rfc9032.original.xml | rfc9032.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.13 --> | ||||
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | |||
<?rfc toc="yes"?> | ||||
<?rfc sortrefs="yes"?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" | |||
<?rfc symrefs="yes"?> | ipr="trust200902" | |||
<?rfc consensus="yes"?> | docName="draft-ietf-6tisch-enrollment-enhanced-beacon-14" | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | number="9032" | |||
-ietf-6tisch-enrollment-enhanced-beacon-14" category="std" obsoletes="" updates= | obsoletes="" | |||
"" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs | updates="" | |||
="true" version="3"> | submissionType="IETF" | |||
category="std" | ||||
consensus="true" | ||||
xml:lang="en" | ||||
tocInclude="true" | ||||
tocDepth="2" | ||||
sortRefs="true" | ||||
symRefs="true" | ||||
version="3"> | ||||
<!-- xml2rfc v2v3 conversion 2.39.0 --> | <!-- xml2rfc v2v3 conversion 2.39.0 --> | |||
<front> | <front> | |||
<title abbrev="IE for ICMPv6">IEEE 802.15.4 Information Element encapsulatio | <title abbrev="Enroll Beacon">Encapsulation of 6TiSCH Join and Enrollment In | |||
n of 6TiSCH Join and Enrollment Information</title> | formation Elements</title> | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-enrollment-enhanc | <seriesInfo name="RFC" value="9032"/> | |||
ed-beacon-14"/> | ||||
<author initials="D." surname="Dujovne" fullname="Diego Dujovne (editor)"> | <author initials="D" surname="Dujovne" fullname="Diego Dujovne" role="ed | |||
<organization>Universidad Diego Portales</organization> | itor"> | |||
<address> | <organization>Universidad Diego Portales</organization> | |||
<postal> | <address> | |||
<street>Escuela de Informatica y Telecomunicaciones, Av. Ejercito 441< | <postal> | |||
/street> | <street>Escuela de Informática y Telecomunicaciones</street> | |||
<city>Santiago, Region Metropolitana</city> | <street>Av. Ejército 441</street> | |||
<country>Chile</country> | <city>Santiago</city> | |||
</postal> | <region>Región Metropolitana</region> | |||
<phone>+56 (2) 676-8121</phone> | <country>Chile</country> | |||
<email>diego.dujovne@mail.udp.cl</email> | </postal> | |||
</address> | <phone>+56 (2) 676-8121</phone> | |||
</author> | <email>diego.dujovne@mail.udp.cl</email> | |||
</address> | ||||
</author> | ||||
<author initials="M." surname="Richardson" fullname="Michael Richardson"> | <author initials="M." surname="Richardson" fullname="Michael Richardson"> | |||
<organization>Sandelman Software Works</organization> | <organization>Sandelman Software Works</organization> | |||
<address> | <address> | |||
<email>mcr+ietf@sandelman.ca</email> | <email>mcr+ietf@sandelman.ca</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2020" month="February" day="21"/> | <date year="2021" month="May"/> | |||
<area>Internet</area> | <area>Internet</area> | |||
<workgroup>6tisch Working Group</workgroup> | <workgroup>6TiSCH</workgroup> | |||
<keyword>Internet-Draft</keyword> | ||||
<keyword>BRSKI</keyword> | ||||
<keyword>enroll</keyword> | ||||
<keyword>zero-touch</keyword> | ||||
<keyword>DODAG balancing</keyword> | ||||
<keyword>LLN balancing</keyword> | ||||
<abstract> | <abstract> | |||
<t>In TSCH mode of IEEE STD 802.15.4, opportunities for broadcasts are lim | <t>In the Time-Slotted Channel Hopping (TSCH) mode of IEEE Std 802.15.4, | |||
ited to | opportunities for broadcasts are limited to | |||
specific times and specific channels. Routers in a Time-Slotted Channel | specific times and specific channels. Routers in a | |||
Hopping (TSCH) network | TSCH network | |||
transmit Enhanced Beacon (EB) frames to announce the presence of the | transmit Enhanced Beacon (EB) frames to announce the presence of the | |||
network. This document provides a mechanism by which additional information cri tical | network. This document provides a mechanism by which additional information cri tical | |||
for new nodes (pledges) and long sleeping nodes may be carried within the | for new nodes (pledges) and long-sleeping nodes may be carried within the | |||
Enhanced Beacon in order to conserve use of broadcast opportunities.</t> | EB in order to conserve use of broadcast opportunities.</t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="problems" numbered="true" toc="default"> | <section anchor="problems" numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t><xref target="RFC7554" format="default"/> describes the use of the Time | <t><xref target="RFC7554" format="default"/> describes the use of the Time | |||
-Slotted Channel Hopping (TSCH) mode of <xref target="ieee802154" format="defaul | -Slotted Channel Hopping (TSCH) mode of <xref target="IEEE.802.15.4" format="def | |||
t"/>.</t> | ault"/>.</t> | |||
<t>In TSCH mode of IEEE STD 802.15.4, opportunities for broadcasts are lim | <t>In TSCH mode of IEEE Std 802.15.4, opportunities for broadcasts are lim | |||
ited to | ited to | |||
specific times and specific channels. | specific times and specific channels. | |||
Routers in a Time-Slotted Channel Hopping (TSCH) network | Routers in a TSCH network | |||
transmit Enhanced Beacon (EB) frames during broadcast slots in order to | transmit Enhanced Beacon (EB) frames during broadcast slots in order to | |||
announce the time and channel schedule.</t> | announce the time and channel schedule.</t> | |||
<t>This document defines a new IETF Information Element (IE) subtype to pl ace | <t>This document defines a new IETF Information Element (IE) subtype to pl ace | |||
into the Enhanced Beacon (EB) to provide join and enrollment information to pros pective | into the EB to provide join and enrollment information to prospective | |||
pledges in a more efficient way.</t> | pledges in a more efficient way.</t> | |||
<t>The following sub-sections explain the problem being solved, which | <t>The following subsections explain the problem being solved, which | |||
justify carrying the join and enrollement information in the EB.</t> | justifies carrying the join and enrollment information in the EB.</t> | |||
<section anchor="Terminology" numbered="true" toc="default"> | <section anchor="Terminology" numbered="true" toc="default"> | |||
<name>Use of BCP 14 Terminology</name> | <name>Terminology</name> | |||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL | ||||
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", | <t> | |||
"MAY", and "OPTIONAL" in this document are to be interpreted as | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target= | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | |||
"RFC8174" format="default"/> when, and only when, they | NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | |||
appear in all capitals, as shown here.</t> | RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
<t>Other terminology can be found in <xref target="I-D.ietf-6tisch-archi | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
tecture" format="default"/> in section | be interpreted as | |||
2.1.</t> | described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | |||
when, and only when, they appear in all capitals, as shown here. | ||||
</t> | ||||
<t>Other terminology can be found in <xref target="RFC9030" | ||||
sectionFormat="of" section="2.1"/>.</t> | ||||
</section> | </section> | |||
<section anchor="layer-2-synchronization" numbered="true" toc="default"> | <section anchor="layer-2-synchronization" numbered="true" toc="default"> | |||
<name>Layer-2 Synchronization</name> | <name>Layer 2 Synchronization</name> | |||
<t>As explained in section 6 of <xref target="RFC8180" format="default"/ | <t>As explained in <xref target="RFC8180" | |||
>, the Enhanced Beacon (EB) | sectionFormat="of" section="4.5.2"/>, the EB | |||
has a number of purposes: synchronization of the Absolute Slot Number (ASN) and | has a number of purposes: it carries synchronization information such as the | |||
Join Metric, carrying the timeslot template identifier, carrying the channel ho | Absolute Slot Number (ASN) and Join Metric and identifiers for | |||
pping sequence identifier, and indicating the TSCH SlotFrame.</t> | the timeslot template and the channel hopping sequence, and it | |||
<t>An EB announces the existence of a TSCH network, and of the nodes | indicates the TSCH slotframe.</t> | |||
<t>An EB announces the existence of a TSCH network and the nodes | ||||
already joined to that network. Receiving an EB allows a Joining Node | already joined to that network. Receiving an EB allows a Joining Node | |||
