks for addressing my issues.
2020-07-03
15 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss
2020-07-03
15 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-07-03
15 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-15.txt
2020-07-03
15 (System) New version approved
2020-07-03
15 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , Ricardo Andreasen , lpwan-chairs@ietf.org
2020-07-03
15 Laurent Toutain Uploaded new revision
2020-07-02
14 Éric Vyncke IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup
2020-05-26
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-05-26
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-05-26
14 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-14.txt
2020-05-26
14 (System) New version approved
2020-05-26
14 (System) Request for posting confirmation emailed to previous authors: lpwan-chairs@ietf.org, Ricardo Andreasen , Laurent Toutain , Ana Minaburo
2020-05-26
14 Ana Minaburo Uploaded new revision
2020-03-25
13 Suresh Krishnan Shepherding AD changed to Éric Vyncke
2020-03-20
13 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman. Submission of review completed at an earlier date.
2020-03-12
13 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman.
2020-03-12
13 Cindy Morgan Telechat date has been changed to 2020-03-19 from 2020-03-12
2020-03-12
13 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-03-12
13 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2020-03-12
13 Alexey Melnikov
[Ballot discuss]
I agree with Ben's first 2 DISCUSS points.

**********************************************************************
* Note, that I am conducting an experiment when people aspiring to be*
* …
[Ballot discuss]
I agree with Ben's first 2 DISCUSS points.

**********************************************************************
* Note, that I am conducting an experiment when people aspiring to be*
* Area Directors get exposed to AD work ("AD shadowing experiment"). *
* As a part of this experiment they get to review documents on IESG  *
* telechats according to IESG Discuss criteria document and their    *
* comments get relayed pretty much verbatim to relevant editors/WGs. *
* As an AD I retain responsibility in defending their position when  *
* I agree with it.                                                  *
* Recipients of these reviews are encouraged to reply to me directly *
* about perceived successes or failures of this experiment.          *
**********************************************************************

The following comments were provided by Francesca Palombini .
My comments are marked with [[Alexey:]] below.

Francesca would have balloted *DISCUSS* on this document. She wrote:

Discuss:

Either I am missing something about "unirectional" and "bidirectional" definition (which I read as can either be present in only one direction request/response or both), or the following sections are wrong:

section 5.1 - assuming it is Content-Format, the option is bidirectional, it can be set either in a request or response, for example a PUT request can contain a Content-Format
section 5.4 - Size1 and Size2 are bidirectional, and can be used both in req and resp (see RFC7959 sect 4)
Section 5.5 - ETag is also Bidirectional (see RFC7252 section 5.10.6.1 and 5.10.6.2)

There are more options being defined and not specified in the document: https://www.iana.org/assignments/core-parameters/core-parameters.xhtml#option-numbers for example, Hop-Limit is one. There needs to be some discussion about those, or some considerations on those being out of scope.
2020-03-12
13 Alexey Melnikov
[Ballot comment]
Francesca also provided the following comments:

Comment:

Section 4.2 CoAP type field: better to reference the IANA registry rather than this section, as …
[Ballot comment]
Francesca also provided the following comments:

Comment:

Section 4.2 CoAP type field: better to reference the IANA registry rather than this section, as additional Code fields not defined in RFC7252 can be registered.
Section 7.4 : s/CONTENT/Content
2020-03-12
13 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to Discuss from No Objection
2020-03-12
13 Magnus Westerlund
[Ballot discuss]
Reviewing this document and its application to compress case two and three stacks in Figure 1, i.e. with some end-to-end encryption appears to …
[Ballot discuss]
Reviewing this document and its application to compress case two and three stacks in Figure 1, i.e. with some end-to-end encryption appears to significantly change an assumption from the SCHC for IPv6/UDP. Namely, the assumption about context establishment. In normal SCHC the contexts are established between the Device and the NGW. In these end-to-end encrypted case the context establishing party for the COAP compression is the APP and the APP layer in the device. This difference appear completely ignored in this document. I think this is a significant difference as having the device and NGW run a protocol for establishing context over the L2 or L3 with the local context knowledge is fairly straightforward. However, in this case when the COAP peer on the internet side of the NGW this determination and configuration is a different matter.

From my perspective some more discussion of the fact that this is a different context and that it have different challenges in establishing the context should be made clear in the document.
2020-03-12
13 Magnus Westerlund
[Ballot comment]
I would also note that the TSV-ART review did find an issue with the an underlying assumption in draft-ietf-lpwan-ipv6-static-context-hc which is not yet …
[Ballot comment]
I would also note that the TSV-ART review did find an issue with the an underlying assumption in draft-ietf-lpwan-ipv6-static-context-hc which is not yet published. The issue is that the assumption that the UDP length field is redundant will not be true when https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/ gets approved. Thus the question arises if this assumption should be amended or not in the underlying technology. I note this here primarily so that it is discussed by the WG and the responsible AD.
2020-03-12
13 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund
2020-03-12
13 Mirja Kühlewind
[Ballot comment]
The TSV-ART review flagged a problem with draft-ietf-lpwan-ipv6-static-context-hc (Thanks Joe) which is a normative dependency but is already in RFC editor state. Ben …
[Ballot comment]
The TSV-ART review flagged a problem with draft-ietf-lpwan-ipv6-static-context-hc (Thanks Joe) which is a normative dependency but is already in RFC editor state. Ben also already captured this in his ballot. I also think it would be important to address this problem before final publication (of both docs) and the TSV ADs will coordinate with the INT ADs on this.

Minor comment:
Sec 7.3:
"  The Outer SCHC Rules (Figure 16) MUST process the OSCORE Options
  fields. "
The example section should probably not have normative language.
2020-03-12
13 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2020-03-12
13 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. With the heavy load on this week telechat and all meetings related to the …
[Ballot comment]
Thank you for the work put into this document. With the heavy load on this week telechat and all meetings related to the cancellation of the IETF-107 in-person meeting, I must admit that this review was not as thorough as I would hope :-(

I am also trusting the ART AD for their review of the CoAP protocol compression.

Please find below some non-blocking COMMENTs and NITs.
Regards,

-éric

== COMMENTS ==
I support Barry's COMMENT on the section 1.

