Skip to main content

Reactive Discovery of Point-to-Point Routes in Low-Power and Lossy Networks
draft-ietf-roll-p2p-rpl-17

Revision differences

Document history

Date Rev. By Action
2013-08-13
17 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-08-09
17 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-07-24
17 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-07-11
17 (System) RFC Editor state changed to EDIT from MISSREF
2013-04-02
17 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2013-04-01
17 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2013-04-01
17 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-03-31
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2013-03-31
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2013-03-29
17 (System) RFC Editor state changed to MISSREF
2013-03-29
17 (System) Announcement was received by RFC Editor
2013-03-29
17 Adrian Farrel Ballot writeup was changed
2013-03-29
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2013-03-29
17 (System) IANA Action state changed to In Progress
2013-03-29
17 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2013-03-29
17 Amy Vezza IESG has approved the document
2013-03-29
17 Amy Vezza Closed "Approve" ballot
2013-03-29
17 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2013-03-29
17 Adrian Farrel Ballot approval text was generated
2013-03-29
17 Adrian Farrel Changed consensus to Yes from Unknown
2013-03-29
17 Adrian Farrel Ballot writeup was changed
2013-03-29
17 Adrian Farrel Ballot writeup was changed
2013-03-27
17 Sean Turner [Ballot comment]
Thank you for dealing with my discusses.
2013-03-27
17 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2013-03-22
17 Martin Stiemerling [Ballot comment]
Thank you for addressing my concerns!
2013-03-22
17 Martin Stiemerling [Ballot Position Update] Position for Martin Stiemerling has been changed to No Objection from Discuss
2013-03-21
17 Brian Haberman [Ballot comment]
Thanks for addressing my concerns.
2013-03-21
17 Brian Haberman [Ballot Position Update] Position for Brian Haberman has been changed to No Objection from Discuss
2013-03-20
17 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-03-20
17 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-17.txt
2013-03-16
16 Michael Richardson Changed shepherd to JP Vasseur
2013-02-14
16 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2013-02-07
16 Amy Vezza State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2013-02-07
16 Alexey Melnikov Request for Telechat review by GENART Completed: Ready. Reviewer: Alexey Melnikov.
2013-02-07
16 Sean Turner
[Ballot discuss]
The security of RPL is either unsecured, pre-installed, or authenticated.  We'll dismiss authenticated because it's not fully defined in RPL and you don't …
[Ballot discuss]
The security of RPL is either unsecured, pre-installed, or authenticated.  We'll dismiss authenticated because it's not fully defined in RPL and you don't do define it in this draft  Assuming an implementation can support pre-installed, I get how you can try to find a new route to the target because the origin and target share a key.  If there's no route, then does that mean that the target isn't yet part of the DODAG but has a key or does that mean the target has to get a key to become part of the DODAG?  If it's the former, then no issue and I'll clear right away if it's the later, then is there an when reusing the key from the previous DODAG for this temporary DODAG?

I share the INT AD's concerns about the data object, but mostly because I think RPL security isn't really going to get implemented.  More importantly, there's also concerns with encrypting really small amounts of data.  What if the data to be secured is only 1 byte?
2013-02-07
16 Sean Turner
[Ballot comment]
BTW - I find this rpl thing fascinating.

s4: I'm not sure it's worth adding but maybe: "they have the key necessary to …
[Ballot comment]
BTW - I find this rpl thing fascinating.

s4: I'm not sure it's worth adding but maybe: "they have the key necessary to join the network, if acting in a secure fashion" or something like that.

s6.1: Is there a statement in 6550 that says the default for the Authentication Flag is cleared? I know it's not defined and obviously can't be one, but I'm just looking for an explicit statement that says the default is cleared.
2013-02-07
16 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2013-02-07
16 Stephen Farrell
[Ballot comment]
(Apologies, I had to read this document in chunks due
to other time pressures, so this review might also be a
bit chunky;-) …
[Ballot comment]
(Apologies, I had to read this document in chunks due
to other time pressures, so this review might also be a
bit chunky;-)

- I agree with Sean's DISCUSS

- section 3, the term Target might create an irritating
conflict with how that same term is used in geopriv but
I'm guessing you won't want to change.

- section 4, I don't quite get how this is triggered,
in the remote-conrol/lamp case, is the remote-control
the Origin or a non-router host? If the latter, then
I'm not sure how the remote-control's next-hop router
could know to trigger this process. The former option
seems quite constraining, since it'd mean that all
hosts that can benefit from this need to be p2p-rpl
aware routers, and that seems less rather than more
likely.

- section 4, I'm also not sure how the remote-control
knows the lamp's IP address to start with. How's that
work?  Specification for that probably doesn't belong
here, but I wondered and it might be good to explain a
bit in this draft.

- section 4, 3rd last para: I don't see how the guy who
makes the remote-control (if its the Source LLN router)
can know how to set all those things that the "network
designer" knows how to set. Maybe I'm just missing the
point?

- section 5: sending application data with routing
messages seems to have security issues since the DIOs
are sent more or less all over I think? That implies
that a one-to-many confidentiality service might be
needed which seems very very hard (i.e. silly) in a p2p
context. And of course that also assumes that the
application runs on the "Source" LLN router as well so
you can know what is and is not time-critical. I also
wonder what'd happen if the "application data" you mean
were a TCP SYN packet which seems likely isn't it? The
same security issues arise with the data option in a
DRO. (FYI in case it helps this would have generated a
DISCUSS from me for a standards track protocol but
since there are already two discusses about this I'll
not pile on.)

- 6.1, Why is "Authentication Enabled: 0" the default
and why does that differ from 6550? (If it does.)