(pledge) to learn about the network and synchronize to it.</t> | (pledge) to learn about the network and to synchronize with it.</t> | |||
<t>The EB may also be used as a means for a node already part of the net work to | <t>The EB may also be used as a means for a node already part of the net work to | |||
re-synchronize <xref target="RFC7554" format="default"/>.</t> | resynchronize <xref target="RFC7554" format="default"/>.</t> | |||
<t>There are a limited number of timeslots designated as broadcast slots by each | <t>There are a limited number of timeslots designated as broadcast slots by each | |||
router in the network. | router in the network. | |||
Considering 10ms slots and a slot-frame length of 100, these slots are rare | Considering 10 ms slots and a slotframe length of 100, these slots are rare | |||
and could result in only 1 slot per second for broadcasts, which needs to be | and could result in only 1 slot per second for broadcasts, which needs to be | |||
used for the beacon. | used for the beacon. | |||
Additional broadcasts for Router Advertisements (RA), or Neighbor Discovery | Additional broadcasts for Router Advertisements (RA) or Neighbor Discovery | |||
(ND) could even more scarce.</t> | (ND) could be even more scarce.</t> | |||
</section> | </section> | |||
<section anchor="layer-3-synchronization-ipv6-router-solicitations-and-adv ertisements" numbered="true" toc="default"> | <section anchor="layer-3-synchronization-ipv6-router-solicitations-and-adv ertisements" numbered="true" toc="default"> | |||
<name>Layer-3 synchronization: IPv6 Router Solicitations and Advertiseme | <name>Layer 3 Synchronization: IPv6 Router Solicitations and Advertiseme | |||
nts</name> | nts</name> | |||
<t>At layer 3, <xref target="RFC4861" format="default"/> defines a mecha | <t>At Layer 3, <xref target="RFC4861" format="default"/> defines a mecha | |||
nism by which nodes learn about | nism by which nodes learn about | |||
routers by receiving multicast Router Advertisements (RA). | routers by receiving multicast RAs. | |||
If no RA is received within a set time, then a Router Solicitation (RS) may be | If no RA is received within a set time, then a Router Solicitation (RS) may be | |||
transmitted as a multicast, to which an RA will be received, usually unicast.</t > | transmitted as a multicast, to which an RA will be received, usually unicast.</t > | |||
<t>Although <xref target="RFC6775" format="default"/> reduces the amount of multicast necessary to do address | <t>Although <xref target="RFC6775" format="default"/> reduces the amount of multicast necessary for address | |||
resolution via Neighbor Solicitation (NS) messages, it still requires multicast | resolution via Neighbor Solicitation (NS) messages, it still requires multicast | |||
of either RAs or RSes. | of either RAs or RSes. | |||
This is an expensive operation for two reasons: there | This is an expensive operation for two reasons: there | |||
are few multicast timeslots for unsolicited RAs; and if a pledge node does not | are few multicast timeslots for unsolicited RAs; and if a pledge node does not | |||
receive an RA, and decides to transmit an RS, | receive an RA, and decides to transmit an RS, | |||
a broadcast aloha slot (see <xref target="RFC7554" format="default"/> section A. 5) is consumed with | a broadcast Aloha slot (see <xref target="RFC7554" sectionFormat="of" section="A .5"/>) is consumed with | |||
unencrypted traffic. | unencrypted traffic. | |||
<xref target="RFC6775" format="default"/> already allows for a unicast reply to such an RS.</t> | <xref target="RFC6775" format="default"/> already allows for a unicast reply to such an RS.</t> | |||
<t>This is a particularly acute issue for the join process for the follo wing | <t>This is a particularly acute issue for the join process for the follo wing | |||
reasons:</t> | reasons:</t> | |||
<ol spacing="normal" type="1"> | <ol spacing="normal" type="1"> | |||
<li>Use of a multicast slot by even a non-malicious unauthenticated no de for | <li>Use of a multicast slot by even a non-malicious unauthenticated no de for | |||
a Router Solicitation (RS) may overwhelm that time slot.</li> | a Router Solicitation (RS) may overwhelm that timeslot.</li> | |||
<li>It may require many seconds of on-time before a new pledge receive | <li>It may require many seconds of on-time before a new pledge receive | |||
s a Router | s a | |||
Advertisement (RA) that it can use.</li> | Router Advertisement (RA) that it can use.</li> | |||
<li>A new pledge may have to receive many Enhanced Beacons (EB) before | <li>A new pledge may have to receive many EBs before it can pick an | |||
it can pick an | appropriate network and/or closest Join Proxy to attach to. | |||
appropriate network and/or closest Join Assistant to attach to. | ||||
If it must remain in the receive state for an RA as well as find the | If it must remain in the receive state for an RA as well as find the | |||
Enhanced Beacon (EB), then the process may take dozens of seconds, even minutes for each | EB, then the process may take dozens of seconds, even minutes for each | |||
enrollment attempt that it needs to make.</li> | enrollment attempt that it needs to make.</li> | |||
</ol> | </ol> | |||
</section> | </section> | |||
<section anchor="layer-2-selection" numbered="true" toc="default"> | <section anchor="layer-2-selection" numbered="true" toc="default"> | |||
<name>Layer-2 Selection</name> | <name>Layer 2 Selection</name> | |||
<t>In a complex Low-power and Lossy Networks (LLN), multiple LLNs may be | <t>In a complex Low-power and Lossy Network (LLN), multiple LLNs may | |||
connected together by backbone routers ( technology such as <xref target="I-D.i | be connected together by Backbone Routers (technology such as | |||
etf-6lo-backbone-router" format="default"/>), resulting in an area that is servi | <xref target="RFC8929" format="default"/>), resulting in an area that is | |||
ced by multiple distinct Layer-2 instances. | serviced by multiple, distinct Layer 2 instances. | |||
These are called Personal Area Networks (PAN). | These are called Personal Area Networks (PANs). | |||
Each instance will have a separate Layer-2 security profile, and will be disting | Each instance will have a separate Layer 2 security profile and will be distingu | |||
uished by a different PANID. | ished by a different PANID. | |||
The PANID is part of the <xref target="ieee802154" format="default"/> layer-2 he | ||||
ader: it is a 16-bit value which is chosen to be unique, and it contributes cont | The PANID is part of the Layer 2 header as defined in <xref target="IEEE.802.15. | |||
ext to the layer-2 security mechanisms. | 4" format="default"/>: | |||
The PANID provides a context similar to the ESSID does in 802.11 networking, and | it is a 16-bit value that is chosen to be unique, and | |||
can be conceived of in a similar fashion as the 802.3 ethernet VLAN tag in that | it contributes context to the Layer 2 security mechanisms. | |||
it provides context for all layer-2 addresses.</t> | The PANID provides a context similar to the Extended Service Set ID (ESSID) | |||
<t>A device which is already enrolled in a network may find after a long | in 802.11 networking and can be considered similar to | |||
sleep that it needs to resynchronize to the Layer 2 network. | the 802.3 Ethernet VLAN tag in that it provides context for all Layer 2 addresse | |||
The enrollment keys that it has will be specific to a PANID, but it may have mor | s.</t> | |||
e than one set of keys. | <t>A device that is already enrolled in a network may find after | |||
Such a device may wish to connect to a PAN that is experiencing less congestion, | a long sleep that it needs to resynchronize with the Layer 2 network. | |||
or which has a shalower | The device's enrollment keys will be specific to a PANID, but the device may hav | |||
(<xref target="RFC6550" format="default"/>) Routing Protocol for LLNs (RPL) tree | e more than one set of keys. | |||
. | Such a device may wish to connect to a PAN that is experiencing less congestion | |||
It may even observe PANs for which it does not have keys, but which is believes | or that has a shallower | |||
it may have credentials that would allow it to join.</t> | Routing Protocol for LLNs (RPL) tree <xref target="RFC6550" format="default"/>. | |||
It may even observe PANs for which it does not have keys, but for which | ||||
it believes it may have credentials that would allow it to join.</t> | ||||