-- Section 2 --
Would benefit from a clear explanation of the "Sender" and "Receiver" probably in the terminology section.

== NITS ==
In many places, the acronyms are followed by their expansions, I recommend to use the other way: expansion (acronym)

-- section 1 --
Fix the bullet list that appears broken in the text "one of 4 actions:..."

-- Section 3.1 --
Same as above for "applying the CDA:..."
2020-03-12
13 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-03-11
13 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2020-03-11
13 Barry Leiba
[Ballot comment]
This first item is almost a DISCUSS, but as I'm sure it's not a controversial point and just an editorial thing that will …
[Ballot comment]
This first item is almost a DISCUSS, but as I'm sure it's not a controversial point and just an editorial thing that will get fixed, I'm just putting it down here.

— Section 1 —

  CoAP [rfc7252] is a transfer protocol that implements a subset of
  HTTP (Hypertext Transfer Protocol) and is optimized for REST-based
  (Representational state transfer) services.

Important: this statement is not true.  CoAP is not a subset of HTTP, and nowhere does CoAP claim that.  You might instead combine some of these statements from the CoAP spec:

  CoAP is designed to easily interface with HTTP
  for integration with the Web while meeting specialized requirements
  such as multicast support, very low overhead, and simplicity for
  constrained environments.

  One of the main goals of CoAP is to design a generic web protocol for
  the special requirements of this constrained environment

  The goal of CoAP is not to blindly compress HTTP,
  but rather to realize a subset of REST common with HTTP
  but optimized for M2M applications.

However you fix this, please do fix it.

— Section 3 —
It appears as if a different author wrote this, compared with the earlier text.  I’m not calling out every issue, in the interest of review time, but am only citing some examples.  In general, it would be good to have someone go through and edit this sections 3 and 3.1 for clarity.  If you wait for the RFC Editor staff to do it, we could end up with errors that we miss catching, because they don’t have the technical background in this topic.

  SCHC with CoAP will be used exactly the same way as it is applied in
  any protocol as IP or UDP with the difference that the fields
  description needs to be defined based on both headers and target
  values of the request and the responses.  SCHC Rules description use
  the direction information to optmize the compression by reducing the
  number of Rules needed to compress traffic.

I’ve tried several times to understand the first sentence, and I can’t.  It isn’t parseable, and I don’t know what you’re trying to say.  The second sentence also needs work to make it readable.  Can you please try to reword these?

— Section 3.1 —
The title and the first sentence stopped me for a bit: why would you be comparing CoAP with IPv6?  You should be clear right up front that you’re talking about differences in compressing CoAP compared with compressing the other protocols, to explain why there’s a difference in how the compression works.  Please say that at the start.  (Perhaps that’s part of what you tried to say in Section 3, which I didn’t understand?)

  o  In IPv6 and UDP, header fields have a fixed size, defined in the
      Rule, which is not sent.

The Rule is not sent?  Or do you mean the size is not sent?  I think you want to say something like, “Header fields in IPv6 and UDP have fixed sizes.  The size is not sent as part of the header, but is defined in the Rule.”

      In CoAP, some fields in the header have
      a variable length, for example the Token size may vary from 0 to 8
      bytes, the length is given by a field in the header.

Sentences like this are actually multiple sentences glued together, and are hard to read.  In this example, I suggest this: “Some CoAP header fields have variable lengths, so the length is also specified in a header field.  For example, the Token field can vary from 0 to 8 bytes in length.”

— Section 4.5 —

  Token Value MUST not be sent as a variable length residue

Make it “MUST NOT”.
2020-03-11
13 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-03-11
13 Alissa Cooper
[Ballot comment]
I support Roman's and Benjamin's DISCUSS positions about the security considerations. The Gen-ART reviewer raised concerns about this as well that have not …
[Ballot comment]
I support Roman's and Benjamin's DISCUSS positions about the security considerations. The Gen-ART reviewer raised concerns about this as well that have not been fully addressed.
2020-03-11
13 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2020-03-11
13 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-03-11
13 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-03-11
13 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from No Record
2020-03-11
13 Alexey Melnikov [Ballot comment]
I agree with Ben's first 2 DISCUSS points.
2020-03-11
13 Alexey Melnikov Ballot comment text updated for Alexey Melnikov
2020-03-10
13 Roman Danyliw
[Ballot discuss]
**  Section 9. (as Paul Wouters mentioned in his SECDIR review, thanks Paul!) Per “This document does not have any more Security consideration …
[Ballot discuss]
**  Section 9. (as Paul Wouters mentioned in his SECDIR review, thanks Paul!) Per “This document does not have any more Security consideration than the ones already raised on [I-D.ietf-lpwan-ipv6-static-context-hc]”, this reference in Section 12 (Security Considerations) contains the statement that “SCHC is expected to be implemented on top of LPWAN technologies, which are expected to implement security measures.”, this assumption doesn't necessarily seem valid here?  What are the implications?

** Section 9.  Per “The size of the Initialisation Vector residue size must be considered carefully. A too large value has a impact on the compression efficiency and a too small value will force the device to renew its key more often.”, can you be a bit clearer on the tradeoff:

-- how small is still acceptable given the security properties that still need to be preserved in the AEAD nonce?

-- Given a particular smaller size, what factors would would influence more frequent key renewal?
2020-03-10
13 Roman Danyliw Ballot discuss text updated for Roman Danyliw
2020-03-10
13 Roman Danyliw
[Ballot discuss]
**  Section 9. (as Paul Wouters mentioned in his SECDIR review, thanks Paul!) Per “This document does not have any more Security consideration …
[Ballot discuss]
**  Section 9. (as Paul Wouters mentioned in his SECDIR review, thanks Paul!) Per “This document does not have any more Security consideration than the ones already raised on [I-D.ietf-lpwan-ipv6-static-context-hc]”, this reference in Section 12 (Security Considerations) contains the statement that “SCHC is expected to be implemented on top of LPWAN technologies, which are expected to implement security measures.”, is that assumption valid here?  If it is not, what are the implications?

