Skip to main content

A Mechanism to Measure the Routing Metrics along a Point-to-Point Route in a Low-Power and Lossy Network
draft-ietf-roll-p2p-measurement-10

Revision differences

Document history

Date Rev. By Action
2013-08-13
10 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-08-09
10 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-07-26
10 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-07-11
10 (System) RFC Editor state changed to EDIT from MISSREF
2013-04-09
10 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2013-04-05
10 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2013-04-05
10 (System) RFC Editor state changed to MISSREF
2013-04-05
10 (System) Announcement was received by RFC Editor
2013-04-04
10 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2013-04-04
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2013-04-04
10 (System) IANA Action state changed to In Progress
2013-04-04
10 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2013-04-04
10 Amy Vezza IESG has approved the document
2013-04-04
10 Amy Vezza Closed "Approve" ballot
2013-04-04
10 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2013-04-04
10 Adrian Farrel Ballot approval text was generated
2013-04-03
10 Adrian Farrel Ballot writeup was changed
2013-04-03
10 Stephen Farrell
[Ballot comment]

Thanks for addressing my discuss. On the basis that this is an
experimental-track specification and you're depending on the
security from 6550, your …
[Ballot comment]

Thanks for addressing my discuss. On the basis that this is an
experimental-track specification and you're depending on the
security from 6550, your changes are enough to clear my
discuss. I'd be really interested in knowing how this goes,
when people implement/deploy, given that you need all
routers to share the same key.

Two other comments,

- its not clear to me if there are cases where a router will
pass on a "secure MO" without changing the message,
but where the router doesn't have the key required. It'd
be good to say if a router needs to drop the message in
that case or not.

- I'm also unclear about that the starting point has to
do if a "secure MO" it sent out gets dropped and the
starting point never hears anything back.

Both of the above may be clear in the document already
(apologies if so) but I didn't immediately see what's
supposed to happen.
2013-04-03
10 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2013-04-01
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-04-01
10 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-10.txt
2013-03-16
09 Michael Richardson Changed shepherd to JP Vasseur
2013-02-07
09 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Alexey Melnikov.
2013-02-07
09 Amy Vezza State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2013-02-07
09 Stephen Farrell
[Ballot discuss]

I just don't get how a secure MO can work - do you need
every intermediary to share keys so they can all …
[Ballot discuss]

I just don't get how a secure MO can work - do you need
every intermediary to share keys so they can all modify
the message? Please explain. (I didn't find any
description of how a "secure MO" is generated or
processed at all so this has to be a bit of an
open-ended discuss for now sorry.)
2013-02-07
09 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2013-02-07
09 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2013-02-07
09 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2013-02-06
09 Pete Resnick
[Ballot comment]
3.1, Accumulate Route:

      Route accumulation is allowed (i.e., this flag MAY be set to one)
      inside a …
[Ballot comment]
3.1, Accumulate Route:

      Route accumulation is allowed (i.e., this flag MAY be set to one)
      inside a Measurement Request only if it travels along a Hop-by-hop
      Route represented by a local RPLInstanceID (i.e., H = 1,
      RPLInstanceID has a local value).

I think you buried the lede here. I suggest instead:

      Route accumulation MUST NOT be used (i.e., this flag set to one)
      inside a Measurement Request unless it travels along a Hop-by-hop
      Route represented by a local RPLInstanceID (i.e., H = 1,
      RPLInstanceID has a local value).

That MAY could cause a reader to miss the important point that this is a requirement, even though this is followed with "In other cases, this flag MUST be set to zero".
2013-02-06
09 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2013-02-06
09 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2013-02-06
09 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2013-02-06
09 Ralph Droms
[Ballot comment]
Very well-written and easy to understand document.  Thank you.

I have only a few minor comments for your consideration.

1. In this text: …
[Ballot comment]
Very well-written and easy to understand document.  Thank you.

I have only a few minor comments for your consideration.