<t>In order to identify which PANs are part of the same backbone network , the network ID is introduced in this extension. | <t>In order to identify which PANs are part of the same backbone network , the network ID is introduced in this extension. | |||
PANs that are part of the same backbone will be configured to use the same netwo rk ID. | PANs that are part of the same backbone will be configured to use the same netwo rk ID. | |||
For <xref target="RFC6550" format="default"/> RPL networks, configuration of the network ID can be done with an configuration option, which is the subject of fu ture work.</t> | For RPL networks <xref target="RFC6550" format="default"/>, configuration of the network ID can be done with a configuration option, which is the subject of fut ure work.</t> | |||
<t>In order to provide some input to the choice of which PAN to use, the PAN priority field has been added. | <t>In order to provide some input to the choice of which PAN to use, the PAN priority field has been added. | |||
This lists the relative priority for the PAN among different PANs. | This lists the relative priority for the PAN among different PANs. | |||
Every Enhanced Beacon from a given PAN will likely have the same PAN priority. | Every EB from a given PAN will likely have the same PAN priority. | |||
Determination of the the PAN priority is the subject of future work; but it is e | Determination of the PAN priority is the subject of future work; | |||
xpected that it will be calculated by an algorithm in the 6LBR, possibly involvi | but it is expected that it will be calculated by an algorithm in the | |||
ng communication between 6LBRs over the backbone network.</t> | 6LoWPAN Border Router (6LBR), possibly involving communication between 6LBRs ove | |||
<t>The <xref target="RFC6550" format="default"/> parent selection proces | r the backbone network.</t> | |||
s can only operate within a single PAN, because it depends upon receiving RPL DI | <t>The parent selection process <xref target="RFC6550" format="default"/ | |||
O messages from all available parents. | > | |||
As part of the PAN selection process, the device may wish to know how deep in th | can only operate within a single PAN because it depends upon receiving RPL DIO m | |||
e LLN mesh it will be if it joins a particular PAN, and the rank priority field | essages from all available parents. | |||
provides an estimation of what the rank of each announcer is. | As part of the PAN selection process, the device may wish to know how deep | |||
Once the device synchronizes to a particular PAN's TSCH schedule then it may rec | in the LLN mesh it will be if it joins a particular PAN, and the rank | |||
eive DIOs that are richer in their diversity than this value. | priority field provides an estimation of each announcer's rank. | |||
How this value will be used in practice is the subject of future research, and t | Once the device synchronizes with a particular PAN's TSCH schedule, | |||
he interpretation of this | it may receive DIOs that are richer in their diversity than this value. | |||
The use of this value in practice is the subject of future research, and the int | ||||
erpretation of this | ||||
value of the structure is considered experimental.</t> | value of the structure is considered experimental.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="protocol-definition" numbered="true" toc="default"> | <section anchor="protocol-definition" numbered="true" toc="default"> | |||
<name>Protocol Definition</name> | <name>Protocol Definition</name> | |||
<t><xref target="RFC8137" format="default"/> creates a registry for new IE TF IE subtypes. | <t><xref target="RFC8137" format="default"/> creates a registry for new IE TF IE subtypes. | |||
This document allocates a new subtype.</t> | This document allocates a new subtype.</t> | |||
<t>The new IE subtype structure is as follows. As explained in | <t>The new IE subtype structure is as follows. As explained in | |||
<xref target="RFC8137" format="default"/> the length of the Sub-Type Content can be calculated from the | <xref target="RFC8137" format="default"/>, the length of the subtype content can be calculated from the | |||
container, so no length information is necessary.</t> | container, so no length information is necessary.</t> | |||
<figure anchor="iesubtype"> | <figure anchor="iesubtype"> | |||
<name>IE subtype structure</name> | <name>IE Subtype Structure</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
1 2 3 | 1 2 3 | |||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | |||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| TBD-XXX |R|P| res | proxy prio | rank priority | | | 2 |R|P| res | proxy prio | rank priority | | |||
+-+-+-+-+-+-+-+-+-+-------------+-------------+-----------------+ | +-+-+-+-+-+-+-+-+-+-------------+-------------+-----------------+ | |||
| pan priority | | | | PAN priority | | | |||
+---------------+ + | +---------------+ + | |||
| Join Proxy Interface-ID | | | Join Proxy Interface ID | | |||
+ (present if P=1) + | + (present if P=1) + | |||
| | | | | | |||
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | | | |||
+-+-+-+-+-+-+-+-+ + | +-+-+-+-+-+-+-+-+ + | |||
| network ID | | | network ID | | |||
+ variable length, up to 16 bytes + | + variable length, up to 16 bytes + | |||
~ ~ | ~ ~ | |||
+ + | + + | |||
| | | | | | |||
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | |||
| | | | | | |||
+-+-+-+-+-+-+-+-+ | +-+-+-+-+-+-+-+-+ | |||
]]></artwork> | ]]></artwork> | |||
</figure> | </figure> | |||
<dl newline="false" spacing="normal"> | <dl newline="false" spacing="normal"> | |||
<dt>res:</dt> | <dt>res:</dt> | |||
<dd> | <dd> | |||
reserved bits MUST be ignored upon receipt, and SHOULD be set to 0 when sendin g.</dd> | Reserved bits <bcp14>MUST</bcp14> be ignored upon receipt and <bcp14>SHOULD</b cp14> be set to 0 when sending.</dd> | |||
<dt>R:</dt> | <dt>R:</dt> | |||
<dd> | <dd> | |||
The Router Advertisement R-flag is set if the sending node will act as a Route | The RA R-flag is set if the sending node will act as a router for host-only no | |||
r for host-only nodes relying on stateless address auto-configuration (SLAAC) to | des relying on stateless address auto-configuration (SLAAC) to get their global | |||
get their global IPv6 address. | IPv6 address. | |||
Those hosts MUST send a unicast Router Solicitation message in order to receive | Those hosts <bcp14>MUST</bcp14> send a unicast RS message in order to receive an | |||
a RA with the Prefix Information Option.</dd> | RA with the Prefix Information Option.</dd> | |||
<dt/> | <dt/> | |||
<dd>In most cases, every node sending a beacon will set this flag, and i n a | <dd>In most cases, every node sending a beacon will set this flag, and i n a | |||
typical mesh, this will be every single node. When this bit is not set, it | typical mesh, this will be every single node. When this bit is not set, it | |||
might indicate that this node may be under provisioned, or may have no additiona l | might indicate that this node may be under provisioned or that it may have no ad ditional | |||
slots for additional nodes. This could make this node more interesting to an | slots for additional nodes. This could make this node more interesting to an | |||
attacker.</dd> | attacker.</dd> | |||
<dt>P:</dt> | <dt>P:</dt> | |||
<dd> | <dd> | |||
If the Proxy Address P-flag is set, then the Join Proxy Interface ID bit field | If the Proxy Address P-flag is set, then the Join Proxy Interface ID bit field | |||
is present. Otherwise, it is not provided.</dd> | is present. Otherwise, it is not provided.</dd> | |||
<dt/> | <dt/> | |||
<dd>This bit only indicates if another part of the structure is present, and | <dd>This bit only indicates if another part of the structure is present, and | |||
has little security or privacy impact.</dd> | it has little security or privacy impact.</dd> | |||
<dt>proxy priority (proxy prio):</dt> | <dt>proxy prio (proxy priority):</dt> | |||
<dd> | <dd> | |||
This field indicates the willingness of the sender to act as join proxy. | This field indicates the willingness of the sender to act as a Join Proxy. | |||
Lower value indicates greater willingness to act as a Join Proxy as described in | Lower value indicates greater willingness to act as a Join Proxy as described in | |||
<xref target="I-D.ietf-6tisch-minimal-security" format="default"/>. | <xref target="RFC9031" format="default"/>. | |||