** Section 9.  Per “The size of the Initialisation Vector residue size must be considered carefully. A too large value has a impact on the compression efficiency and a too small value will force the device to renew its key more often.”, can you be a bit clearer on the tradeoff:

-- how small is still acceptable given the security properties that still need to be preserved in the AEAD nonce?

-- Given a particular smaller size, what factors would would influence more frequent key renewal?
2020-03-10
13 Roman Danyliw
[Ballot comment]
I support Ben Kaduk's DISCUSS position.

** Section 9.  Does it make sense to: s/the packet must be dropped by the decompressor/the packet …
[Ballot comment]
I support Ben Kaduk's DISCUSS position.

** Section 9.  Does it make sense to: s/the packet must be dropped by the decompressor/the packet MUST be dropped by the decompressor/?

** Editorial Nits:
-- Section 3.1. s/knwoledge/knowledge/
-- Section 3. Typo. s/optmize/optimize/
2020-03-10
13 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2020-03-10
13 Benjamin Kaduk
[Ballot discuss]
Section 5.2 claims that Uri-Host and URI-Port are unidirectional from
server to client and "[are] never found in client requests", which seems
to …
[Ballot discuss]
Section 5.2 claims that Uri-Host and URI-Port are unidirectional from
server to client and "[are] never found in client requests", which seems
to contradict Section 5.10.1 of RFC 7252.  It seems like maybe this
section is supposed to only cover Max-Age, with Uri-Host and Uri-Port
rolled into Section 5.3 along with Uri-Path and Uri-Query?

Similarly, Section 5.4 says that size1 and size2 are unidirectional
(only in requests), which does not seem to be accurate given my reading
of RFCs 7252 and 7599.

I also think that we need some further discussion (e.g., in the security
considerations) about how the base LPWAN SCHC document assumes that
MAC-layer LPWAN security mechanisms are in use, but that CoAP is not
restricted to such contexts.  What additional security considerations
are relevant when this compression is used for CoAP without LPWAN
MAC-layer cryptographic protection?

Perhaps not really a Discuss on this document, but what is the planned
disposition of the tsv-art reviewer's comments regarding
draft-ietf-lpwan-ipv6-static-context-hc and UDP Options?  I did not see
anything pertinent in the mailarchive.
2020-03-10
13 Benjamin Kaduk
[Ballot comment]
Please respond to the secdir review; I don't trust my own response to be
a comprehensive one that addresses all the raised potential …
[Ballot comment]
Please respond to the secdir review; I don't trust my own response to be
a comprehensive one that addresses all the raised potential issues.

This document is targeting Proposed Standard status, but in some sense
it's not clear that it is specifying a protocol per se, as opposed to
illustrating a set of choices that can be made for applying the SCHC
technique to CoAP messages.  These choices are expected to be generally
useful, but since the SCHC rules must be preagreed by all entities in
advance, there's not really anything to prevent a deployment from using
a modified version of these procedures, in terms of lost
interoperability.  In addition, the shepherd writeup mentions that there
may be some desire to do a refresh in the future, after more
implementation experience is gained.  So I don't have a great sense as
to which parts of this document are better as Proposed Standard vs.
Informational.

Abstract

  This draft defines the way SCHC (Static Context Header Compression)
  header compression can be applied to the CoAP protocol.  SCHC is a
  header compression mechanism adapted for constrained devices.  SCHC

Is it also in some sense a key requirement that these constrained
devices produce a fairly consistent or deterministic class of output?

Section 1

  SCHC compresses and decompresses headers based on shared contexts
  between devices.  Each context consists of multiple Rules.  Each rule
  can match header fields and specific values or ranges of values.  If
  a rule matches, the matched header fields are substituted by the rule
  ID and optionally some residual bits.  Thus, different Rules may

Do I remember corectly that an SCHC rule matching implies that the
entire header structure matches (i.e., there are no fields in the header
not listed in the rule)?  If so, perhaps a slight rephrasing to "If a
packet header fully matches a rule" would be helpful.

  Compression mainly results in one of 4 actions: * send the field
  value, * send nothing, * send some least significant bits of the
  field or * send an index.  After applying the compression there may
  be some bits to be sent, these values are called Compression
  Residues.

[It looks like this is generated from Markdown and needs additional
blank lines between bullet points]

  SCHC is a general concept mechanism that can be applied to different

nit: "concept" is a noun, not an adjective, so this doesn't parse
properly.

  protocols, the exact Rules to be used depend on the protocol and the
  application, and CoAP differs from UDP and IPv6, see Section 3.

nit: comma splice ("the exact rules [...]" is a complete sentence).

Section 2

  In the third example, OSCORE [rfc8613] is used.  In this case, two
  rulesets are used to compress the CoAP message.  A first ruleset
  focused on the inner header and is applied end to end by both ends.
  A second ruleset compresses the outer header and the layers below and
  is done between the Sender and the Receiver.

Is it worth having a parllel style and mentioning that the outer
compression can be modified hop by hop (in contrast to the inner
end-to-end compression)?

Section 3

  SCHC with CoAP will be used exactly the same way as it is applied in
  any protocol as IP or UDP with the difference that the fields
  description needs to be defined based on both headers and target
  values of the request and the responses.  SCHC Rules description use

If there's a difference, it's not "exactly the same".

Section 3.1

      return path (e.g. source and destination addresses fields).  The
      CoAP headers instead are asymmetric, the headers are different for
      a request or a response.  For example, the URI-path option is

nit: comma splice

  o  Even when a field is "symmetric" (i.e. found in both directions)
      the values carried in each direction are different.  To performs
      the compression a matching list in the TV might be use because

nit: "used".

      field two cases may be raised after applying the CDA: * The result
      of the compression is of fixed length and the compressed value is
      sent in the residue.  * Or the result of the compression is of
      variable-length and in this case, the size is sent with the
      compressed value in the residue.