1. In this text:

  Such a route could be a Source
  Route [I-D.ietf-roll-p2p-rpl] or a Hop-by-hop Route
  [I-D.ietf-roll-p2p-rpl] established using RPL [RFC6550] or P2P-RPL
  [I-D.ietf-roll-p2p-rpl]

I found the first two citations of [I-D.ietf-roll-p2p-rpl] a little
confusing.  The use of terminology from [I-D.ietf-roll-p2p-rpl] was
already mentioned; no need to cite the sources of those terms here.

2. Are there any restrictions on the addresses (link-local, global
scope, etc.) in the address list, used either for source-routing or
accumulating a route?

4. Are there rules about what address a node should insert in the
address list - for example, link-local if possible, MUST match End
Point address prefix as specified by Compr?

5. Is the RPLInstanceID value 0b10000000 now reserved in some way?
Section 4.4 call for the RPLInstanceID to be set to 0b10000000, but I
don't see any requirement to check that value in a received MO.
2013-02-06
09 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms
2013-02-06
09 Russ Housley
[Ballot comment]
  The Gen-ART Review by Pete McCann on 5-Feb-2013 raises one concern
  about clarity.  In Section 5, it says:
  >
  …
[Ballot comment]
  The Gen-ART Review by Pete McCann on 5-Feb-2013 raises one concern
  about clarity.  In Section 5, it says:
  >
  > An Intermediate Point MUST discard the packet with no further
  > processing if the received MO is not a Measurement Request (i.e.,
  > T = 0).
  >
  The Intermediate Points are the routers on the route that are being
  measured, excluding the Start Point and the End Point.  Section 6.1
  identifies situations where the Measurement Reply _may_ travel back
  to the Start Point using the reverse of the measured route. So, it is
  possible that the Measurement Reply travels along the reverse of the
  measured path and, in this case, the Measurement Reply does pass
  through all the Intermediate Points. However, the End Point may decide
  to send the Measurement Reply along a different path than the measured
  one. In that case, the Measurement Reply may not pass through the
  Intermediate Points.

  It would be helpful to share this information with the reader in
  Section 5, instead of waiting for Section 6.1.
2013-02-06
09 Russ Housley Ballot comment text updated for Russ Housley
2013-02-06
09 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2013-02-06
09 Brian Haberman [Ballot comment]
I support the publication of this document modulo the changes resulting from Sean's points.
2013-02-06
09 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2013-02-06
09 Sean Turner [Ballot comment]
Thank you for addressing my concerns.
2013-02-06
09 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2013-02-05
09 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2013-02-04
09 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-09.txt
2013-02-04
08 Russ Housley
2013-02-03
08 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2013-01-31
08 Jean Mahoney Request for Telechat review by GENART is assigned to Pete McCann
2013-01-31
08 Jean Mahoney Request for Telechat review by GENART is assigned to Pete McCann
2013-01-31
08 Sean Turner
[Ballot discuss]
Quite possible some of these are me not getting so I thought I'd get 'em in early:

1) There's a couple of times …
[Ballot discuss]
Quite possible some of these are me not getting so I thought I'd get 'em in early:

1) There's a couple of times that the S/MO gets dropped with no further action (e.g., Intermediate Point drops it when Compr field inside the received message is more than what the router considers the length of the common prefix used in IPv6 addresses in the LLN to be) and a couple when an ICMPv6 Destination Unreachable is sent.  I'm curious why s7 doesn't discuss the former.  For example, should the Start Point time out and retry at some point?  Or, because it's not guaranteed devilry the Start Point just knows to not wait?

2) s5.1: In the process of a request by an Intermediate Point, the I flag is is set to zero if the Intermediate Point determines the next hop isn't the End Point.  Wouldn't the Intermediate Point want to leave that flag alone in case the next Intermediate Point knows the aggregated info?

3) s5/6: This might be a simple oversight, but should the 1st paragraph (about not processing an MO based on local policy) be copied from s5 to s6?  In the security considerations, it seems to imply any router cold drop the packets based on local-policy.