Values range from 0x00 (most willing) to 0x7e (least willing). | Values range from 0x00 (most willing) to 0x7e (least willing). | |||
A priority of 0x7f indicates that the announcer should never be considered as a viable enrollment proxy. | A priority of 0x7f indicates that the announcer should never be considered as a viable Join Proxy. | |||
Only unenrolled pledges look at this value.</dd> | Only unenrolled pledges look at this value.</dd> | |||
<dt/> | <dt/> | |||
<dd>Lower values in this field indicate that the transmitter may have mo re | <dd>Lower values in this field indicate that the transmitter may have mo re | |||
capacity to handle unencrypted traffic. | capacity to handle unencrypted traffic. | |||
A higher value may indicate that the transmitter is low on neighbor cache entrie s, or other resources. | A higher value may indicate that the transmitter is low on neighbor cache entrie s or other resources. | |||
Ongoing work such as <xref target="I-D.ietf-roll-enrollment-priority" format="de fault"/> documents one way to set this field.</dd> | Ongoing work such as <xref target="I-D.ietf-roll-enrollment-priority" format="de fault"/> documents one way to set this field.</dd> | |||
<dt>rank priority:</dt> | <dt>rank priority:</dt> | |||
<dd> | <dd> | |||
The rank "priority" is set by the IPv6 LLN Router (6LR) which sent the beacon | The rank priority is set by the IPv6 LLN Router (6LR) that sent the beacon and | |||
and is an | is an | |||
indication of how willing this 6LR is to serve as an RPL <xref target="RFC6550" | indication of how willing this 6LR is to serve as a RPL parent <xref target="RFC | |||
format="default"/> parent within a | 6550" format="default"/> within a | |||
particular network ID. | particular network ID. | |||
Lower values indicate more willingness, and higher values indicate less willingn ess. | Lower values indicate more willingness, and higher values indicate less willingn ess. | |||
This value is calculated by each 6LR according to algorithms specific to the | This value is calculated by each 6LR according to algorithms specific to the | |||
routing metrics used by the RPL (<xref target="RFC6550" format="default"/>). | routing metrics used by the RPL <xref target="RFC6550" format="default"/>. | |||
The exact process is a subject of significant research work. | The exact process is a subject of significant research work. | |||
It will typically be calculated from the RPL rank, and it may include some modif ications | It will typically be calculated from the RPL rank, and it may include some modif ications | |||
based upon current number of children, or number of neighbor cache entries | based upon current number of children or the number of neighbor cache entries | |||
available. | available. | |||
Pledges MUST ignore this value. | Pledges <bcp14>MUST</bcp14> ignore this value. | |||
It helps enrolled devices only to compare connection points.</dd> | It helps enrolled devices only to compare connection points.</dd> | |||
<dt/> | <dt/> | |||
<dd>An attacker can use this value to determine which nodes are potentia lly | <dd>An attacker can use this value to determine which nodes are potentia lly | |||
more interesting. | more interesting. | |||
Nodes which are less willingness to be parents likely have more traffic, and an | Nodes that are less willing to be parents likely have more traffic, and an | |||
attacker could use this information to determine which nodes would be more | attacker could use this information to determine which nodes would be more | |||
interesting to attack or disrupt.</dd> | interesting to attack or disrupt.</dd> | |||
<dt>pan priority:</dt> | <dt>PAN priority:</dt> | |||
<dd> | <dd> | |||
The pan priority is a value set by the Destination-Oriented Directed | The PAN priority is a value set by the Destination-Oriented Directed | |||
Acyclic Graph (DODAG) root (see <xref target="RFC6550" format="default"/>, typic | Acyclic Graph (DODAG) root (see <xref target="RFC6550" format="default"/>, typic | |||
ally, the 6LBR) to indicate the relative | ally the 6LBR) to indicate the relative | |||
priority of this LLN compared to those with different PANIDs that the | priority of this LLN compared to those with different PANIDs that the | |||
operator might control. | operator might control. | |||
This value may be used as part of the enrollment priority, but typically is used | This value may be used as part of the enrollment priority, but typically it is u | |||
by devices | sed by devices | |||
which have already enrolled, and need to determine which PAN to pick when | that have already enrolled and need to determine which PAN to pick when | |||
resuming from a long sleep. | resuming from a long sleep. | |||
Unenrolled pledges MAY consider this value when selecting a PAN to join. | Unenrolled pledges <bcp14>MAY</bcp14> consider this value when selecting a PAN t | |||
Enrolled devices MAY consider this value when looking for an eligible parent | o join. | |||
Enrolled devices <bcp14>MAY</bcp14> consider this value when looking for an elig | ||||
ible parent | ||||
device. | device. | |||
Lower values indicate a higher willingness to accept new nodes.</dd> | Lower values indicate more willingness to accept new nodes.</dd> | |||
<dt/> | <dt/> | |||
<dd>An attacker can use this value, along with the observed PANID in the Beacon | <dd>An attacker can use this value, along with the observed PANID in the EB | |||
to determine which PANIDs have more network resources, and may have more | to determine which PANIDs have more network resources, and may have more | |||
interesting traffic.</dd> | interesting traffic.</dd> | |||
<dt>Join Proxy Interface ID:</dt> | <dt>Join Proxy Interface ID:</dt> | |||
<dd> | <dd> | |||
If the P bit is set, then 64 bits (8 bytes) of address are present. | If the P bit is set, then 64 bits (8 bytes) of address are present. | |||
This field provides the Interface ID (IID) of the Link-Local address of the Join Proxy. | This field provides the Interface ID (IID) of the link-local address of the Join Proxy. | |||
The associated prefix is well-known as fe80::/64. If this field is not | The associated prefix is well-known as fe80::/64. If this field is not | |||
present, then IID is derived from the layer-2 address of the sender as per | present, then IID is derived from the Layer 2 address of the sender per | |||
SLAAC (<xref target="RFC4662" format="default"/>).</dd> | SLAAC <xref target="RFC4862" format="default"/>.</dd> | |||
<dt/> | <dt/> | |||
<dd>This field communicates the Interface ID bits that should be used fo | <dd>This field communicates the IID bits that should be used for this no | |||
r this node's | de's | |||
layer-3 address, if it should not be derived from the layer-2 address. | Layer 3 address, if it should not be derived from the Layer 2 address. | |||
Communication with the Join Proxy occurs in the clear. | Communication with the Join Proxy occurs in the clear. | |||
This field avoids the need for an additional service-discovery process for the c | This field avoids the need for an additional service-discovery process for the c | |||
ase where the L3 | ase where the Layer 3 | |||
address is not derived from the L2 address. | address is not derived from the Layer 2 address. | |||
An attacker will see both L2 and L3 addresses, so this field provides no new inf | An attacker will see both Layer 2 and Layer 3 addresses, so this field provides | |||
ormation.</dd> | no new information.</dd> | |||
<dt>network ID:</dt> | <dt>network ID:</dt> | |||
<dd> | <dd> | |||
This is a variable length field, up to 16-bytes in size that uniquely identifi es | This is a variable length field, up to 16-bytes in size that uniquely identifi es | |||
this network, potentially among many networks that are operating in the same | this network, potentially among many networks that are operating in the same | |||
frequencies in overlapping physical space. The length of this field can be | frequencies in overlapping physical space. The length of this field can be | |||
calculated as being whatever is left in the Information Element.</dd> | calculated as being whatever is left in the IE.</dd> | |||
<dt/> | <dt/> | |||
<dd>In a 6tisch network, where RPL <xref target="RFC6550" format="defaul | <dd>In a 6TiSCH network, where RPL <xref target="RFC6550" format="defaul | |||
t"/> is used as the mesh routing protocol, the | t"/> is used as the mesh routing protocol, the | |||