[another presumed-markdown list, though this one might be easier to
reformat just as running text, since there are only two options]

  o  In CoAP headers, a field can appear several times.  This is
      typical for elements of a URI (path or queries).  The SCHC
      specification [I-D.ietf-lpwan-ipv6-static-context-hc] allows a
      Field ID to appears several times in the rule, and uses the Field
      Position (FP) to identify the correct instance, and thereby
      removing the ambiguity of the matching operation.

draft-ietf-lpwan-ipv6-static-context-hc notes that there can be issues
when using a FP of zero for "don't care"; perhaps it's worth noting that
these issues are pretty certain to occur for URI-path?

  o  Field sizes defined in the CoAP protocol can be too large
      regarding LPWAN traffic constraints.  This is particularly true
      for the Message ID field and the Token field.  SCHC uses different
      Matching operators (MO) to performs the compression, see section
      7.4 of [I-D.ietf-lpwan-ipv6-static-context-hc].  In this case the
      Most Significant Bits (MSB) MO can be applied to reduce the
      information carried on LP

This text was a bit hard for me to unwind, especially "field sizes [...]
too large regarding LPWAN traffic constraints".  At first I thought it
was saying that CoAP fields were problematic for SCHC (though I can no
longer see why I would think that), and then that the "length" of
various length+value encodings in CoAP allowed me to pick a length that
would be problematic for LPWAN, before arriving to my current conclusion
that it's just saying "some fields in CoAP are large and will only take
on a narrow range of values in a LPWAN context, providing a lot of
static bits that can be compressed using the MSB MO".  In essence, I
don't know that the "regarding LPWAN traffic constraints" is the most
effective language to use; emphasizing that the fields are large and
mostly unchanging, and that LPWAN needs to care about those wasted bits,
seems to be the important part.

Section 4.3

  If the device only implements a CoAP client, the request code can be
  reduced to the set of requests the client is able to process.

nit(?): "process" or "produce"?

  A mapping list can be used for known values, for other values the
  field cannot be compressed an the value needs to be sent in the
  residue.

nit: s/an/and/

Section 4.4

It seems like some guidance is in order about choosing how many bits to
compress, based on the frequency of traffic generated,
EXCHANGE_LIFETIME, and any other factors used to pick a message ID range
for a given device.

Section 4.5

  Token Length is processed as any protocol field.  If the value does
  not change, the size can be stored in the TV and elided during the
  transmission.  Otherwise, it will have to be sent in the compression
  residue.
  [...]
  used to define the size of the residue.  A specific function
  designated as "TKL" MUST be used in the Rule.  During the
  decompression, this function returns the value contained in the Token
  Length field.

I'm not sure I understand how these two parts fit together.  I
understand that CoAP places a tight binding betwen the TKL value and the
length of the token field, and so if SCHC tried to treat them
differently we could break a CoAP invariant (this seems to be the
"ambiguity" that we seek to avoid, per the trimmed quote).  But the last
part seems to say that the TKL function to give the actual token length
is part of the Rule, and the former part says that if the CoAP Token
Length is variable, it will be sent in the compression residue -- if the
Token Length is a compression residue then that seems to imply that it
is not fixed by the Rule, and thus I'm not sure what the procedure is
supposed to be with this "TKL function".  Furthermore, I don't see
specification of the TKL function later in the document.  I guess it's
supposed to take as input information from the Rule's definition and the
token length residue in order to output the length of the transmitted
token residue, but that does not seem very clearly spelled out.  (Also,
I'm not sure whether the token residue would necessarily be the entire
token or the rule could allow some prefix to be compressed...)

Section 5

Would it be appropriate to give some guidance about who will have to do
what in order to cope with new CoAP Options defined in the future?

I'm also not sure that there's much rhetorical benefit in trying to
distinguish between Options defined in the core CoAP spec and subsequent
additions Section 5 vs. Section 6); they seem to be functionally the
same from an implementor's point of view.  (Well, maybe not OSCORE.)

There are also a few of Options in the current registry that are not
given any treatment here (whether in Section 5 or Section 6); should we
mention that?  (Hop-Limit, OCF-*, ...)

Section 5.1

I see only "Content-Format" and "Accept" Options defined in RFC 7252, but
no "Content" option.

  used to limit the size of the residue.  Otherwise, the value has to
  be sent as a residue (fixed or variable length).

The content format is an integer in the range 0-65535, and if we don't
know enough about what can be used to have a match-list, how can we make
assumptions about a variable-length residue being better than a
fixed-length one?

Section 5.3

[Perhaps the interaction between FP and Uri-Path that I mentioned above
could be discussed here instead.]

This specification of the regrouping operation and the table in the
figure seem a bit in need of further clarification.  Perhaps "Even
though there are two distinct URI-Path fields to match, the target
values for all regrouped path components are consolidated into a single
logical "target value" (with the appropriate number of path components)
to be matched.  The components of the target value must individually
match with the URI-Path field values in the indicated field positions.
Note specifically that the FP values, as indicated in the example, are
not required to be consecutive values; in this case the path components
in the target value are a matter of convenience and would have
additional components inserted in order to match the actual resource
path in question.  For the subsequent Uri-Path fields in the rule, no
target value is given and the match operation is listed as "ignore" for
convenience; the actual matching has occured on the grouped value listed
in the first field's entry."  (I'm not sure why the CDA is listed as
"value-sent" for FP 3 in the example, though.)

Section 5.3.2

  be created to cover all the possibilities.  Another possibility is to
  define the length of Uri-Path to variable and send a compression
  residue with a length of 0 to indicate that this Uri-Path is empty.

I'm not sure I understand this proposal.  Is it to say that you could
have a single rule that lists the maximum expected number of path
components, and then use "empty component"s to represent the compressed
form of shorter paths?  It seems like this still has a hard cap on the
number of path components that could be represented by a given Rule,
which would be a significant limitation and needs to be called out.

Section 5.4

  [I-D.ietf-lpwan-ipv6-static-context-hc].  They are used only by the
  client to access a specific resource and are never found in server
  response.

nit: singular/plural mismatch "they are"/"server response"

  If the field value has to be sent, TV is not set, MO is set to
  "ignore" and CDA is set to "value-sent".  A mapping MAY also be used.

  Otherwise, the TV is set to the value, MO is set to "equal" and CDA
  is set to "not-sent".

Please reword/reformat to give equal treatment to the three options
(send full residue, mapping list, target value) in terms of the
formatting and the use of normative keywords.

Section  5.5

  These fields are unidirectional.