4) s8: I'm not following along in the last paragraph.  You say disclosing information found in the MO could harm the LLN so you're allowing routers to drop the requests.  So you're expecting rogue routers to not look in the MO and drop them so they don't get the information?  Or are you saying that routers don't have to process these messages if they think somewhere along the line the information in the MO might be disclosed?

6) s8: As best I can tell, there's no MTI security mechanism (note this is different than must use).  To alleviate that might I suggest:

An LLN deployment MUST support the Secure MO, described in
Section 3.2 messages, to invoke RPL-provided security mechanisms and
prevent misuse of the measurement mechanism by unauthorized nodes.
2013-01-31
08 Sean Turner
[Ballot comment]
1) abstract: I'm probably nit picking her but the way I read the abstract is that the mechanism described in the draft will …
[Ballot comment]
1) abstract: I'm probably nit picking her but the way I read the abstract is that the mechanism described in the draft will only work in low power and lossy networks.  The bit about the low power and lossy networks about RPL - maybe just drop "in a low power and lossy network".  And, this more closely aligns with s1.

2) s1: please expand ETX.

3) s1: Three things about the last paragraph I found interesting: a) If it's aimed at experimental is it really operational experience? b) I'm not sure referring to a WG in a draft makes sense because the name could change, it could get closed and never come back, etc. c) I would have thought the feedback would have included interoperability issues.  You could just as well say:

The hope is that experiments with P2P-RPL and this document will
result in feedback on the utility and benefits of this document
and it will be revised and progressed on the Standards Track based
on this feedback.

4) s1.1: Instead of redefining the same term could you maybe just call them:
  Forward P2P route direction and Backward P2P route direction?

5) s3.1: Expand DODAGID.

6) Figure 1: Shouldn't the Start Point Address, End Point Address, and Address indicate that they are variable in length?  I guess maybe adding dots in Start and End Point and Address to match Address might work:

  .                      Start Point Address                    .
  .                                                              .
  |                                                              |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                                                              |
  .                      End Point Address                      .
  .                                                              .

7) s3.1: Just checking here, the Start Point knows how to set in Compr, H, and A because it already knows the route - right?

8) s3.1: /Section 4 describes how does a Start Point
        /Section 4 describes how a Start Point

9) s3.2: Implementing SMO is optional, but if you're going to do it then you've got implement RFC 6550 - therefore RFC 6550 needs to be a normative reference.

10) s4: Seems odd that the Start Point would make the request and then discard it.  Could you use "MUST NOT send" instead or flip it to:

  The Start Point MUST also construct the Measurement
  Request with:

  o  a next hop address that is a unicast address;

  o  a next hop address that is on-link;

  o  a next hop address that is in the same RPL routing domain as the Start
      Point.

11) s4: Probably worth pointing out that unless otherwise noted using "MO" refers to both an MO and the contents of a Secure MO.

12) s5: Just so I'm following along:

For the hop-by-hop accumulations, what will the Start Point do if they sends an S/MO and doesn't get an S/MO back because the S/MO has been discarded by an Intermediate Point because the Address vector was too small?  Is the "more than" referring to the Start Point compressing the value more than it should?

13) s5.1/5.2/5.3: Need a normative reference to RFC 4443 for the ICMPv6 Destination Unreachable.

14) s8: Hopefully one malicious request won't break it:

  r/Such Measurement Requests may
  /If sufficient Measurement Requests are sent, then it may
2013-01-31
08 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2013-01-29
08 Barry Leiba
[Ballot comment]
This is a nice, clear document, which was easy to review.  I have just two very minor points, of the extreme-NON-blocking variety:

-- …
[Ballot comment]
This is a nice, clear document, which was easy to review.  I have just two very minor points, of the extreme-NON-blocking variety:

-- Section 1 --
  Note that it is important that the routing constraints
  are not overly strict; otherwise the P2P-RPL route discovery may fail
  even though a route, much better than the one currently being used,
  exists.