- 7.1, Lifetime field - it wasn't clear to me when a
router starts counting down to the end of the Lifetime
for the DAG.

- 7.2, Only allowing 256 bytes here may effectively
mean securing that data is never possible. That seems
undesirable.

- 7.2 saying a deployment SHOULD take security into
consideration seems meaningless.

- section 8 says the DODAGID identifies the Origin and
that confused me, do you mean its value is the origin's
IP address?

- section 13 says: "Each RPL control message has a
secure version that allows the specification of the
level of security and the algorithms used to secure the
message. " and " These DIOs can be used in their secure
versions if desired" but I have to say I'm unconvinced
that that's sufficiently well defined here (or in 6550)
to allow interop and offer useful security. There
doesn't seem to be any mention of the "secure DRO" in
section 11 for example. I'd love to be proven wrong
however, so can you try convince me that I'm wrong?
(This would also have been a DISCUSS on a standards
track document, even if the authors could justifiably
say that the real fault lies in 6550.)
2013-02-07
16 Stephen Farrell Ballot comment text updated for Stephen Farrell
2013-02-07
16 Stephen Farrell
[Ballot comment]

(Apologies, I had to read this document in chunks due
to other time pressures, so this review might also be a
bit chunky;-) …
[Ballot comment]

(Apologies, I had to read this document in chunks due
to other time pressures, so this review might also be a
bit chunky;-)

- section 3, the term Target might create an irritating
conflict with how that same term is used in geopriv but
I'm guessing you won't want to change.

- section 4, I don't quite get how this is triggered,
in the remote-conrol/lamp case, is the remote-control
the Origin or a non-router host? If the latter, then
I'm not sure how the remote-control's next-hop router
could know to trigger this process. The former option
seems quite constraining, since it'd mean that all
hosts that can benefit from this need to be p2p-rpl
aware routers, and that seems less rather than more
likely.

- section 4, I'm also not sure how the remote-control
knows the lamp's IP address to start with. How's that
work?  Specification for that probably doesn't belong
here, but I wondered and it might be good to explain a
bit in this draft.

- section 4, 3rd last para: I don't see how the guy who
makes the remote-control (if its the Source LLN router)
can know how to set all those things that the "network
designer" knows how to set. Maybe I'm just missing the
point?

- section 5: sending application data with routing
messages seems to have security issues since the DIOs
are sent more or less all over I think? That implies
that a one-to-many confidentiality service might be
needed which seems very very hard (i.e. silly) in a p2p
context. And of course that also assumes that the
application runs on the "Source" LLN router as well so
you can know what is and is not time-critical. I also
wonder what'd happen if the "application data" you mean
were a TCP SYN packet which seems likely isn't it? The
same security issues arise with the data option in a
DRO. (FYI in case it helps this would have generated a
DISCUSS from me for a standards track protocol but
since there are already two discusses about this I'll
not pile on.)

- 6.1, Why is "Authentication Enabled: 0" the default
and why does that differ from 6550? (If it does.)

- 7.1, Lifetime field - it wasn't clear to me when a
router starts counting down to the end of the Lifetime
for the DAG.

- 7.2, Only allowing 256 bytes here may effectively
mean securing that data is never possible. That seems
undesirable.

- 7.2 saying a deployment SHOULD take security into
consideration seems meaningless.

- section 8 says the DODAGID identifies the Origin and
that confused me, do you mean its value is the origin's
IP address?

- section 13 says: "Each RPL control message has a
secure version that allows the specification of the
level of security and the algorithms used to secure the
message. " and " These DIOs can be used in their secure
versions if desired" but I have to say I'm unconvinced
that that's sufficiently well defined here (or in 6550)
to allow interop and offer useful security. There
doesn't seem to be any mention of the "secure DRO" in
section 11 for example. I'd love to be proven wrong
however, so can you try convince me that I'm wrong?
(This would also have been a DISCUSS on a standards
track document, even if the authors could justifiably
say that the real fault lies in 6550.)
2013-02-07
16 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2013-02-07
16 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2013-02-07
16 Martin Stiemerling
[Ballot discuss]
I have no general objections to the publication of the draft, but I have a few points to be discussed.

And here is …
[Ballot discuss]
I have no general objections to the publication of the draft, but I have a few points to be discussed.

And here is my full review:

*Issue 1): data piggybacking:
Section 1., paragraph 9:

>    o  The utility and the implementation complexity of the Data Option
>      (Section 7.2) that provides a facility to piggyback time-critical
>      application data on the routing messages;

My DISCUSS is basically the same as Ralph's DISCUSS about the data piggybacking is actually in this protocol. I do not see any good justification for this in the draft and the introduction of this mode raises tons of questions on how this is handled in real life.
There is some light text about the purpose of this piggybacking in Section 5., paragraph 8, but there is for instance no central place where the usage of this mode and its implications is described. This looks like a hack, but not like a good idea. See also right down here for some further questions, just a few that came immediately to my mind:

Section 7.2., paragraph 9:

>    Data Option received inside a parent's DIO and MUST include this Data
>    Option in all its future DIO transmissions for this temporary DAG.
>    The same is true for a Target that needs to propagate the DIOs
>    further (required when the route discovery involves multiple
>    Targets).  If a Target chooses to include a Data Option inside a DRO,

  So this effectively means that the data is copied into multiple
  other messages and send out to the network, isn't it? Is there any
  control on whether this is causing congestion in that area where
  the messages are multiplied?