network ID can be constructed from a truncated SHA256 hash of the prefix (/64) o | network ID can be constructed from a truncated SHA-256 hash of the prefix (/64) | |||
f the | of the | |||
network. This will be done by the RPL DODAG root and communicated by the RPL | network. This will be done by the RPL DODAG root and communicated by the RPL | |||
Configuration Option payloads, so it is not calculated more than once. | Configuration Option payloads, so it is not calculated more than once. | |||
This is just a suggestion for a default algorithm: it may be set in any | This is just a suggestion for a default algorithm: it may be set in any | |||
convenience way that results in a non-identifing value. | convenient way that results in a non-identifying value. | |||
In some LLNs where multiple PANIDs may lead to the same management device | In some LLNs where multiple PANIDs may lead to the same management device | |||
(the Join Registrar/Coordinator - JRC), then a common value that is the same acr oss all the PANs MUST be | (the Join Registrar/Coordinator (JRC)), then a common value that is the same acr oss all the PANs <bcp14>MUST</bcp14> be | |||
configured. | configured. | |||
Pledges that see the same networkID will not waste time | Pledges that see the same network ID will not waste time | |||
attempting to enroll multiple times with the same network that when the network | attempting to enroll multiple times with the same network when the network has m | |||
has multiple attachment points.</dd> | ultiple attachment points.</dd> | |||
<dt/> | <dt/> | |||
<dd>If the network ID is derived as suggested, then it will be an opaque , | <dd>If the network ID is derived as suggested, then it will be an opaque , | |||
seemingly random value, and will not directly reveal any information about the n etwork. | seemingly random value and will not directly reveal any information about the ne twork. | |||
An attacker can match this value across many transmissions to map the extent | An attacker can match this value across many transmissions to map the extent | |||
of a network beyond what the PANID might already provide.</dd> | of a network beyond what the PANID might already provide.</dd> | |||
</dl> | </dl> | |||
</section> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t>All of the contents of this Information Element are transmitted in the | <t>All of the contents of this IE are transmitted in the clear. | |||
clear. | The content of the EB is not encrypted. | |||
The content of the Enhanced Beacon is not encrypted. | ||||
This is a restriction in the cryptographic architecture of the 802.15.4 mechanis m. | This is a restriction in the cryptographic architecture of the 802.15.4 mechanis m. | |||
In order to decrypt or do integrity checking of layer-2 frames in TSCH, the | In order to decrypt or do integrity checking of Layer 2 frames in TSCH, the | |||
TSCH Absolute Slot Number (ASN) is needed. | TSCH ASN is needed. | |||
The Enhanced Beacon provides the ASN to new (and long-sleeping) nodes.</t> | The EB provides the ASN to new (and long-sleeping) nodes.</t> | |||
<t>The sensitivity of each field is described within the description of ea ch field.</t> | <t>The sensitivity of each field is described within the description of ea ch field.</t> | |||
<t>The Enhanced Beacon is authenticated at the layer-2 level using 802.15. | <t>The EB is authenticated at the Layer 2 level using 802.15.4 | |||
4 | mechanisms using the network-wide keying material. Nodes that are enrolled | |||
mechanisms using the network-wide keying material. Nodes which are enrolled | ||||
will have the network-wide keying material and can validate the beacon.</t> | will have the network-wide keying material and can validate the beacon.</t> | |||
<t>Pledges which have not yet enrolled are unable to authenticate the beac ons, | <t>Pledges that have not yet enrolled are unable to authenticate the beaco ns | |||
and will be forced to temporarily take the contents on faith. | and will be forced to temporarily take the contents on faith. | |||
After enrollment, a newly enrolled node will be able to return to the beacon and | After enrollment, a newly enrolled node will be able to return to the beacon and | |||
validate it.</t> | validate it.</t> | |||
<t>In addition to the enrollment and join information described in this | <t>In addition to the enrollment and join information described in this | |||
document, the Enhanced Beacon contains a description of the TSCH schedule to | document, the EB contains a description of the TSCH schedule to | |||
be used by the transmitter of this packet. | be used by the transmitter of this packet. | |||
The schedule can provide an attacker with a list of channels and frequencies | The schedule can provide an attacker with a list of channels and frequencies | |||
on which communication will occur. | on which communication will occur. | |||
Knowledge of this can help an attacker to more efficiently jam | Knowledge of this can help an attacker to more efficiently jam | |||
communications, although there is future work being considered to make some | communications, although there is future work being considered to make some | |||
of the schedule less visible. | of the schedule less visible. | |||
Encrypting the schedule does not prevent an attacker from jamming, but rather | Encrypting the schedule does not prevent an attacker from jamming, but rather | |||
increases the energy cost of doing that jamming.</t> | increases the energy cost of doing that jamming.</t> | |||
</section> | </section> | |||
<section anchor="privacy-considerations" numbered="true" toc="default"> | <section anchor="privacy-considerations" numbered="true" toc="default"> | |||
<name>Privacy Considerations</name> | <name>Privacy Considerations</name> | |||
<t>The use of a network ID may reveal information about the network. | <t>The use of a network ID may reveal information about the network. | |||
The use of a SHA256 hash of the DODAGID (see <xref target="RFC6550" format="defa | The use of a SHA-256 hash of the DODAGID (see <xref target="RFC6550" format="def | |||
ult"/>), rather than using the DODAGID itself | ault"/>), rather than using the DODAGID itself | |||
directly provides some privacy for the the addresses used within the network, | directly provides some privacy for the addresses used within the network, | |||
as the DODAGID is usually the IPv6 address of the root of the RPL mesh.</t> | as the DODAGID is usually the IPv6 address of the root of the RPL mesh.</t> | |||
<t>An interloper with a radio sniffer would be able to use the network ID to map | <t>An interloper with a radio sniffer would be able to use the network ID to map | |||
out the extent of the mesh network.</t> | out the extent of the mesh network.</t> | |||
</section> | </section> | |||
<section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>IANA is asked to assign a new number TBD-XXX from Registry | <t>IANA has assigned the following value in the | |||
"IEEE Std 802.15.4 IETF IE Subtype IDs" as defined by <xref target="RFC8137" for | "IEEE Std 802.15.4 IETF IE Subtype IDs" registry, as defined by <xref target="RF | |||
mat="default"/>.</t> | C8137" format="default"/>.</t> | |||
<t>This entry should be called 6tisch-Join-Info, and should refer to this | ||||
document.</t> | <table anchor="iana"> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
Value Subtype-ID Reference | <thead> | |||
---- ---------- ----------- | <tr> | |||
TBD-XXX 6tisch-Join-Inbfo [this document] | <th>Value</th> | |||
]]></artwork> | <th>Subtype ID</th> | |||
</section> | <th>Reference</th> | |||
<section anchor="acknowledgements" numbered="true" toc="default"> | </tr> | |||
<name>Acknowledgements</name> | </thead> | |||
<t>Thomas Watteyne provided extensive editorial comments on the document. | <tbody> | |||
Carles Gomez Montenegro generated a detailed review of the document at WGLC. | <tr> | |||
Tim Evens provided a number of useful editorial suggestions.</t> | <td>2</td> | |||
<td>6tisch-Join-Info</td> | ||||
<td>RFC 9032</td> | ||||
</tr> | ||||
</tbody> | ||||
</table> | ||||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<displayreference target="I-D.ietf-roll-enrollment-priority" to="NETWORK-ENROLLM | ||||
ENT"/> | ||||
<references> | <references> | |||
<name>References</name> | <name>References</name> | |||
<references> | <references> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | ||||
119"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119. | |||