In which directions?

Section 6.1

I suggest using rhetoric that is consistent with the two different block
options, even though they conceptually fit together as a functional
unit.

  includes a fragmentation protocol.  They are compatible.  If a block
  option is used, its content MUST be sent as a compression residue.

Anything to say about fixed vs. variable length encoding?

Section 6.2

  Since an RST message may be sent to inform a server that the client
  does not require Observe response, a rule MUST allow the transmission
  of this message.

Is it worth assembling a consolidated table of specific rules or rule
functionality that must be present to have a functional CoAP SCHC setup
(incorporating this and the base SCHC requirements for, e.g., a rule to
capture otherwise non-matching traffic that is sent without
compression)?

Section 6.3

  Otherwise, if the value is changing over time, TV is not set, MO is
  set to "ignore" and CDA to "value-sent".  A matching list can also be
  used to reduce the size.

Similarly to my comment above, it might be nice to give parallel
rhetorical treatment to the three options.

Section 6.4

This section feels more like a sketch of how someone could implement
SCHC with OSCORE, as compared to previous Options' handling that has a
pretty well-defined procedure.

Would it be desirable, for example, to have a separate Rule for each
value of the OSCORE flags that was expected?

Section 7.2

  The Plaintext is now encrypted by an AEAD algorithm which integrity
  protects Security Context parameters and eventually any class I
  options from the Outer Header.  Currently no CoAP options are marked
  class I.  The resulting Ciphertext becomes the new Payload of the

I suggest dropping "eventually", as it will no longer make sense if/when
class-I options are defined.

  Note that since the Inner part of the message can only be decrypted
  by the corresponding end-point, this end-point will also have to
  implement Inner SCHC Compression/Decompression.

It might be worth being even more explicit that the SCHC context for the
inner and outer parts may differ as well, since they may be processed by
different entities.

Section 7.3

  The piv field lends itself to having a number of bits masked off with
  MO MSB and CDA LSB.  This could be useful in applications where the
  message frequency is low such as that found in LPWAN technologies.
  Note that compressing the sequence numbers effectively reduces the
  maximum amount of sequence numbers that can be used in an exchange.
  Once this amount is exceeded, the OSCORE keys need to be re-
  established.

Just to check: one could also allocate additional Rules to match a
different prefix, and get additional sequence number space?

  Compression residue:
  0b0001 010 (7 bits -> 1 byte with padding)
    mid  tkn

We had a space after "0b" in the request portion, which seems to aid
readibility.

  As can be seen, the difference between applying SCHC + OSCORE as
  compared to regular SCHC + COAP is about 10 bytes of cost.

I'd suggest noting that this is about what one would expect, given the
fixed and uncompressible overhead of the 8-byte tag, plus the need for
the dual compression with inner and outer contexts (each of which have
their own octet for rule ID).


IIUC additional Rule information would be needed to handle Observer
responses/updates, but it's not really clear that we need to mention
that fact in the context of this specific example.

Section 9

  This document does not have any more Security consideration than the
  ones already raised on [I-D.ietf-lpwan-ipv6-static-context-hc].

Given that we then go on to talk about more stuff, am I to conclude that
the additional discussion is merely exposition on topics already covered
in the reference (vs. new content that would make this quoted statement
invalid)?

In particular, I think there is another new security consideration worth
discussion here, relating to the interaction of compression and OSCORE.
To illustrate how this might come intoi play, consider the example in
Section 7.3, where the response can be compressed to a single byte,
since there is only one request message defined/expected by the Rules.
In such a scenario where the number of potential plantexts is extremely
small, an attacker with knowledge that SCHC is in use (and, perhaps, the
Rules in question) will have a very easy time of traffic analysis, which
to some extent will defeat the message protection that OSCORE is
intended to provide.

  Variable length residues may be used to compress URI elements.  They
  cannot produce a packet expansion either on the LPWAN network or in
  the Internet network after decompression.  The length send is not

We should probably say why ("because the static context embedded in the
Rule used for compression can only remove/replace a static, fixed-length
prefix of the URI component")

nit: s/send/sent/

  used to indicate the information that should be reconstructed at the
  other end, but on the contrary the information sent as a Residue.

nit: "on the contrary the length of the information sent as a Residue",
I think.

  OSCORE compression is also based on the same compression method
  described in [I-D.ietf-lpwan-ipv6-static-context-hc].  The size of
  the Initialisation Vector residue size must be considered carefully.

I suggest adding a note that there is a tradeoff between the efficiency
of compression and the number of protected messages that can be sent
using a given key/SCHC context; the following two sentences don't seem
as clear as they could be.  So ...

  A too large value has a impact on the compression efficiency and a
  too small value will force the device to renew its key more often.
  This operation may be long and energy consuming.