Section 7.2., paragraph 11:

>    Note that the data inside a Data Option has the same level of
>    security as the DIO/DRO message it is part of.  A P2P-RPL deployment
>    SHOULD take in consideration the security requirements of the data
>    being sent inside the Data Options when deciding the overall security
>    requirements.  Further, note that P2P-RPL does not guarantee
>    successful delivery of the data contained in a Data Option.

  There is a not so obvious dependency between the data carried in
  the Data Option and the P2P-RDO's R flag: If the upper layer is
  TCP and it is a TCP SYN the R flag must be set in order to carry
  the SYN ACK back to the originator.


Section 8.2., paragraph 2:

>    o  Reply (R): This flag MUST be set to zero on transmission and
>      ignored on reception.

  What if the piggybacked data requieres a response and a reply on
  the rpl level is not allowed?

Section 7.2., paragraph 8:

>    If the Origin chooses to include a Data Option inside its DIO, it
>    MUST include the same Data Option in all its future DIO transmissions
>    for this temporary DAG.  An Intermediate Router MUST NOT modify the

  What is 'same Data Option' meaning? Is it just the option itself
  or is the option with always the same data?


*Issue 2) Extemely vague retransmission handling of DRO-ACK
Section 10., paragraph 3:

>    A DRO message may fail to reach the Origin due to a number of
>    reasons.  Unlike the DIO messages that benefit from Trickle-
>    controlled retransmissions, the DRO messages are prone to loss due to
>    unreliable packet transmission in LLNs.  Since a DRO message travels
>    via link-local multicast, it cannot use link-level acknowledgements
>    to improve the reliability of its transmission.  Also, an
>    Intermediate Router may drop the DRO message (e.g., because of its
>    inability to store the state for the Hop-by-hop Route the DRO is
>    establishing).  To protect against the potential failure of a DRO
>    message to reach the Origin, the Target MAY request the Origin to
>    send back a DRO Acknowledgement (DRO-ACK) message on receiving a DRO
>    message.  Failure to receive such an acknowledgement within the
>    DRO_ACK_WAIT_TIME interval of sending the DRO message forces the
>    Target to resend the message.

  Is there anyback off mechanism for the retransmission of the DRO-ACK
  message? I haven't seen any.


*Issue 3) Missing safety margin for the reuse of RPLInstanceID:
Section 6.1., paragraph 2:

>    o  RPLInstanceID: RPLInstanceID MUST be a local value as described in
>      Section 5.1 of [RFC6550].  The Origin MUST NOT reuse an
>      RPLInstanceID for a route discovery if its previous route
>      discovery using this RPLInstanceID might still be going on.  As
>      described in Section 7.1, the Life Time parameter in the P2P Route
>      Discovery Option specifies the time duration the route discovery
>      lasts.  So, the Origin MUST NOT reuse an RPLInstanceID in a route
>      discovery until the Life Time of its previous route discovery
>      using this RPLInstanceID is over.  When initiating a new route
>      discovery to a particular Target, the Origin MUST NOT reuse the
>      RPLInstanceID used in a previous route discovery to this Target if
>      the previously discovered routes might still exist.  The Default

  What is the safety margin associated with 'might still exists'? In
  TCP there is the Maximum Segment Lifetime (MSL) that is an upper
  bound on how long something is expected to be in the network. Your
  phrasing is a bit weak in that respect, especially not all routers
  along a path will forget the RPLInstanceID at the same time. However,
  as this is an experimental specification where such an ultimate
  timeout is not known, I would be happy to have this documented in
  a separate section under 'Known Issues/Future Work'.


Section 6.1., paragraph 3:

>      Lifetime and Lifetime Unit parameters in the DODAG Configuration
>      Option specify the lifetime of the state the routers, including
>      the Origin and the Target, maintain for a Hop-by-hop or a Source
>      Route discovered using P2P-RPL.  Thus, an Origin can safely reuse
>      an RPLInstanceID to discover a new route to a Target if the
>      lifetime of all previously discovered routes to this Target using
>      this RPLInstanceID is over.

  I would suggest is over plus some delta on top of it, in order to
  have a safety margin.
2013-02-07
16 Martin Stiemerling
[Ballot comment]
I suggest to add a section that describes more the experimental framework of this draft, including a list of items that a unclear …
[Ballot comment]
I suggest to add a section that describes more the experimental framework of this draft, including a list of items that a unclear by now, potentially in a (sub-)section 'Known Issues/Future Work'. I have found several places where open issues exists (see below) and also issue 3 in the DISCUSS part that should be documented in a single place -- for clarity and also for the simplicity of finding them in one spot and not scatterd around in the draft.


Section 6.1., paragraph 27:

>    Individual P2P-RPL deployments are encouraged to share their
>    experience with these default values with ROLL working group to help
>    guide the development of standards track version of the protocol.

  I would add this to the proposed section 'Known Issues/Future Work',
  just to have the possible 'construction areas' documented in a
  single place.


Section 9.2., paragraph 16:

>    Individual P2P-RPL deployments are encouraged to share their
>    experience with these rules with ROLL working group to help guide the
>    development of standards track version of the protocol.
>    Applicability Statements that specify the use of P2P-RPL MUST provide
>    guidance for setting Trickle parameters, particularly Imin and the
>    redundancy constant.

  This section until here seems to raise a number of questions that
  can only be answered in real deployments. I would add a pointer here
  to the proposed section 'Known Issues/Future Work'. The description
  itself in this section looks pretty comprehensive.

Section 2., paragraph 1:

>    One use case, common in home [RFC5826] and commercial building
>    [RFC5867] environments, involves a device (say a remote control or an
>    airduct controller) that suddenly needs to communicate with another
>    device (say a lamp or a humidity sensor) to which it does not already
>    have a route.  In this case, the remote control (or the airduct
>    controller) must be able to discover a route to the lamp (or the
>    humidity sensor) "on demand".