<front> | xml"/> | |||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174. | |||
le> | xml"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC2119"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8137. | |||
<seriesInfo name="RFC" value="2119"/> | xml"/> | |||
<seriesInfo name="BCP" value="14"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6775. | |||
<author initials="S." surname="Bradner" fullname="S. Bradner"> | xml"/> | |||
<organization/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4861. | |||
</author> | xml"/> | |||
<date year="1997" month="March"/> | ||||
<abstract> | <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031"> | |||
<t>In many standards track documents several words are used to sig | <front> | |||
nify the requirements in the specification. These words are often capitalized. | <title>Constrained Join Protocol (CoJP) for 6TiSCH</title> | |||
This document defines these words as they should be interpreted in IETF document | <author initials="M" surname="Vučinić" fullname=" Mališa Vučinić" | |||
s. This document specifies an Internet Best Current Practices for the Internet | role="editor"> | |||
Community, and requests discussion and suggestions for improvements.</t> | <organization/> | |||
</abstract> | </author> | |||
</front> | <author initials="J" surname="Simon" fullname="Jonathan Simon"> | |||
</reference> | <organization/> | |||
<reference anchor="BCP14" target="https://www.rfc-editor.org/info/rfc817 | </author> | |||
4"> | <author initials="K" surname="Pister" fullname="Kris Pister"> | |||
<front> | <organization/> | |||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | </author> | |||
tle> | <author initials="M" surname="Richardson" fullname="Michael Richardson"> | |||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | <organization/> | |||
<seriesInfo name="RFC" value="8174"/> | </author> | |||
<seriesInfo name="BCP" value="14"/> | <date month="May" year="2021"/> | |||
<author initials="B." surname="Leiba" fullname="B. Leiba"> | </front> | |||
<organization/> | <seriesInfo name="RFC" value="9031"/> | |||
</author> | <seriesInfo name="DOI" value="10.17487/RFC9031"/> | |||
<date year="2017" month="May"/> | </reference> | |||
<abstract> | ||||
<t>RFC 2119 specifies common key words that may be used in protoco | <reference | |||
l specifications. This document aims to reduce the ambiguity by clarifying tha | anchor="IEEE.802.15.4" | |||
t only UPPERCASE usage of the key words have the defined special meanings.</t> | target="https://ieeexplore.ieee.org/document/7460875"> | |||
</abstract> | <front> | |||
</front> | <title>IEEE Standard for Low-Rate Wireless Networks</title> | |||
</reference> | <author> | |||
<reference anchor="RFC8137" target="https://www.rfc-editor.org/info/rfc8 | <organization>IEEE</organization> | |||
137"> | ||||
<front> | ||||
<title>IEEE 802.15.4 Information Element for the IETF</title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8137"/> | ||||
<seriesInfo name="RFC" value="8137"/> | ||||
<author initials="T." surname="Kivinen" fullname="T. Kivinen"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="P." surname="Kinney" fullname="P. Kinney"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2017" month="May"/> | ||||
<abstract> | ||||
<t>IEEE Std 802.15.4 defines Information Elements (IEs) that can b | ||||
e used to extend 802.15.4 in an interoperable manner. The IEEE 802.15 Assigned | ||||
Numbers Authority (ANA) manages the registry of the Information Elements. This | ||||
document formulates a request for ANA to allocate a number from that registry fo | ||||
r the IETF and describes how the IE is formatted to provide subtypes.</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC6775" target="https://www.rfc-editor.org/info/rfc6 | ||||
775"> | ||||
<front> | ||||
<title>Neighbor Discovery Optimization for IPv6 over Low-Power Wirel | ||||
ess Personal Area Networks (6LoWPANs)</title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6775"/> | ||||
<seriesInfo name="RFC" value="6775"/> | ||||
<author initials="Z." surname="Shelby" fullname="Z. Shelby" role="ed | ||||
itor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="S." surname="Chakrabarti" fullname="S. Chakrabarti | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="E." surname="Nordmark" fullname="E. Nordmark"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="C." surname="Bormann" fullname="C. Bormann"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2012" month="November"/> | ||||
<abstract> | ||||
<t>The IETF work in IPv6 over Low-power Wireless Personal Area Net | ||||
work (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar l | ||||
ink technologies have limited or no usage of multicast signaling due to energy c | ||||
onservation. In addition, the wireless network may not strictly follow the trad | ||||
itional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not des | ||||
igned for non- transitive wireless links, as its reliance on the traditional IPv | ||||
6 link concept and its heavy use of multicast make it inefficient and sometimes | ||||
impractical in a low-power and lossy network. This document describes simple op | ||||
timizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate | ||||
address detection for Low- power Wireless Personal Area Networks and similar ne | ||||
tworks. The document thus updates RFC 4944 to specify the use of the optimizati | ||||
ons defined here. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4 | ||||
861"> | ||||
<front> | ||||
<title>Neighbor Discovery for IP version 6 (IPv6)</title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4861"/> | ||||
<seriesInfo name="RFC" value="4861"/> | ||||
<author initials="T." surname="Narten" fullname="T. Narten"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="E." surname="Nordmark" fullname="E. Nordmark"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="W." surname="Simpson" fullname="W. Simpson"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="H." surname="Soliman" fullname="H. Soliman"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t>This document specifies the Neighbor Discovery protocol for IP | ||||
Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each | ||||
other's presence, to determine each other's link-layer addresses, to find router | ||||
s, and to maintain reachability information about the paths to active neighbors. | ||||
[STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-6tisch-minimal-security" target="http://www. | ||||
ietf.org/internet-drafts/draft-ietf-6tisch-minimal-security-15.txt"> | ||||
<front> | ||||
<title>Constrained Join Protocol (CoJP) for 6TiSCH</title> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-minimal-s | ||||
ecurity-15"/> | ||||
<author initials="M" surname="Vucinic" fullname="Malisa Vucinic"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J" surname="Simon" fullname="Jonathan Simon"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="K" surname="Pister" fullname="Kris Pister"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M" surname="Richardson" fullname="Michael Richards | ||||
on"> | ||||
<organization/> | ||||
</author> | ||||
<date month="December" day="10" year="2019"/> | ||||
<abstract> | ||||
<t>This document describes the minimal framework required for a ne | ||||
w device, called "pledge", to securely join a 6TiSCH (IPv6 over the TSCH mode of | ||||
IEEE 802.15.4e) network. The framework requires that the pledge and the JRC (j | ||||
oin registrar/coordinator, a central entity), share a symmetric key. How this k | ||||
ey is provisioned is out of scope of this document. Through a single CoAP (Cons | ||||
trained Application Protocol) request-response exchange secured by OSCORE (Objec | ||||
t Security for Constrained RESTful Environments), the pledge requests admission | ||||
into the network and the JRC configures it with link-layer keying material and o | ||||
ther parameters. The JRC may at any time update the parameters through another | ||||
request-response exchange secured by OSCORE. This specification defines the Con | ||||
strained Join Protocol and its CBOR (Concise Binary Object Representation) data | ||||
structures, and describes how to configure the rest of the 6TiSCH communication | ||||
stack for this join process to occur in a secure manner. Additional security me | ||||
chanisms may be added on top of this minimal framework.</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="ieee802154" target="http://standards.ieee.org/findstd | ||||