Perhaps,

% The OSCORE initialization vector holds a message sequence number, and
% a unique such number is needed for each distinct message.  The SCHC
% procedure gives compression efficiency by assuming that a fixed prefix
% of the IV remains static and eliding that fixed prefix from the
% transmitted message.  However, such compression has the corresponding
% effect of reducing the number of distinct sequence numbers available
% to the sender.  When the usable sequence number space is exhausted,
% the OSCORE security context must be rekeyed; since this rekeying can
% be an expensive operation in terms of time and energy consumption, the
% creation of SCHC Rules for OSCORE compression should take into
% consideration the tradeoff between (amortized )rekeying cost and the
% recurring transmission overhead for the uncompressed portion of the
% initialization vector.
2020-03-10
13 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2020-03-09
13 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-03-09
13 Warren Kumari [Ballot comment]
Thank you to Linda for the OpsDir review.
2020-03-09
13 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2020-03-05
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-03-05
13 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-13.txt
2020-03-05
13 (System) New version approved
2020-03-05
13 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ricardo Andreasen , Ana Minaburo , lpwan-chairs@ietf.org
2020-03-05
13 Laurent Toutain Uploaded new revision
2020-03-05
13 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-03-05
12 Cindy Morgan Placed on agenda for telechat - 2020-03-12
2020-03-05
12 Suresh Krishnan IESG state changed to IESG Evaluation from Waiting for Writeup
2020-03-05
12 Suresh Krishnan Ballot has been issued
2020-03-05
12 Suresh Krishnan [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan
2020-03-05
12 Suresh Krishnan Created "Approve" ballot
2020-03-05
12 Suresh Krishnan Ballot writeup was changed
2020-02-26
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Charlie Kaufman
2020-02-26
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Charlie Kaufman
2020-02-21
12 Paul Wouters Request for Last Call review by SECDIR Partially Completed: Serious Issues. Reviewer: Paul Wouters. Sent review to list.
2020-02-20
12 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2020-02-20
12 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-lpwan-coap-static-context-hc-12, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-lpwan-coap-static-context-hc-12, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-02-20
12 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-02-18
12 Linda Dunbar Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Linda Dunbar. Sent review to list.
2020-02-13
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Paul Wouters
2020-02-13
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Paul Wouters
2020-02-12
12 Joseph Touch Request for Last Call review by TSVART Completed: Almost Ready. Reviewer: Joseph Touch. Sent review to list.
2020-02-10
12 Wesley Eddy Request for Last Call review by TSVART is assigned to Joseph Touch
2020-02-10
12 Wesley Eddy Request for Last Call review by TSVART is assigned to Joseph Touch
2020-02-10
12 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2020-02-10
12 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2020-02-10
12 Reese Enghardt Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Theresa Enghardt. Sent review to list.
2020-02-06
12 Jean Mahoney Request for Last Call review by GENART is assigned to Theresa Enghardt
2020-02-06
12 Jean Mahoney Request for Last Call review by GENART is assigned to Theresa Enghardt
2020-02-06
12 Amy Vezza IANA Review state changed to IANA - Review Needed
2020-02-06
12 Amy Vezza
The following Last Call announcement was sent out (ends 2020-02-20):

From: The IESG
To: IETF-Announce
CC: pthubert@cisco.com, draft-ietf-lpwan-coap-static-context-hc@ietf.org, Pascal Thubert , lpwan-chairs@ietf.org, …
The following Last Call announcement was sent out (ends 2020-02-20):

From: The IESG
To: IETF-Announce
CC: pthubert@cisco.com, draft-ietf-lpwan-coap-static-context-hc@ietf.org, Pascal Thubert , lpwan-chairs@ietf.org, lp-wan@ietf.org, suresh@kaloom.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (LPWAN Static Context Header Compression (SCHC) for CoAP) to Proposed Standard


The IESG has received a request from the IPv6 over Low Power Wide-Area
Networks WG (lpwan) to consider the following document: - 'LPWAN Static
Context Header Compression (SCHC) for CoAP'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-02-20. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol messages
  format is asymmetric: the request messages have a header format
  different from the one in the response messages.  This document
  explains how to use the SCHC compression mechanism for CoAP.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lpwan-coap-static-context-hc/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-lpwan-coap-static-context-hc/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc7967: Constrained Application Protocol (CoAP) Option for No Server Response (Informational - Independent Submission Editor stream)



2020-02-06
12 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2020-02-06
12 Amy Vezza Last call announcement was changed
2020-02-05
12 Suresh Krishnan Last call was requested
2020-02-05
12 Suresh Krishnan Last call announcement was generated
2020-02-05
12 Suresh Krishnan Ballot approval text was generated
2020-02-05
12 Suresh Krishnan Ballot writeup was generated
2020-02-05
12 Suresh Krishnan IESG state changed to Last Call Requested from AD Evaluation
2019-12-19
12 Bernie Volz Closed request for Last Call review by INTDIR with state 'Overtaken by Events'
2019-12-19
12 Bernie Volz Assignment of request for Last Call review by INTDIR to Tim Chown was marked no-response
2019-12-10
12 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-12.txt
2019-12-10
12 (System) New version approved
2019-12-10
12 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-12-10
12 Ana Minaburo Uploaded new revision
2019-11-29
11 Stephen Farrell Request for Last Call review by IOTDIR Completed: Almost Ready. Reviewer: Stephen Farrell. Sent review to list.
2019-11-14
11 Samita Chakrabarti Request for Last Call review by IOTDIR is assigned to Stephen Farrell
2019-11-14
11 Samita Chakrabarti Request for Last Call review by IOTDIR is assigned to Stephen Farrell
2019-11-05
11 Bernie Volz Request for Last Call review by INTDIR is assigned to Tim Chown
2019-11-05
11 Bernie Volz Request for Last Call review by INTDIR is assigned to Tim Chown
2019-11-04
11 Suresh Krishnan Requested Last Call review by IOTDIR
2019-11-04
11 Suresh Krishnan Requested Last Call review by INTDIR
2019-10-25
11 Suresh Krishnan IESG state changed to AD Evaluation from Publication Requested
2019-10-09
11 Pascal Thubert
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type …
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  => All is correct. We are going after a Proposed Standard.
  This document specifies the behaviour of a SCHC encoder/decoder for CoAP.
  The tracker indicates Proposed Standard and the draft Standards Track
 
(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  =>
  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

=>
  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  =>
  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  =>
  Document Shepherd: Pascal Thubert
  Responsible Area Director: Suresh Krishnan

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  =>
  The shepherd considered the readability of the content and its
  form (e.g., NITs). The recommendations were applied in two
  rounds, v10 and v11.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  =>
  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  =>
  Not so. the document mostly needs exposure to the real world, and
  feedback from implementer's who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  => No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  => All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  => No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  => The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  => No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  => The nits and shepherd review items were cleaned up between
  v09 and v11. There are still alerts like on BCP14 but that's false
  positive.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  =>  No such need

(13) Have all references within this document been identified as
either normative or informative?

  => Yes. Interestingly there's no informative. The shepherd scrutinized that
  and found that all references actually qualify as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  => The main SCHC draft (draft-ietf-lpwan-ipv6-static-context-hc) is the
  only reference that is not RFC yet,but is more advanced than this.
  It could be nice to ship both documents with consecutive numbers
  and I'd suggest that the RFC editor reserves the number right after
  SCHC for this document.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  =>  No such thing. There is no informative reference at all.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  =>  No such thing.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  => No such thing.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  => No such thing.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  => No such thing.