  I would remove the 'airduct controller' from the example as it
  doesn't add anything to the example, but just makes the text harder
  to read.

Section 8., paragraph 4:

>    A DRO message MAY serve the function of letting the routers in the
>    LLN know that a P2P-RPL route discovery is complete and no more DIO

  I am confused about the 'MAY'. Is the function now to let the routers
  know that the discovery is complete or not? I guess it should more
  read 'messages can server'?
2013-02-07
16 Martin Stiemerling Ballot comment and discuss text updated for Martin Stiemerling
2013-02-07
16 Martin Stiemerling
[Ballot discuss]
I have no general objections to the publication of the draft, but I have a few points to be discussed. This is a …
[Ballot discuss]
I have no general objections to the publication of the draft, but I have a few points to be discussed. This is a placeholder until I have finished my review.

One item ahead: I'm in full support of Ralph's DISCUSS about the piggyback time-critical application data on the DIO messages.
2013-02-07
16 Martin Stiemerling Ballot discuss text updated for Martin Stiemerling
2013-02-07
16 Martin Stiemerling
[Ballot discuss]
I have no principal objections to the publication of the draft, but I have a few points to be discussed. This is a …
[Ballot discuss]
I have no principal objections to the publication of the draft, but I have a few points to be discussed. This is a placeholder until I have finished my review.

One item ahead: I'm in full support of Ralph's DISCUSS about the piggyback time-critical application data on the DIO messages.
2013-02-07
16 Martin Stiemerling [Ballot Position Update] New position, Discuss, has been recorded for Martin Stiemerling
2013-02-06
16 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2013-02-06
16 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2013-02-06
16 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2013-02-06
16 Ralph Droms
[Ballot comment]
1. selection of routes by the Target and sending the DRO:

In the Hop-by-Hop case, after the route is selected and DRO is …
[Ballot comment]
1. selection of routes by the Target and sending the DRO:

In the Hop-by-Hop case, after the route is selected and DRO is sent,
can the Target send a better route to override the route sent earlier?
I'm thinking of the case in which an optimization occurs while the
temporary DODAG is running and the Target gets a better route.  Or,
once it has sent a DRO, does it resend the same route after receipt
subsequent DIOs?

In the Source-route case, does the Target send N DROs, one with each
selected route, and then stop sending DROs?

2. In section 9.7: Why is the DRO multicast to the next hop on the
path to the Origin?  Isn't the address of the next hop in the DRO
address list?

3. Does RPL have the same behavior that routes installed by RPL may
be retained beyond the lifetime of the DAG that caused the routes to
be installed?  If not, it might be helpful to add a note giving
implementors a heads-up.

4. Related to earlier comments about address selection, in section
9.4, this text:

  if the router cannot elide Compr (as specified in
  the P2P-RDO) prefix octets from its IPv6 address

ought to be edited to reflect that the Intermediate Router may have
multiple IPv6 addresses to choose from.  Should the Intermediate
Router consider the Target prefix and Compr in the selection of an
address to add to the P2P-RDO?

5. What link-scoped multicast address is used for forwarding
DROs?

The following are simply editorial nits:

1. It would be clearer (for me, anyway!) if the mode were simply given
as "Hop-by-Hop mode" or "Source routing mode" rather than by "H flag
is zero".

2. In section 11, "An Origin MAY use a Source Routing Header (SRH)
[RFC6554]...".  What else would it use?  How about "An Origin uses the
Source Routing Header (SRH) [RFC6554]..."

3. section 9.3: "send or receive" -> "send or process" (it's hard to
not receive the messages)

4. This sentence might benefit from more detail: "The temporary DAG
MUST NOT be used to route packets" (unless using a DAG to route data
packets [which is what I think is implied] is a term of art).

5. For consistency, could the DRO be named P2P-DRO?
2013-02-06
16 Ralph Droms Ballot comment text updated for Ralph Droms
2013-02-06
16 Brian Haberman
[Ballot discuss]
I am confused by the last bullet in 6.1.  It states that a P2P-mode DIO may carry a PIO option, but no where …
[Ballot discuss]
I am confused by the last bullet in 6.1.  It states that a P2P-mode DIO may carry a PIO option, but no where does this document describe why (or how) that option would be used in this approach.  What benefit would including a PIO have?  Where would an arbitrary node in a RPL network get the information to include in a PIO?

I support Ralph's concern about the inclusion of the Data Option in this specification.
2013-02-06
16 Brian Haberman Ballot discuss text updated for Brian Haberman
2013-02-06
16 Ralph Droms
[Ballot discuss]
I have several architectural issues with the protocol specified in
draft-ietf-roll-p2p-rpl that I would like to discuss.

1. The Data Option introduces a …
[Ballot discuss]
I have several architectural issues with the protocol specified in
draft-ietf-roll-p2p-rpl that I would like to discuss.

1. The Data Option introduces a new style of datagram delivery,
roughly based on IPv6, but with different delivery semantics.  The
Data Option also appears to be underspecified; for example:

* How is the checksum in the "upper layer protocol header ... in the
  Data field ..." computed; what is the pseudo-header?
* Does it make sense to carry, e.g., TCP in a P2P-RPL message that
  might be delivered to multiple targets?

I'm especially concerned by:

      "By not allowing the generation of DRO messages,
      an Origin can use P2P-RPL as purely a mechanism to deliver time-
      critical application data to the Target(s)."

which seems to allow P2P-RPL to operate solely as a Internet-layer
delivery mechanism without generating any routing information.