The commas setting off that last phrase make it non-restrictive (it could be removed without changing the meaning of the sentence), and that's not what you want.  So (adding a change to subjunctive mood along the way)...

NEW1
  Note that it is important that the routing constraints
  not be overly strict; otherwise, the P2P-RPL route discovery may fail
  even though a route much better than the one currently being used
  exists.

...or...

NEW2
  Note that it is important that the routing constraints
  not be overly strict; otherwise, the P2P-RPL route discovery may fail
  even though a route exists that is much better than the one currently
  being used.

-- Section 6.1 --
  The remaining fields inside a Measurement Reply may have
  any value and MUST be ignored on reception at the Start Point.  The
  received Measurement Request MAY trivially be converted into a
  Measurement Reply by setting the Type (T) flag to zero.

It's really a small point, but this doesn't feel like the right use of 2119 "MAY", because it simply follows from the rest of the paragraph, and the protocol only cares about what the Measurement Reply looks like, not how you went about creating it.  I suggest this slight change:

NEW
  The remaining fields inside a Measurement Reply may have
  any value and MUST be ignored on reception at the Start Point; the
  received Measurement Request can, therefore, trivially be converted
  into a Measurement Reply by setting the Type (T) flag to zero.
END
2013-01-29
08 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2013-01-22
08 Adrian Farrel State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2013-01-22
08 Adrian Farrel Placed on agenda for telechat - 2013-02-07
2013-01-22
08 Adrian Farrel Ballot has been issued
2013-01-22
08 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel
2013-01-22
08 Adrian Farrel Created "Approve" ballot
2013-01-22
08 Adrian Farrel Ballot writeup was changed
2013-01-21
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-01-21
08 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-08.txt
2013-01-21
07 Adrian Farrel State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead
2013-01-21
07 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2013-01-17
07 Pearl Liang
IANA has reviewed draft-ietf-roll-p2p-measurement-07 and has the following comments:

IANA understands that, upon approval of this document, there are two actions which IANA must complete. …
IANA has reviewed draft-ietf-roll-p2p-measurement-07 and has the following comments:

IANA understands that, upon approval of this document, there are two actions which IANA must complete.

First, in the RPL Control Codes subregistry of the Routing Protocol for Low Power and Lossy Networks (RPL) subregistry located at:

http://www.iana.org/assignments/rpl/rpl.xml#control-codes

a new control code will be registered as follows:

Code: [ TBD at time of registration ]
Description: Measurement Object
Reverence: [ RFC-to-be ]

IANA notes that this Code should be allocated as assigned from the range 0x00-0x7F to indicate a message without security enabled.

Second, also in the RPL Control Codes subregistry of the Routing Protocol for Low Power and Lossy Networks (RPL) subregistry located at:

http://www.iana.org/assignments/rpl/rpl.xml#control-codes

a new control code will be registered as follows:

Code: [ TBD at time of registration ]
Description: Secure Measurement Object
Reverence: [ RFC-to-be ]

IANA notes that this Code should be assigned from the range 0x80-0xFF to indicate a message with security enabled.

IANA understands that these two actions are the only ones required upon approval of this document.

Note: The actions requested in this document will not be completed
until the document has been approved for publication as an RFC.
2013-01-10
07 Jean Mahoney Request for Last Call review by GENART is assigned to Pete McCann
2013-01-10
07 Jean Mahoney Request for Last Call review by GENART is assigned to Pete McCann
2013-01-10
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2013-01-10
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Alexey Melnikov
2013-01-07
07 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (A Mechanism to Measure the Routing …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (A Mechanism to Measure the Routing Metrics along a Point-to-point Route in a Low Power and Lossy Network) to Experimental RFC


The IESG has received a request from the Routing Over Low power and Lossy
networks WG (roll) to consider the following document:
- 'A Mechanism to Measure the Routing Metrics along a Point-to-point
  Route in a Low Power and Lossy Network'
  as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-01-21. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