s/standard/802.15.4-2015.html"> | ||||
<front> | ||||
<title>IEEE Std. 802.15.4, Part. 15.4: Wireless Medium Access Contro | ||||
l (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal A | ||||
rea Networks</title> | ||||
<author initials="." surname="IEEE standard for Information Technolo | ||||
gy"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2015"/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | ||||
174"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<author initials="B." surname="Leiba" fullname="B. Leiba"> | ||||
<organization/> | ||||
</author> | </author> | |||
<date year="2017" month="May"/> | <date month="April" year="2016"/> | |||
<abstract> | </front> | |||
<t>RFC 2119 specifies common key words that may be used in protoco | <seriesInfo name="IEEE Standard" value="802.15.4-2015"/> | |||
l specifications. This document aims to reduce the ambiguity by clarifying tha | <seriesInfo name="DOI" value="10.1109/IEEESTD.2016.7460875"/> | |||
t only UPPERCASE usage of the key words have the defined special meanings.</t> | </reference> | |||
</abstract> | ||||
</front> | ||||
</reference> | ||||
</references> | </references> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="I-D.ietf-6tisch-architecture" target="http://www.ietf | ||||
.org/internet-drafts/draft-ietf-6tisch-architecture-28.txt"> | <reference anchor="RFC9030" target="https://www.rfc-editor.org/info/rfc9030"> | |||
<front> | <front> | |||
<title>An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4< | <title>An Architecture for IPv6 over the Time-Slotted Channel Hopping Mode of IE | |||
/title> | EE 802.15.4 (6TiSCH)</title> | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-architect | ||||
ure-28"/> | <author initials="P" surname="Thubert" fullname="Pascal Thubert" role="editor"> | |||
<author initials="P" surname="Thubert" fullname="Pascal Thubert"> | <organization/> | |||
<organization/> | </author> | |||
</author> | ||||
<date month="October" day="29" year="2019"/> | <date month="May" year="2021"/> | |||
<abstract> | ||||
<t>This document describes a network architecture that provides lo | </front> | |||
w- latency, low-jitter and high-reliability packet delivery. It combines a high | <seriesInfo name="RFC" value="9030"/> | |||
-speed powered backbone and subnetworks using IEEE 802.15.4 time-slotted channel | <seriesInfo name="DOI" value="10.17487/RFC9030"/> | |||
hopping (TSCH) to meet the requirements of LowPower wireless deterministic appl | </reference> | |||
ications.</t> | ||||
</abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8180. | |||
</front> | xml"/> | |||
</reference> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6550. | |||
<reference anchor="RFC8180" target="https://www.rfc-editor.org/info/rfc8 | xml"/> | |||
180"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7554. | |||
<front> | xml"/> | |||
<title>Minimal IPv6 over the TSCH Mode of IEEE 802.15.4e (6TiSCH) Co | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8929. | |||
nfiguration</title> | xml"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC8180"/> | ||||
<seriesInfo name="RFC" value="8180"/> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.ietf-ro | |||
<seriesInfo name="BCP" value="210"/> | ll-enrollment-priority.xml"/> | |||
<author initials="X." surname="Vilajosana" fullname="X. Vilajosana" | ||||
role="editor"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4862. | |||
<organization/> | xml"/> | |||
</author> | ||||
<author initials="K." surname="Pister" fullname="K. Pister"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="T." surname="Watteyne" fullname="T. Watteyne"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2017" month="May"/> | ||||
<abstract> | ||||
<t>This document describes a minimal mode of operation for an IPv6 | ||||
over the TSCH mode of IEEE 802.15.4e (6TiSCH) network. This minimal mode of op | ||||
eration specifies the baseline set of protocols that need to be supported and th | ||||
e recommended configurations and modes of operation sufficient to enable a 6TiSC | ||||
H functional network. 6TiSCH provides IPv6 connectivity over a Time-Slotted Cha | ||||
nnel Hopping (TSCH) mesh composed of IEEE Std 802.15.4 TSCH links. This minimal | ||||
mode uses a collection of protocols with the respective configurations, includi | ||||
ng the IPv6 Low-Power Wireless Personal Area Network (6LoWPAN) framework, enabli | ||||
ng interoperable IPv6 connectivity over IEEE Std 802.15.4 TSCH. This minimal co | ||||
nfiguration provides the necessary bandwidth for network and security bootstrapp | ||||
ing and defines the proper link between the IETF protocols that interface to IEE | ||||
E Std 802.15.4 TSCH. This minimal mode of operation should be implemented by al | ||||
l 6TiSCH-compliant devices.</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6 | ||||
550"> | ||||
<front> | ||||
<title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</ | ||||
title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6550"/> | ||||
<seriesInfo name="RFC" value="6550"/> | ||||
<author initials="T." surname="Winter" fullname="T. Winter" role="ed | ||||
itor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="P." surname="Thubert" fullname="P. Thubert" role=" | ||||
editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="A." surname="Brandt" fullname="A. Brandt"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Hui" fullname="J. Hui"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Kelsey" fullname="R. Kelsey"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="P." surname="Levis" fullname="P. Levis"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="K." surname="Pister" fullname="K. Pister"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Struik" fullname="R. Struik"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="JP." surname="Vasseur" fullname="JP. Vasseur"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Alexander" fullname="R. Alexander"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2012" month="March"/> | ||||
<abstract> | ||||
<t>Low-Power and Lossy Networks (LLNs) are a class of network in w | ||||
hich both the routers and their interconnect are constrained. LLN routers typic | ||||
ally operate with constraints on processing power, memory, and energy (battery p | ||||
ower). Their interconnects are characterized by high loss rates, low data rates | ||||
, and instability. LLNs are comprised of anything from a few dozen to thousands | ||||
of routers. Supported traffic flows include point-to-point (between devices in | ||||
side the LLN), point-to-multipoint (from a central control point to a subset of | ||||
devices inside the LLN), and multipoint-to-point (from devices inside the LLN to | ||||
wards a central control point). This document specifies the IPv6 Routing Protoc | ||||
ol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby mu | ||||
ltipoint-to-point traffic from devices inside the LLN towards a central control | ||||
point as well as point-to-multipoint traffic from the central control point to t | ||||
he devices inside the LLN are supported. Support for point-to-point traffic is | ||||
also available. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC7554" target="https://www.rfc-editor.org/info/rfc7 | ||||
554"> | ||||
<front> | ||||
<title>Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in t | ||||
he Internet of Things (IoT): Problem Statement</title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7554"/> | ||||
<seriesInfo name="RFC" value="7554"/> | ||||
<author initials="T." surname="Watteyne" fullname="T. Watteyne" role | ||||
="editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M." surname="Palattella" fullname="M. Palattella"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="L." surname="Grieco" fullname="L. Grieco"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2015" month="May"/> | ||||
<abstract> | ||||
<t>This document describes the environment, problem statement, and | ||||
goals for using the Time-Slotted Channel Hopping (TSCH) Medium Access Control ( | ||||
MAC) protocol of IEEE 802.14.4e in the context of Low-Power and Lossy Networks ( | ||||
LLNs). The set of goals enumerated in this document form an initial set only.</ | ||||
t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-6lo-backbone-router" target="http://www.ietf | ||||
.org/internet-drafts/draft-ietf-6lo-backbone-router-17.txt"> | ||||