I had a brief discussion with Adrian about the Data Option. In my
opinion, the Data Option needs a more careful review, for example by
the 6man working group (someone in Transport, as well?), before it can
be published.  Adrian made the suggestion to remove the Data Option
from this document and publish it as a separate draft, which would
avoid delaying this document and allow for additional refinement of
the Data Option specification.

2. The use of the PIO option in P2P-RPL needs to be reviewed by 6man.
In my opinion, the PIO option should not be used here.  We already
have ND and RPL for disseminating information about prefixes.

3. Does it matter which of its addresses an intermediate node inserts
in the address list in the P2P-RDO?  If it does - and I expect it
might make a difference if, for example, the node has multiple non-LL
addresses from multiple RPL instances or the node has multiple
interfaces - how does the node know which address to select?  Are LL
addresses OK?

4. How does a node process and forward P2P-RPL control messages if it
has multiple interfaces?  For example, does it forward those messages
on all interfaces, including the one on which the control message was
received (as it would if the node has one interface)?
2013-02-06
16 Ralph Droms
[Ballot comment]

1. selection of routes by the Target and sending the DRO:

In the Hop-by-Hop case, after the route is selected and DRO is …
[Ballot comment]

1. selection of routes by the Target and sending the DRO:

In the Hop-by-Hop case, after the route is selected and DRO is sent,
can the Target send a better route to override the route sent earlier?
I'm thinking of the case in which an optimization occurs while the
temporary DODAG is running and the Target gets a better route.  Or,
once it has sent a DRO, does it resend the same route after receipt
subsequent DIOs?

In the Source-route case, does the Target send N DROs, one with each
selected route, and then stop sending DROs?

2. In section 9.7: Why is the DRO multicast to the next hop on the
path to the Origin?  Isn't the address of the next hop in the DRO
address list?

3. Does RPL have the same behavior that routes installed by RPL may
be retained beyond the lifetime of the DAG that caused the routes to
be installed?  If not, it might be helpful to add a note giving
implementors a heads-up.

4. Related to earlier comments about address selection, in section
9.4, this text:

  if the router cannot elide Compr (as specified in
  the P2P-RDO) prefix octets from its IPv6 address

ought to be edited to reflect that the Intermediate Router may have
multiple IPv6 addresses to choose from.  Should the Intermediate
Router consider the Target prefix and Compr in the selection of an
address to add to the P2P-RDO?

The following are simply editorial nits:

1. It would be clearer (for me, anyway!) if the mode were simply given
as "Hop-by-Hop mode" or "Source routing mode" rather than by "H flag
is zero".

2. In section 11, "An Origin MAY use a Source Routing Header (SRH)
[RFC6554]...".  What else would it use?  How about "An Origin uses the
Source Routing Header (SRH) [RFC6554]..."

3. section 9.3: "send or receive" -> "send or process" (it's hard to
not receive the messages)

4. This sentence might benefit from more detail: "The temporary DAG
MUST NOT be used to route packets" (unless using a DAG to route data
packets [which is what I think is implied] is a term of art).

5. For consistency, could the DRO be named P2P-DRO?
2013-02-06
16 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded for Ralph Droms
2013-02-06
16 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2013-02-06
16 Brian Haberman
[Ballot discuss]
I am confused by the last bullet in 6.1.  It states that a P2P-mode DIO may carry a PIO option, but no where …
[Ballot discuss]
I am confused by the last bullet in 6.1.  It states that a P2P-mode DIO may carry a PIO option, but no where does this document describe why (or how) that option would be used in this approach.  What benefit would including a PIO have?  Where would an arbitrary node in a RPL network get the information to include in a PIO?
2013-02-06
16 Brian Haberman [Ballot Position Update] Position for Brian Haberman has been changed to Discuss from No Objection
2013-02-06
16 Brian Haberman
[Ballot comment]
I have no objections to the publication of this document, but I do have one comment:

The 2nd paragraph of Section 2 reads …
[Ballot comment]
I have no objections to the publication of this document, but I do have one comment:

The 2nd paragraph of Section 2 reads as if it is desirable to route traffic through a point of congestion.  I would suggest re-wording the second part of the paragraph to say that avoiding the congestion near the root is desirable using P2P routes.
2013-02-06
16 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2013-02-05
16 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2013-02-04
16 Russ Housley [Ballot comment]

  As already pointed out in the Gen-ART Review by  Alexey Melnikov,
  please expand the First use of "DIO".
2013-02-04
16 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2013-02-03
16 Barry Leiba Ballot comment text updated for Barry Leiba
2013-02-03
16 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2013-02-03
16 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-16.txt
2013-01-29
15 Barry Leiba
[Ballot comment]
A small, non-blocking editorial point:

-- Section 5 --

The second paragraph and the fourth both start with the same sentence; I thought …
[Ballot comment]
A small, non-blocking editorial point:

-- Section 5 --

The second paragraph and the fourth both start with the same sentence; I thought I was reading the same thing over again.  I thought I was reading the... ah.  I suggest re-phrasing to avoid that.

While we're on the fourth paragraph, there's some odd commatosis here:

  A P2P-RPL route discovery takes place by forming a temporary DAG
  rooted at the Origin.  The DIOs, used to create the temporary DAG,
  are identified by a new Mode of Operation (P2P Route Discovery mode
  defined in Section 6).  The DIOs, listing the P2P Route Discovery
  mode as the Mode of Operation, are henceforth referred to as the P2P
  mode DIOs.