  This document specifies a mechanism that enables an RPL router to
  measure the aggregated values of given routing metrics along an
  existing route towards another RPL router in a low power and lossy
  network, thereby allowing the router to decide if it wants to
  initiate the discovery of a better route.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-roll-p2p-measurement/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-roll-p2p-measurement/ballot/


No IPR declarations have been submitted directly on this I-D.
2013-01-07
07 Amy Vezza State changed to In Last Call from Last Call Requested
2013-01-07
07 Amy Vezza Last call announcement was changed
2013-01-05
07 Adrian Farrel Last call was requested
2013-01-05
07 Adrian Farrel Ballot approval text was generated
2013-01-05
07 Adrian Farrel State changed to Last Call Requested from AD Evaluation::AD Followup
2013-01-05
07 Adrian Farrel Last call announcement was changed
2013-01-05
07 Adrian Farrel Last call announcement was generated
2012-12-23
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-12-23
07 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-07.txt
2012-12-05
06 Adrian Farrel Ballot writeup was changed
2012-12-05
06 Adrian Farrel Ballot writeup was generated
2012-12-05
06 Adrian Farrel
Hi,

I have done my usual AD review of your document as part of processing
the publication request. This review should be considered alongside
my …
Hi,

I have done my usual AD review of your document as part of processing
the publication request. This review should be considered alongside
my review of draft-ietf-roll-p2p-rpl as the documents are closely
linked.

I have a number of questions and minor issues that I would like to
resolve before advancing the documents.

As usual, all of my comments are up for discussion, but I think that a
new revision will be needed, so I have moved the document into "Revised
I-D Needed" state in the data tracker and will wait for your emails
and/or a new revision.

Many thanks for your work,
Adrian


---

As with draft-ietf-roll-p2p-rpl, I would like some discussion in the
Introduction about why this Experimental and what you expect to
discover. I think the text is easier for this document...

  This document provides a mechanism that can be used to determine
  whether and how to establish a new point-to-point route in an LLN.
  This utility of the mechanism described in this document is,
  therefore, dependent on the existence of a protocol mechanism for
  establishing P2P routes. [I-D.ietf-roll-p2p-rpl] is targeted at
  publication as an Experimental RFC for reasons described in that
  document. It makes sense, therefore, for this document also to be
  targeted as Experimental.

  As experience is gained using the mechanisms described in
  [I-D.ietf-roll-p2p-rpl] it is hoped that the mechanisms described in
  this document will also be used, and feedback will be provided to the
  ROLL working group on the utility and benefits of this document.

---

I think that "quality" is the wrong word. "Quality" is usually
associated with measures like packet loss, delay, and jitter. I don't
think you are measuring those things, and while I understand why you
say "quality of a route", I think you need some other phrase.

I think this more like...

  A Mechanism to Record the end-to-end Metrics of a Point-to-point
            Route in a Low Power and Lossy Network

In the Introduction, you have some nice words...

  to measure
  the aggregated values of the routing metrics along the existing
  route

---

Abstract

I'm confused :-)

The document title is very specific to P2P routes. But the Abstract
(deliberately?) does not mention P2P. Section 1 seems to imply that I
could run the mechanisms on any route from origin to target to see if it
is good enough - and that would include routes created using normal RPL.
But section 2 explicitly constrains the mechanism to P2P routes.

Furthermore, the redefined terminology in 1.1 (see below for my
objection to that!) seem to suggest measuring from an arbitrary origin
to an arbitrary target regardless of whether a P2P route exists.

Can you:
- unconfuse me
- make sure that the abstract and introduction explain the real
  situation
- make sure the document title is accurate
- make sure that the document is consistent
- be careful with terminology (just because you run the mechanism from
  A to B in a point-to-point sort of way, doesn't mean that there is a
  P2P route from A to B)

---

1.1                   

Did you really need to redefine these terms instead of use new terms for
new concepts? Given how close the two documents are, it's a shame to
confuse things.