2019-10-09
11 Pascal Thubert Responsible AD changed to Suresh Krishnan
2019-10-09
11 Pascal Thubert IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2019-10-09
11 Pascal Thubert IESG state changed to Publication Requested from I-D Exists
2019-10-09
11 Pascal Thubert IESG process started in state Publication Requested
2019-10-09
11 Pascal Thubert IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2019-10-09
11 Pascal Thubert
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type …
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  => All is correct. We are going after a Proposed Standard.
  This document specifies the behaviour of a SCHC encoder/decoder for CoAP.
  The tracker indicates Proposed Standard and the draft Standards Track
 
(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  =>
  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

=>
  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  =>
  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  =>
  Document Shepherd: Pascal Thubert
  Responsible Area Director: Suresh Krishnan

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  =>
  The shepherd considered the readability of the content and its
  form (e.g., NITs). The recommendations were applied in two
  rounds, v10 and v11.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  =>
  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  =>
  Not so. the document mostly needs exposure to the real world, and
  feedback from implementer's who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  => No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  => All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  => No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  => The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  => No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  => The nits and shepherd review items were cleaned up between
  v09 and v11. There are still alerts like on BCP14 but that's false
  positive.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  =>  No such need

(13) Have all references within this document been identified as
either normative or informative?

  => Yes. Interestingly there's no informative. The shepherd scrutinized that
  and found that all references actually qualify as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  => The main SCHC draft (draft-ietf-lpwan-ipv6-static-context-hc) is the
  only reference that is not RFC yet,but is more advanced than this.
  It could be nice to ship both documents with consecutive numbers
  and I'd suggest that the RFC editor reserves the number right after
  SCHC for this document.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  =>  No such thing. There is no informative reference at all.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  =>  No such thing.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  => No such thing.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  => No such thing.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  => No such thing.

2019-10-09
11 Pascal Thubert
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type …
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  => All is correct. We are going after a Proposed Standard.
  This document specifies the behaviour of a SCHC encoder/decoder for CoAP.
  The tracker indicates Proposed Standard and the draft Standards Track
 
(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  =>
  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

=>
  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  =>
  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  =>
  Document Shepherd: Pascal Thubert
  Responsible Area Director: Suresh Krishnan

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  =>
  The shepherd considered the readability of the content and its
  form (e.g., NITs). The recommendations were applied in two
  rounds, v10 and v11.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  =>
  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  =>
  Not so. the document mostly needs exposure to the real world, and
  feedback from implementer's who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  => No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  => All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  => No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  => The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  => The nits and shepherd review items were cleaned up between
  v09 and v11. There are still alerts like on BCP14 but that's false
  positive.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  =>  No such need

(13) Have all references within this document been identified as
either normative or informative?

  => Yes. Interestingly there's no informative. The shepherd scrutinized that
  and found that all references actually qualify as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  => The main SCHC draft (draft-ietf-lpwan-ipv6-static-context-hc) is the
  only reference that is not RFC yet,but is more advanced than this.
  It could be nice to ship both documents with consecutive numbers
  and I'd suggest that the RFC editor reserves the number right after
  SCHC for this document.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  =>  No such thing. There is no informative reference at all.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  =>  No such thing.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  => No such thing.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  => No such thing.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  => No such thing.

2019-10-09
11 Pascal Thubert
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type …
As required by RFC 4858, this is based on the current template for the
Document Shepherd Write-Up dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

=> All is correct. We are going after a Proposed Standard.
    This document specifies the behaviour of a SCHC encoder/decoder for CoAP.
    The tracker indicates Proposed Standard and the draft Standards Track
 
(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  =>
  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

=>
  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  =>
  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  =>
  Document Shepherd: Pascal Thubert
  Responsible Area Director: Suresh Krishnan

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  =>
  The shepherd considered the readability of the content and its
  form (e.g., NITs). The recommendations were applied in two
  rounds, v10 and v11.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  =>
  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  =>
  Not so. the document mostly needs exposure to the real world, and
  feedback from implementer's who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  => No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  => All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  => No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  => The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  => The nits and shepherd review items were cleaned up between
  v09 and v11. There are still alerts like on BCP14 but that's false
  positive.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  =>  No such need

(13) Have all references within this document been identified as
either normative or informative?

  => Yes. Interestingly there's no informative. The shepherd scrutinized that
  and found that all references actually qualify as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  => The main SCHC draft (draft-ietf-lpwan-ipv6-static-context-hc) is the
  only reference that is not RFC yet,but is more advanced than this.
  It could be nice to ship both documents with consecutive numbers
  and I'd suggest that the RFC editor reserves the number right after
  SCHC for this document.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  =>  No such thing. There is no informative reference at all.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  =>  No such thing.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  => No such thing.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  => No such thing.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such thing.

2019-10-09
11 Pascal Thubert
Based in template dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why …
Based in template dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  The tracker indicates Proposed Standard and the draft Standards Track
  This is correct.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary


  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  Document Shepherd: Pascal Thubert
  Responsible Area Director: Eric Vyncke

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  Not so. the document mostly needs exposure to the real world, and
  feedback from implementer's who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The nits and shepherd review items were cleaned up between
  v09 and v11. There are still alerts like on BCP14 but that's false
  positive.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No such need

(13) Have all references within this document been identified as
either normative or informative?

  Yes. Interestingly there's no informative. As shepherd I scrutinized that
  and found that all references actually qualify as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  The main SCHC draft (draft-ietf-lpwan-ipv6-static-context-hc) is the
  only reference that is not RFC yet,but is more advanced than this.
  It could be nice to ship both documents with consecutive numbers
  and I'd suggest that the RFC editor reserves the number right after
  SCHC for this document.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  No such thing. There is no informative reference at all.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  No such thing.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  No such thing.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No such thing.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such thing.