When you set a clause off by commas, as you do twice in the quoted paragraph, you (often) make that clause non-restrictive, which means that it can be removed without changing the meaning of the sentence (try it with this sentence, and the phrase "as you do twice in the quoted paragraph").  In this case, both clauses (after "The DIOs" each time) are restrictive; all four commas need to disappear in a puff of orange smoke.
2013-01-29
15 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2013-01-24
15 Adrian Farrel Removed telechat returning item indication
2013-01-19
15 Adrian Farrel Telechat date has been changed to 2013-02-07 from 2013-01-24
2013-01-17
15 Jean Mahoney Request for Telechat review by GENART is assigned to Alexey Melnikov
2013-01-17
15 Jean Mahoney Request for Telechat review by GENART is assigned to Alexey Melnikov
2013-01-07
15 Alexey Melnikov Request for Last Call review by GENART Completed: Ready. Reviewer: Alexey Melnikov.
2013-01-05
15 Adrian Farrel State changed to IESG Evaluation from Waiting for AD Go-Ahead
2013-01-05
15 Adrian Farrel Placed on agenda for telechat - 2013-01-24
2013-01-05
15 Adrian Farrel Ballot has been issued
2013-01-05
15 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel
2013-01-05
15 Adrian Farrel Created "Approve" ballot
2013-01-05
15 Adrian Farrel Ballot writeup was changed
2013-01-03
15 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-12-20
15 Pearl Liang
IANA has reviewed draft-ietf-roll-p2p-rpl-15 and has the following comments:

IANA understands that, upon approval of this document, there are two actions which IANA must complete. …
IANA has reviewed draft-ietf-roll-p2p-rpl-15 and has the following comments:

IANA understands that, upon approval of this document, there are two actions which IANA must complete.

First, in the Mode of Operation subregistry of the Routing Protocol for Low Power and Lossy Networks (RPL) located at:

http://www.iana.org/assignments/rpl/rpl.xml

a new Mode of Operations will be registered as follows:

Value: [ tbd ]
Description: P2P Route Discovery Mode of Operation
Reference: [ RFC-to-be ]

Second, in the RPL Control Message Options subregistry of the Routing Protocol for Low Power and Lossy Networks (RPL) located at:

http://www.iana.org/assignments/rpl/rpl.xml

two new Control Message Options will be registered as follows:

Value: [ tbd ]
Meaning: P2P Route Discovery Option
Reference: [ RFC-to-be ]

Value: [ tbd ]
Meaning: Data Option
Reference: [ RFC-to-be ]

IANA understands that these are the only actions that need to be completed upon approval of this document.

Note: The actions requested in this document will not be completed
until the document has been approved for publication as an RFC.
2012-12-13
15 Jean Mahoney Request for Last Call review by GENART is assigned to Alexey Melnikov
2012-12-13
15 Jean Mahoney Request for Last Call review by GENART is assigned to Alexey Melnikov
2012-12-13
15 Tero Kivinen Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker
2012-12-13
15 Tero Kivinen Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker
2012-12-12
15 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Reactive Discovery of Point-to-Point Routes in …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Reactive Discovery of Point-to-Point Routes in Low Power and Lossy Networks) to Experimental RFC


The IESG has received a request from the Routing Over Low power and Lossy
networks WG (roll) to consider the following document:
- 'Reactive Discovery of Point-to-Point Routes in Low Power and Lossy
  Networks'
  as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-01-03. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

  This document specifies a point-to-point route discovery mechanism,
  complementary to the RPL core functionality.  This mechanism allows
  an IPv6 router to discover "on demand" routes to one or more IPv6
  routers in the LLN such that the discovered routes meet specified
  metrics constraints.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-roll-p2p-rpl/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-roll-p2p-rpl/ballot/


No IPR declarations have been submitted directly on this I-D.
2012-12-12
15 Amy Vezza State changed to In Last Call from Last Call Requested
2012-12-12
15 Adrian Farrel Last call was requested
2012-12-12
15 Adrian Farrel Ballot approval text was generated
2012-12-12
15 Adrian Farrel State changed to Last Call Requested from AD Evaluation::AD Followup
2012-12-12
15 Adrian Farrel Last call announcement was changed
2012-12-12
15 Adrian Farrel Last call announcement was generated
2012-12-12
15 Adrian Farrel Last call announcement was generated
2012-12-12
15 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-12-12
15 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-15.txt
2012-12-05
14 Adrian Farrel Ballot writeup was changed
2012-12-05
14 Adrian Farrel Ballot writeup was generated
2012-12-05
14 Adrian Farrel
AD review
======
Hi,

I have done my usual AD review of your document as part of processing
the publication request. This review should be …
AD review
======
Hi,

I have done my usual AD review of your document as part of processing
the publication request. This review should be considered alongside
my review of draft-ietf-roll-p2p-measurement as the documents are
closely linked.

I have a number of questions and minor issues that I would like to
resolve before advancing the documents.

As usual, all of my comments are up for discussion, but I think that a
new revision will be needed, so I have moved the document into "Revised
I-D Needed" state in the data tracker and will wait for your emails
and/or a new revision.

Many thanks for your work,
Adrian

---

I would like you to include some discussion of the "experiment". There
is a note in section 6.1 encouraging deployments to share their
experience of the default values, but that seems like the tip of the
iceberg. Section 9.2 might also usefully contain such a statement.

A way to approach this is to put a paragraph or two at the end of
Section 1 saying:

- This document is presented as an Experimental specification
  because...
- Reports of observations in implementation and deployment are
  encouraged in particular with respect to...
- It is anticipated that, if there is interest and positive reports
  of experimental research and deployments, this specification might
  be revised at some time in the future to progress it on to the
  Standards Track.