---

3.1

I was going to say...

  Seems like the H flag is not needed since leaving it clear is
  semantically equivalent to setting RPLInstanceID=0b10000000

  Not very important, but you increase the chances of a malformed
  message, and you use your last bit that could be reserved for
  future use.

...but then I read the text lower down about how a transit router
can change the H flag under special circumstances. Now I am confused
because if the H flag setting is changed, surely the rule governing
the RPLInstanceID is broken.

---

3.1

Some of the flag settings that have no meaning dependent on other
flag settings are described as "MUST be set to zero" which is fine.
But should you also say they should be ignored?

---

3.1

I found the description of what goes in the Metric Container Options
inadequate. There should at least be a forward pointer to some section
that describes how this piece of the MO object is constructed, but some
text would help as well.

---

Section 4

  The Origin MUST discard the MO message if:

That reads a bit odd. Didn't the Origin just build the message? Why
would it build a message and then discard it? Why not just not build a
bad message?

---

Section 5

  An Intermediate Router MUST discard the packet with no further
  processing if the received MO is not a Measurement Request.

For clarity and consistency with other paragraphs, can you add...

  i.e., if the T flag is not set to one.

---

Section 7

  The Origin MUST discard the packet with no further processing ...
  ... if the Origin has no
  recollection of sending a Measurement Request with the sequence
  number listed in the received MO.

Trying to decide why that is a "MUST".
I guess there are some security/bug considerations.
But are you unduly limiting the Origin implementation to be required to
keep track of the MOs that it sends?

---

Section 7

  The Origin MUST examine the routing metric objects inside the Metric
  Container options to evaluate the quality of the measured P2P route.
  If a routing metric object contains local metric values recorded by
  routers on the route, the Origin MUST aggregate these local values
  into an end-to-end value as per the aggregation rules for the metric.

That is going too far in the use of "MUST". The Origin can do anything
it likes with the Measurement Reply including discard it, hash it and
use it as a random number, or process it according to policy! I think
what you need is...

  The Origin can use the routing metric objects inside the Metric
  Container to evaluate the metrics for the measured P2P route. If a
  routing metric object contains local metric values recorded by
  routers on the route, the Origin can make use of these local values
  by aggregating them into an end-to-end metric according to the
  aggregation rules for the specific metric. An Origin is then free to
  interpret the metrics for the route according to its local policy.

---

Section 8

Question. Can I use this mechanism to find out stuff about the network
that should/would otherwise be private? And could I, as an outside node
do that?

For example, if I sit next to the network and ping every possible P2P
route, can I find out which nodes are almost out of battery, and which
nodes are key nodes in the topology? Knowing this would help me attack
the network. What are the protections?


---

11.2
You have used [I-D.ietf-roll-p2p-rpl] as a normative reference (at
least for the terminology).
2012-12-05
06 Adrian Farrel State changed to AD Evaluation::Revised ID Needed from AD Evaluation
2012-11-04
06 Adrian Farrel State changed to AD Evaluation from Publication Requested
2012-10-17
06 Amy Vezza
(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper type
of RFC? …
(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper type
of RFC? Is this type of RFC indicated in the title page header?

The intended track of the RFC is Experimental, and the RFC type is indicated in
the title page header.

The rationale for proceeding with the Experimental track was that this document
and it companion ID (draft-ietf-roll-p2p-rpl-13)?are using the RPL protocol
specified in RFC6550 in a slightly different mode as originally specified by the
RFC.

Thus we think that it was reasonable to first get more experience on actual
deployment before moving to the Standard?track. There was no discontent on that
decision.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up. Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary:

Point to point (P2P) communication between arbitrary routers in a Low power and
Lossy Network (LLN) is a key requirement for many applications
[RFC5826][RFC5867].