2019-10-09
11 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-11.txt
2019-10-09
11 (System) New version approved
2019-10-09
11 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-10-09
11 Ana Minaburo Uploaded new revision
2019-10-09
11 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-10-09
11 Laurent Toutain Uploaded new revision
2019-10-08
10 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-10.txt
2019-10-08
10 (System) New version approved
2019-10-08
10 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-10-08
10 Ana Minaburo Uploaded new revision
2019-10-08
10 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-10-08
10 Laurent Toutain Uploaded new revision
2019-10-03
09 Pascal Thubert
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  The tracker indicates Proposed Standard and the draft Standards Track
  This is correct.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary


  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  Document Shepherd: Pascal Thubert
  Responsible Area Director: Eric Vyncke

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  Not so. the document mostly needs exposure to the real world, and
  feedback from implementors who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  v09 was missing informational references. v10 fixes this and other
  shepherd review items.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No such need

(13) Have all references within this document been identified as
either normative or informative?

  Yes

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  The main SCHC draft is not RFC yet but it more advanced than this.
  It could be nice to ship them with consecutive numbers.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  TBD with 10

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  No such thing

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  No such thing


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No such thing


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such thing

2019-10-03
09 Pascal Thubert
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  The tracker indicates Proposed Standard and the draft Standards Track
  This is correct.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary


  This draft defines the way SCHC header compression can be applied to
  CoAP headers.  The CoAP header structure differs from IPv6 and UDP
  protocols since CoAP uses a flexible header with a variable number of
  options, themselves of variable length.  The CoAP protocol is
  asymmetric in its message format: the format of the packet header in
  the request messages is different from that in the response messages.

Working Group Summary

  The draft does not introduce new methods as the original SCHC does.
  This made the work much easier for the WG. On the other hand, the
  draft specifies how the existing SCHC mechanisms are to be used
  for a number of usual fields. The limit of the work is that the
  group could not try every possible CoAP variations and there may
  be cases where SCHC as it stands today is suboptimal. The group
  decided to ship as is, and possibly publish a refresher when more
  experience is gained.

Document Quality

  This draft is implemented by at least one vendor, Acklio.
  There is also an openSCHC implementation in python.

Personnel

  Document Shepherd: Pascal Thubert
  Responsible Area Director: Eric Vyncke

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  The shepherd performed his review after the WGLC and found no issue.
  The document does not introduce new techniques, and is rather an
  howto type of document. It is very detailed and covers OSCORE is
  depth with multiple examples. Some corrections where asked like
  expand on first use for OSCORE terms, and cleanup of references.
  But all in all the document is in a great state and appears fit for
  publication request.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  Not so. the document mostly needs exposure to the real world, and
  feedback from implementors who suffered in certain situations, or
  failed to obtain an optimal compression with the tools at hand.
  The group accepted to deliver a solution that might not cover the
  extremely large set of possibilities, and preferred to ship a v2 in
  some future with extended capabilities than waiting forever to ship
  this.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such thing

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All authors confirmed that there is no IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No such thing

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The group understands it. SCHC is the core deliverable of LPWAN.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such thing

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  v09 was missing informational references. v10 fixes this and other
  shepherd review items.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No such need

(13) Have all references within this document been identified as
either normative or informative?

  Yes

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  OSCORE

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  The main SCHC draft is not RFC yet but it more advanced than this.
  It could be nice to ship them with consecutive numbers.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  No such thing

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 8126).

  No such thing


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No such thing


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such thing

2019-09-27
09 Pascal Thubert Notification list changed to Pascal Thubert <pthubert@cisco.com>
2019-09-27
09 Pascal Thubert Document shepherd changed to Pascal Thubert
2019-07-06
09 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-09.txt
2019-07-06
09 (System) New version approved
2019-07-06
09 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-07-06
09 Laurent Toutain Uploaded new revision
2019-05-29
08 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-08.txt
2019-05-29
08 (System) New version approved
2019-05-29
08 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-05-29
08 Laurent Toutain Uploaded new revision
2019-05-24
07 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-07.txt
2019-05-24
07 (System) New version approved
2019-05-24
07 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-05-24
07 Ana Minaburo Uploaded new revision
2019-02-05
06 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-06.txt
2019-02-05
06 (System) New version approved
2019-02-05
06 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2019-02-05
06 Ana Minaburo Uploaded new revision
2018-10-22
05 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-05.txt
2018-10-22
05 (System) New version approved
2018-10-22
05 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org, Ricardo Andreasen
2018-10-22
05 Laurent Toutain Uploaded new revision
2018-07-02
04 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-04.txt
2018-07-02
04 (System) New version approved
2018-07-02
04 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org
2018-07-02
04 Laurent Toutain Uploaded new revision
2018-03-04
03 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-03.txt
2018-03-04
03 (System) New version approved
2018-03-04
03 (System) Request for posting confirmation emailed to previous authors: Laurent Toutain , Ana Minaburo , lpwan-chairs@ietf.org
2018-03-04
03 Ana Minaburo Uploaded new revision
2017-09-06
02 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-02.txt
2017-09-06
02 (System) New version approved
2017-09-06
02 (System) Request for posting confirmation emailed to previous authors: Ana Minaburo , Laurent Toutain , lpwan-chairs@ietf.org
2017-09-06
02 Laurent Toutain Uploaded new revision
2017-03-27
01 Pascal Thubert Added to session: IETF-98: lpwan  Wed-1300
2017-03-10
01 Laurent Toutain New version available: draft-ietf-lpwan-coap-static-context-hc-01.txt
2017-03-10
01 (System) New version approved
2017-03-10
01 (System) Request for posting confirmation emailed to previous authors: Ana Minaburo , lpwan-chairs@ietf.org, Laurent Toutain
2017-03-10
01 Laurent Toutain Uploaded new revision
2016-12-05
00 Pascal Thubert Changed consensus to Yes from Unknown
2016-12-05
00 Pascal Thubert Intended Status changed to Proposed Standard from None
2016-12-05
00 Pascal Thubert This document now replaces draft-toutain-lpwan-coap-static-context-hc instead of None
2016-12-05
00 Ana Minaburo New version available: draft-ietf-lpwan-coap-static-context-hc-00.txt
2016-12-05
00 (System) WG -00 approved
2016-12-05
00 Ana Minaburo Set submitter to "Ana Minaburo ", replaces to (none) and sent approval email to group chairs: lpwan-chairs@ietf.org
2016-12-05
00 Ana Minaburo Uploaded new revision