---

Some abbreviations will need to be spelled out:
DODAG
RPL

---

Section 1

  Also, the discovered routes may not
  be optimal.

I prefer s/may/might/

Similarly in Section 5

  Also, the discovered routes may not be the best available.

---

There are several mentions of the fact that this I-D allows discovery
of up to four Source Routes per Target. Should you include a comment
about why that limit is acceptable?

---

I am slightly worried by Section 5 saying

  The Target may
  remember the discovered route for use as a Source Route to reach the
  Origin.

Of course, this is true, but there is no evidence that the discovered
Origin-to-Target route can be reversed, so there is no evidence that the
discovered route will work as a Source Route to reach the Origin. I feel
that suggesting this option without qualifying it very heavily is rather
unwise.

Now 7.1 says

      *  The IPv6 addresses in the Address vector MUST be reachable in
        both Forward and Backward directions.  Reachability in the
        Backward direction allows a DRO message to use the route
        accumulated in the Address vector to travel from the Target to
        the Origin.

This would address my concern, but I don't see how a node filling an
address into the Address vector knows that that address is reachable in
the backward direction. That could, itself, be fixed if there is a
process that says a node receiving an Address vector MUST check the last
address in the list and drop the whole message if the address is not
reachable in the backward direction - ah, and there it is in Section
9.4.

So it is all a bit buried! Can you put in some forward pointers?

---

Starting at the top of Section 6 there are some rules about how messages
must be formed. E.g.:

  A P2P mode DIO
  MUST carry one and only one P2P Route Discovery Option

We need a statement (presumably a catch-all, and possibly a pointer to
6550) that tells an implementation what to do with a malformed message.
Some cases will be reject/discard, but I think some will be ignore. For
example, in Section 6.1:
  Version Number: MUST be set to zero
...can surely be safely ignored by the receiver.

And, a number of the fields if set wrongly will simply break things, but
it may be possible to protect against this by cross-checking with the
MOP.

At the end of 6.1, I do find...

  A router MUST discard a received P2P mode DIO if it violates any of
  the rules listed above.

...but it feels like this is intended to apply to the immediately-
preceding bullet list.

---

Section 6.1 has

  o  Mode of Operation (MOP): MUST be set to 4, corresponding to P2P
      Route Discovery mode.

I think this "4" needs to be replaced with "TBD1"

---

Section 7.1

      *  A router adding its address to the vector MUST ensure that its
        address does not already exist in the vector.

s/its address does/any of its addresses do/

---

Section 7.2 and 14.4

Why do you feel it necessary or good to create a new registry of payload
protocols?  Is the 5237 registry a problem for some reason?

Furthermore, why have you reserved 0xff for Private Use? Given that the
whole document is Experimental, this seems a bit extreme. Do you have
a specific motivation for this unusual assignment?

---

Section 8: Options

Since multiple options may be present, you need to describe any ordering
rules.

---

Section 13

Do you think you should advise applications sending data in the Data
Option to take their own precautions to:
a. secure against modification
b. encrypt
c. retransmit/acknowledge
the data they are sending?
2012-12-05
14 Adrian Farrel State changed to AD Evaluation::Revised ID Needed from AD Evaluation
2012-11-04
14 Adrian Farrel State changed to AD Evaluation from Publication Requested
2012-10-17
14 Amy Vezza
(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper type
of RFC? …
(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper type
of RFC? Is this type of RFC indicated in the title page header?

The intended track of the RFC is Experimental, and the RFC type is indicated in
the title page header.

The rationale for proceeding with the Experimental track was that this document
and it companion ID (draft-ietf-roll-p2p-rpl-13)?are using the RPL protocol
specified in RFC6550 in a slightly different mode as originally specified by the
RFC.

Thus we think that it was reasonable to first get more experience on actual
deployment before moving to the Standard?track. There was no discontent on that
decision.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up. Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary:

  Targeting Low power and Lossy Networks (LLNs), the RPL routing
  protocol [RFC6550] provides paths along a Directed Acyclic Graph
  (DAG) rooted at a single router in the network.  Establishment and
  maintenance of a DAG is performed by routers in the LLN using DODAG
  Information Object (DIO) messages.  When two arbitrary routers
  (neither of which is the DAG's root) need to communicate, the data
  packets are restricted to travel only along the links in the DAG.
  Such point-to-point (P2P) routing functionality may not be sufficient
  for several Home and Building Automation applications [RFC5826]
  [RFC5867] due to the following reasons:

  o  The need to pre-establish routes: each potential destination in
      the network must declare itself as such ahead of the time a source
      needs to reach it.

  o  The need to route only along the links in the DAG: A DAG is built
      to optimize the routing cost to reach the root.  Restricting P2P
      routes to use only the in-DAG links may result in significantly
      suboptimal routes and severe traffic congestion near the DAG root.

  This document describes an extension to core RPL that enables an IPv6
  router in the LLN to discover routes to one or more IPv6 routers in
  the LLN "on demand", such that the discovered routes meet the
  specified metrics constraints, without necessarily going along the
  links in an existing DAG.  This reactive P2P route discovery
  mechanism is henceforth referred to as P2P-RPL.  P2P-RPL does not
  guarantee discovery of a route.  Also, the discovered routes may not
  be optimal.  However, any discovered routes are guaranteed to satisfy
  the desired constraints in terms of the routing metrics and are thus
  considered "good enough" from the application's perspective.

  A mechanism to measure the end-to-end cost of an existing route is
  specified in [I-D.ietf-roll-p2p-measurement].  As discussed in
  Section 4, measuring the end-to-end cost of an existing route may
  help decide whether to initiate the discovery of a better route using
  P2P-RPL and the metric constraints to be used for this purpose.