RPL [RFC6550], the IPv6 Routing Protocol for LLNs, constrains the LLN topology
to a Directed Acyclic Graph (DAG) built to optimize the routing costs to reach
the DAG's root. The P2P routing functionality, available under RPL, has the
following key limitations:

  o  The P2P routes are restricted to use the DAG links only.  Such P2P
      routes may potentially be suboptimal and may lead to traffic
      congestion near the DAG root.

  o  RPL is a proactive routing protocol and hence requires all P2P
      routes to be established ahead of the time they are used.  Many
      LLN applications require the ability to establish P2P routes "on
      demand".

  To ameliorate situations, where the core RPL's P2P routing
  functionality does not meet the application requirements,
  [I-D.ietf-roll-p2p-rpl] describes P2P-RPL, an extension to core RPL.
  P2P-RPL provides a reactive mechanism to discover P2P routes that
  meet the specified routing constraints [RFC6551].  In some cases, the
  application requirements or the LLN's topological features allow a
  router to infer these routing constraints implicitly.  For example,
  the application may require the end-to-end loss rate and/or latency
  along the route to be below certain thresholds or the LLN topology
  may be such that a router can safely assume its destination to be
  less than a certain number of hops away from itself.

  When the existing routes are deemed unsatisfactory but the router
  does not implicitly know the routing constraints to be used in P2P-
  RPL route discovery, it may be necessary for the router to measure
  the aggregated values of the routing metrics along the existing
  route.  This knowledge will allow the router to frame reasonable
  routing constraints to discover a better route using P2P-RPL.  For
  example, if the router determines the aggregate ETX [RFC6551] along
  an existing route to be "x", it can use "ETX < x*y", where y is a
  certain fraction, as the routing constraint for use in P2P-RPL route
  discovery.  Note that it is important that the routing constraints
  are not overly strict; otherwise the P2P-RPL route discovery may fail
  even though a route, much better than the one currently being used,
  exists.

  This document specifies a mechanism that enables an RPL router to
  measure the aggregated values of the routing metrics along an
  existing route to another RPL router in an LLN, thereby allowing the
  router to decide if it wants to discover a better route using P2P-RPL
  and determine the routing constraints to be used for this purpose.

  The mechanism described in this document can be used by an Origin in
  an LLN to measure the aggregated values of some routing metrics along
  a P2P route to a Target within the LLN.  The route is measured in the
  direction from the Origin to the Target.  Such a route could be a
  source route or a hop-by-hop route established using RPL [RFC6550] or
  P2P-RPL [I-D.ietf-roll-p2p-rpl].  The Origin decides what metrics to
  measure and sends a Measurement Request message, carrying the desired
  routing metric objects, along the route.  On receiving a Measurement
  Request, an Intermediate Router updates the routing metric values
  inside the message and forwards it to the next hop on the route.
  Thus, the Measurement Request accumulates the values of the routing
  metrics for the complete route as it travels towards the Target.
  Upon receiving the Measurement Request, the Target unicasts a
  Measurement Reply message, carrying the accumulated values of the
  routing metrics, back to the Origin.  Optionally, the Origin may
  allow an Intermediate Router to generate the Measurement Reply if it
  already knows the relevant routing metric values along rest of the
  route.

Working Group Summary:

No discontent. Once again, few comments, request for clarifications that have
all been addressed by in this revision.

Document Quality:

Yes there are several known implementations of this specification, with interop
testing:

An interoperability was carried out last month with INRIA's implementation
against Sigma Design's?
implementation. The report can be found:
http://hal.inria.fr/docs/00/66/16/29/PDF/RR-7864.pdf

Experiments with P2P-RPL have also taken place on the Senslab testbed gathering
boards based?
on MSP430 and 802.15.4 at 2.4GHz:
http://hal.archives-ouvertes.fr/docs/00/65/16/03/PDF/SOFTCOM-2011.pdf

Personnel:

The Document Shepherd is JP Vasseur (ROLL co-chair) and the responsible Area
Director is Adrian Farrel (AD Routing Area)

(3) Briefly describe the review of this document that was performed by the
Document Shepherd. If this version of the document is not ready for publication,
please explain why the document is being forwarded to the IESG.

The document is sound, has received a very good level of attention and reviews
including from the Shepherd prior to issuing the publication request, and is
ready for publication as experimental track.

(4) Does the document Shepherd have any concerns about the depth or breadth of
the reviews that have been performed?

No Concern.

The I-D has been discussed in great detail by a number of key members of the
Working group. Number of comments have been made on the mailing list during two
WG Last Calls and have all been addressed in this revision. Note that several
tickets have been opened and have been successfully closed.

(5) Do portions of the document need review from a particular or from broader
perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or
internationalization? If so, describe the review that took place.

No need for broader review.

(6) Describe any specific concerns or issues that the Document Shepherd has with
this document that the Responsible Area Director and/or the IESG should be aware
of? For example, perhaps he or she is uncomfortable with certain parts of the
document, or has concerns whether there really is a need for it. In any event,
if the WG has discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

No particular concern. Some questions were raised has to whether using a
pro-active protocol in a "reactive" way was scalable; thus the choice to advance
the document along the experimental track.

(7) Has each author confirmed that any and all appropriate IPR disclosures
required for full conformance with the provisions of BCP 78 and BCP 79 have
already been filed. If not, explain why?

Yes. I have personally checked with all co-authors of the document.

(8) Has an IPR disclosure been filed that references this document? If so,
summarize any WG discussion and conclusion regarding the IPR disclosures.

No.

(9) How solid is the WG consensus behind this document? Does it represent the
strong concurrence of a few individuals, with others being silent, or does the
WG as a whole understand and agree with it?

Good consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the
Responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

No threats. No discontent.

(11) Identify any ID nits the Document Shepherd has found in this document. (See
http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist).
Boilerplate checks are not enough; this check needs to be thorough.

Checks have been made. No Errors.

(12) Describe how the document meets any required formal review criteria, such
as the MIB Doctor, media type, and URI type reviews.

Not applicable.

(13) Have all references within this document been identified as either
normative or informative?

References split has been done.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative references
exist, what is the plan for their completion?

The only normative reference is to an RFC.

(15) Are there downward normative references (see RFC 3967)? If so, list these
downward references to support the Area Director in the Last Call procedure.

No

(16) Will publication of this document change the status of any existing RFCs?
Are those RFCs listed on the title page header, listed in the abstract, and
discussed in the introduction? If the RFCs are not listed in the Abstract and
Introduction, explain why, and point to the part of the document where the
relationship of this document to the other RFCs is discussed. If this
information is not in the document, explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document. Confirm
that all protocol extensions that the document makes are associated with the
appropriate reservations in IANA registries. Confirm that any referenced IANA
registries have been clearly identified. Confirm that newly created IANA
registries include a detailed specification of the initial contents for the
registry, that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC 5226).

The IANA action is properly documented.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful in
selecting the IANA Experts for these new registries.

The IANA section specifies no new registries.

(19) Describe reviews and automated checks performed by the Document Shepherd to
validate sections of the document written in a formal language, such as XML
code, BNF rules, MIB definitions, etc.

No other automated checks performed.

2012-10-17
06 Amy Vezza Note added 'The Document Shepherd is JP Vasseur (jvasseur@cisco.com).'
2012-10-17
06 Amy Vezza Intended Status changed to Experimental
2012-10-17
06 Amy Vezza IESG process started in state Publication Requested
2012-09-17
06 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-06.txt
2012-05-09
05 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-05.txt
2012-03-06
04 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-04.txt
2012-03-04
03 Mukul Goyal New version available: draft-ietf-roll-p2p-measurement-03.txt
2011-10-29
02 (System) New version available: draft-ietf-roll-p2p-measurement-02.txt
2011-07-11
01 (System) New version available: draft-ietf-roll-p2p-measurement-01.txt
2011-04-11
00 (System) New version available: draft-ietf-roll-p2p-measurement-00.txt