Working Group Summary:

No discontent. Once again, few comments, request for clarifications that have
all
been addressed by in this revision.

Document Quality:

Yes there are several known implementations of these specification, with interop
testing.

An interoperability was carried out last month with INRIA's implementation
against Sigma Design's?
implementation. The report can be found:
http://hal.inria.fr/docs/00/66/16/29/PDF/RR-7864.pdf

Experiments with P2P-RPL have also taken place on the Senslab testbed gathering
boards based?
on MSP430 and 802.15.4 at 2.4GHz:
http://hal.archives-ouvertes.fr/docs/00/65/16/03/PDF/SOFTCOM-2011.pdf

Personnel:

The Document Shepherd is JP Vasseur (ROLL co-chair) and the responsible Area
Director is Adrian Farrel (AD Routing Area)

(3) Briefly describe the review of this document that was performed by the
Document Shepherd. If this version of the document is not ready for publication,
please explain why the document is being forwarded to the IESG.

The document is sound, has received a very good level of attention and reviews
including by the Shepherd prior to requesting publication, and is ready for
publication as experimental track.

(4) Does the document Shepherd have any concerns about the depth or breadth of
the reviews that have been performed?

No Concern.

The I-D has been discussed in great detail by a number of key members of the
Working group. Number of comments have been made on the mailing list
during two WG Last Calls and have all been addressed in this revision. Note that
several tickets have been opened and have been successfully closed.

(5) Do portions of the document need review from a particular or from broader
perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or
internationalization? If so, describe the review that took place.

No need for broader review.

(6) Describe any specific concerns or issues that the Document Shepherd has with
this document that the Responsible Area Director and/or the IESG should be aware
of? For example, perhaps he or she is uncomfortable with certain parts of the
document, or has concerns whether there really is a need for it. In any event,
if the WG has discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

No particular concern. Some questions were raised has to whether using a
pro-active protocol in a "reactive" way was scalable; thus the choice to advance
the document along the experimental track.

(7) Has each author confirmed that any and all appropriate IPR disclosures
required for full conformance with the provisions of BCP 78 and BCP 79 have
already been filed. If not, explain why?

Yes. I have checked with each co-author.

(8) Has an IPR disclosure been filed that references this document? If so,
summarize any WG discussion and conclusion regarding the IPR disclosures.

No.

(9) How solid is the WG consensus behind this document? Does it represent the
strong concurrence of a few individuals, with others being silent, or does the
WG as a whole understand and agree with it?

Good consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the
Responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

No threats. No discontent.

(11) Identify any ID nits the Document Shepherd has found in this document. (See
http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist).
Boilerplate checks are not enough; this check needs to be thorough.

Checks have been made. No Errors.

(12) Describe how the document meets any required formal review criteria, such
as the MIB Doctor, media type, and URI type reviews.

Not applicable.

(13) Have all references within this document been identified as either
normative or informative?

References split has been done.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative references
exist, what is the plan for their completion?

All normative references are RFCs.

(15) Are there downward normative references (see RFC 3967)? If so, list these
downward references to support the Area Director in the Last Call procedure.

No

(16) Will publication of this document change the status of any existing RFCs?
Are those RFCs listed on the title page header, listed in the abstract, and
discussed in the introduction? If the RFCs are not listed in the Abstract and
Introduction, explain why, and point to the part of the document where the
relationship of this document to the other RFCs is discussed. If this
information is not in the document, explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document. Confirm
that all protocol extensions that the document makes are associated with the
appropriate reservations in IANA registries. Confirm that any referenced IANA
registries have been clearly identified. Confirm that newly created IANA
registries include a detailed specification of the initial contents for the
registry, that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC 5226).

The IANA action is properly documented. The document has been updated after
discussion with AD.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful in
selecting the IANA Experts for these new registries.

The IANA section specifies several new registries - IANA expert reviews should
be similar to those required by the RPL protocol (RFC6650)

(19) Describe reviews and automated checks performed by the Document Shepherd to
validate sections of the document written in a formal language, such as XML
code, BNF rules, MIB definitions, etc.

No other automated checks performed.
2012-10-17
14 Amy Vezza Note added 'The Document Shepherd is JP Vasseur (jvasseur@cisco.com).'
2012-10-17
14 Amy Vezza Intended Status changed to Experimental
2012-10-17
14 Amy Vezza IESG process started in state Publication Requested
2012-10-17
14 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-14.txt
2012-06-04
13 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-13.txt
2012-05-08
12 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-12.txt
2012-05-06
11 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-11.txt
2012-05-04
10 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-10.txt
2012-03-06
09 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-09.txt
2012-03-02
08 Mukul Goyal New version available: draft-ietf-roll-p2p-rpl-08.txt
2012-01-28
07 (System) New version available: draft-ietf-roll-p2p-rpl-07.txt
2012-01-19
06 (System) New version available: draft-ietf-roll-p2p-rpl-06.txt
2011-11-14
05 (System) New version available: draft-ietf-roll-p2p-rpl-05.txt
2011-07-11
04 (System) New version available: draft-ietf-roll-p2p-rpl-04.txt
2011-05-13
03 (System) New version available: draft-ietf-roll-p2p-rpl-03.txt
2011-02-07
02 (System) New version available: draft-ietf-roll-p2p-rpl-02.txt
2010-10-25
01 (System) New version available: draft-ietf-roll-p2p-rpl-01.txt
2010-08-26
00 (System) New version available: draft-ietf-roll-p2p-rpl-00.txt