<front> | ||||
<title>IPv6 Backbone Router</title> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-6lo-backbone-rou | ||||
ter-17"/> | ||||
<author initials="P" surname="Thubert" fullname="Pascal Thubert"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="C" surname="Perkins" fullname="Charles Perkins"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="E" surname="Levy-Abegnoli" fullname="Eric Levy-Abe | ||||
gnoli"> | ||||
<organization/> | ||||
</author> | ||||
<date month="February" day="20" year="2020"/> | ||||
<abstract> | ||||
<t>This document updates RFC 6775 and RFC 8505 in order to enable | ||||
proxy services for IPv6 Neighbor Discovery by Routing Registrars called Backbone | ||||
Routers. Backbone Routers are placed along the wireless edge of a Backbone, an | ||||
d federate multiple wireless links to form a single Multi-Link Subnet.</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="I-D.ietf-roll-enrollment-priority" target="http://www | ||||
.ietf.org/internet-drafts/draft-ietf-roll-enrollment-priority-00.txt"> | ||||
<front> | ||||
<title>Enabling secure network enrollment in RPL networks</title> | ||||
<seriesInfo name="Internet-Draft" value="draft-ietf-roll-enrollment- | ||||
priority-00"/> | ||||
<author initials="M" surname="Richardson" fullname="Michael Richards | ||||
on"> | ||||
<organization/> | ||||
</author> | ||||
<date month="September" day="16" year="2019"/> | ||||
<abstract> | ||||
<t>[I-D.6tisch-enrollment-enhanced-beacon] defines a method by whi | ||||
ch a potential [I-D.ietf-6tisch-minimal-security] can announce itself as a avail | ||||
able for new Pledges to Join a network. The announcement includes a priority fo | ||||
r join. This document provides a mechanism by which a RPL DODAG root can disabl | ||||
e join announcements, or adjust the base priority for join operation.</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC4662" target="https://www.rfc-editor.org/info/rfc4 | ||||
662"> | ||||
<front> | ||||
<title>A Session Initiation Protocol (SIP) Event Notification Extens | ||||
ion for Resource Lists</title> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4662"/> | ||||
<seriesInfo name="RFC" value="4662"/> | ||||
<author initials="A. B." surname="Roach" fullname="A. B. Roach"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="B." surname="Campbell" fullname="B. Campbell"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2006" month="August"/> | ||||
<abstract> | ||||
<t>This document presents an extension to the Session Initiation P | ||||
rotocol (SIP)-Specific Event Notification mechanism for subscribing to a homogen | ||||
eous list of resources. Instead of sending a SUBSCRIBE for each resource indivi | ||||
dually, the subscriber can subscribe to an entire list and then receive notifica | ||||
tions when the state of any of the resources in the list changes. [STANDARDS-TR | ||||
ACK]</t> | ||||
</abstract> | ||||
</front> | ||||
</reference> | ||||
</references> | </references> | |||
</references> | </references> | |||
</back> | ||||
<!-- ##markdown-source: | ||||
H4sIACg9UF4AA9VcbXMbyXH+Pr9iQn0wWEdAJEVRMl2uGCJ5JzoUyZA8n12p | ||||
VGqwOwDmuNhFdhakYJ38W/Jb8svydPfM7iwIST7nQypMOQIW89LTr0/39N5w | ||||
OFSNawp7oi/Oz8/12/3D0cHr0ZG+KKdVvTCNq0p9XtiFLRtty8ws/aqQp9VU | ||||
H9+7u9P3+o+VK7Upc31e1lVR8NhkvjKTSW0faQeNh/ri9MPN47HKq6w0C2yc | ||||
12baDJ1tpsPjxvlsPrTtOvg4N2Vm8+HEmqwqhwdHSvkGm/2HKaoSs5t6ZZVy | ||||
y/pE4w/ffHO4v//b/UNlamvo4UXZ2Lq0jXqa8Rgtu+ifqvrBlTP9Q12tlurh | ||||
SX6Mo4dnRJbKTMPPfZMrtXT8+YXOTKlX3mpT12atB26qTVHotfW7GgecGz/X | ||||
c1tb9ULroW6qTD74qm5qO/Xh23rBXzQNOKHJ+BiHnPA2uZ2aVdF4jIi/y6Q4 | ||||
HBzxtvSr8ECZVTOv6hPFJ9HD8K/WrsSIs5E+W/1cPZa2fS4COHN2VsXf9MDm | ||||
rqnq3XZQVYNvP5bu0dbe5SYP429AqimYDPnzoNyCW+c+W9nCgPpOCzKj1/re | ||||
FjarFqsSXzMohvV7evw40uc/2zrDnvro6KBdDQ/WJ/rOlI0zs2pP39oZad0H | ||||
29TVsiocdMB0g6tV2dQYfzp3RXe85ZxV5LvXx3pwuKuP3xwP3x4cdnvYhXEF | ||||
FJDOM8rl/H+gZ6NVvhxlxXY+fhjpW5fNTZ17KHeflR/oB1tsG8BsxHlyWyyg | ||||
PnfVtHmCirIa+k2SFln9HVnEH3ycMMqMUqoUdj5akvHt96eHBwe/pY/vTm8O | ||||
jk7oyduDN0fy29uDV2/CsOM3b16Hj0dvjw/o48XwbJTa3MKVbmGKobfZqibe | ||||
Y4yz1sIjHLw+EpVqTD0jCe/Mm2Z58vIlGyIdc0QjRzjhy6krc9iKb397GV3K | ||||
8HAf/8ybRbEji4nb2WG/c9fko9b57OkbUzcjTZ9P9E+uht54D9HnbrXQ4yyj | ||||
b6cVJF4VevBhfLrL3udmvvbQrEJfmrWt9eDm/V929d3SZm6Kx+SJPPufy+pp | ||||
eGsa2618A82uSswcw2XoK9s8kUyEzL5JsQIIyfGA4tMSd3lvs3lZFdVsLSvk | ||||
2OtE0+nhp+I4keCmEEydzV1js2ZVRwm/PXi7H6X4+nX8+OY1yUQNh0NtJjA8 | ||||
kzVKXWBv8seLCqYH9yycvT9LGFstlzBbWGDjrHBjUlcmz4yHlyFtLNwCBOTw | ||||
OMoH1kFSCwwmFrePoN1laQs/AjXVCh7Ta4oB+h5Dh3dF1dAapzJIvceu5GgH | ||||
RN2uLoW/ClSXHrshbIiP1+/Yx+vB+btdPa0N7QqvgEVg3pnVzdzqZW3h8TI+ | ||||
H76rsBjouJ87rxFUVhx/lnX16HIiWy8sUev8Qk/W+mkOy9Qmh49zLHKXSC6D | ||||
4pMGKWJMaZ90WdESg2Vh8xk5d+IBws5M+8JaPpOMWCAKTCzCQl07nOPJNXOw | ||||
g+jbPBseV3UO9cTB2HvXj5ZDCc7TiqIvppHIeeHyHL4NweOCND9fZUxz+Pv0 | ||||
AieeIFD7z0p9+hRU5PNneGGPY02IlfN2J/q4TVR6Q1RRkz596lzB58+j/xtV | ||||
U9/UtE3yf5Wm5XB7mNoJwWNxnwpM9TSRSGVKA4EaBmzzVWHBnr4uIoy7klWR | ||||
dOri/P77rfBqcHG+q/1q0qyXltRjWZjMwmPgI+23lXYaJpquf44orENPPeWW | ||||
ocRW8j4q6LQwc1FBHnYKdjua9mTWfAgLsRVF9UR8AWEUG8SN2o8gTjRcB72D | ||||
/vOwqni0+Z7YmfoZaMxN12wYa/qZJmwQap9RGhY+fwciXrzQP4rOIsTpgyN4 | ||||
1xqhit2r1p32J48/C+kPFtYO0Xm98+HHu/udPflXX13z59vzf/3x4vb8jD7f | ||||
vR9fXrYfVBhx9/76x8uz7lM38/T6w4fzqzOZjKe690jtfBj/Bb/QEXeub+4v | ||||
rq/GlztyqlQtyAYgFPgNR5gTno1U2XgVTTanOTj2f/8Xzv3p0z+FeA+jli8U | ||||
6vHlaW5L2a0qi3X4CgaulVkuralZxICnAO9ATQVAl/Haz6unkkEqmKyuMRwa | ||||
nrCWEO6E5L8qmYxPn74Wq0AFxgT1UPAAIjkOxMNDfbcus3ldle6vkhCocatC | ||||
csgwUx+Lswlh7/PnvS9qvgLIJoNaLSagHLOWq3pZeYvw7Pu7RX83nkA34UA0 | ||||
OQ19JRMH47srceucxBC6dNleX1/FKdGkxi5ANJaAvQGXTp2tN8ZGXzAPjsjb | ||||
/1xxuEpnGGZpzqAkzGNnSoR9T84I3BvDL7xrQ584b/vR+SYGPyNzgosL8peT | ||||
ckxSpgCYyddsbuxl8ZtpdBcwb21m3SNRYGQzMnViKrGCHl9hHRWCH7uaAtoE | ||||
XZrAD8tGspb465brrNWuCR4EC1N0hN6xqiMAkY5zWDYBkBmmWEeClwB/7VHC | ||||
DnC+tR2meyQxTnaqLVuUaeNKpxtRgJ6ioZuVRgztma8HPoCGzVXNgSb6ocgx | ||||
BciJBMhymDjYX/gwi05v+POQQwnYVM6aOW18sL/PKgwPFsaCwhr/T3HgqFZF | ||||
rgFokONxnCHzPeCReon9YRVVmW+EzuBaQZXNvfgPxUylYUSuJMojNe4wThJ4 | ||||
aZTEUT3OkdHBltkBA+Xcjnf3KH29sm42n+DDGey8wpi1Glyd7QZy7aMtJV54 | ||||
aH5mU0t/tWl7yPmR6scN75C2Ia0LUJw40CcBWt/ogsH7qz0RMGUrDGJiBN0C | ||||
5gSCJboZ5MfyrFslX4DLjoX95fOP1MUU6+nbsYanlrkdnoOQbcPKxEKlB1tO | ||||
hoXudgMibJFH02p9pGKPZBfQaEkbPjn4aFhI3HUPtrKCTa41J8yeDGpcIBlZ | ||||
zebCHMrqwJwaqCO6CLOgTJhUrztuaSlhMvWadswrAr/QOQ+DYodIJD8604m9 | ||||
f5grOgzNn1G6DgyFiA5Cazg2pE++20dhU+s4kNzCv5Oe3RF4ZSzkSN7k8y1M | ||||
CIi3gn7LBqy2TxUWNMjB4L4brpyQoUyBlrpjdEZMU1alFzLBWGz3O3Gq5BbF | ||||
X4lLyStQWFbQCGGqsFqcZQ58mUuG0eJD+vluT5nEM5iimot164G35Hf+uQPX | ||||
MW6NR6936YyE6BHcRWPUqoSzrtdLBrm1IXg1UqnkoscLnld8YZA2GLIsWGR+ | ||||
FXTkLiJL4ia7SZetClNjmMkosjnvV7Z1BIyzgM44XY4PW0CnIsOVOhhFjJXo | ||||
pxyZPOIja3pZlcOFIZZXKw8iKS+mkJaxM2VuYw9KeL9hFeRRgFGKhcQjhtG0 | ||||
Fw53ONIXDQ8K6oXP5Tr4QU8EggieMLHTip09Ieog8SBj3xJAxPSMnG1ctoWw | ||||
QxEP+74a6XG6ElEwN48cyKLmMCUbSMQLCA/EhCWXLqOIyJxYgv3L2hFkSGLl | ||||
S8giKwisNAI7xt47Kic0nO42DWIQPo1oCfgjrLtYsUIsCHOHqBTpwrxGZC5u | ||||
BF7mycJA8S/VYjgJxTrbMFTwYgHEs5rQyRvzQJbzV5gqsTxwfy94fleCtaJP | ||||
HCupZtUlHCAeGKlpedxGqQUW3QCFVA0UOHhBCpZVAFf2I5dnltWTrdlKLyvv | ||||
121JRg8uL69AN2spRmt87bLvCtArk4xyZtkRQX0nJnuYVCUYFoLCADAuFmiC | ||||
bXmy6g7fFtUwzhrKrM+fsakEagolnL9QLDfhoIACSOQd8RdbttTlkKors6Y9 | ||||
sytJzJm4ResFsWQwf0zcXoTSg5vxFeLSOelEnC6xgjWUYhI8AelA3CRW8Eio | ||||
U1dYcXcxvAhNs5Xzc6HW4NF0Cp8L8WGvizOmTT7SyVI41q8DSKzGjnN4MVuf | ||||
kMDZNR0cDyf4/GgKuCOJceQc51D5MqQ88HJAxgELNyQ7IO8JqxZ9th8bHfLe | ||||
YvNYLQTwKaVJwScu4AEE4R7jQud3dxjHIQEC5ELFQTRLcERoCXkPlgixHyeX | ||||
0B8Wmxo/J39mJODSMq80axuW0n+6HF/BgGZipWIDLWWRLjZWSCOeLARkrvSM | ||||
EZdIkTq2xSARsuVcyInuhHSf7dxMyeWapDz13AixSx+l0wmkWnrYwVziaWLS | ||||
yKN9uxRlXVGTuqINnJZIYU9DhOywogdlpIjZhG4t4ycwlJYcqTu2vXhemvEE | ||||
pQyFMbLkduHWyghA1A5RlayQS7cYCmBCboSxq3BNckM/R+yGH1EDibmvXyOj | ||||
3OXYQNNv6qqpsqqQmjD5kcHtzSXCQ23hqUIcYp9XTaRMB0rE8QXZNC2+kLPS | ||||
sYQDrfAmtnCWYlLKkwyIjUInciI52RMja0YBNBDHptgtZba2WhgyyIh6mRhy | ||||
H6l9eko/Wo/X5oZpJiVG7UIJUdSJ6xLQTAJnlDrw2kzZ1zeImgAhTN1sVUua | ||||
STXGdmy37Uh9D9YlotBgd/wdfIuL9JL2hOpgmbls3DAk2pizFD1ouc9UrCY/ | ||||
ky5hwemKahVatLzH21hD89WCqjHLVet94LScJNwt28MZha30HRG+Ys+E9B5y | ||||
JO2bWAJNeW7zAIALR9mXBO6C6//JtIDNaC0AeOhmzyPDVM4pC3sWw6d1tYCe | ||||
zxwpKU1meRTuwRYRv0QxpGSO1JmVUk+P1c9O81UG/i5aerBKibvBS7R6YQoC | ||||
qE0INFSGmtHa80VEMceX72739BJB3k1AtCsfq4KzNaABuShkEidQA+IoDfeM | ||||
ICXV3dD0UHJIdQzKS2z0EWy0SCczIeGWVMQmSR72L5gXMGabGdJnsnWL5AV+ | ||||
dLXEKl1aSUp8dnHd5khBKoTAHg0ixqSwgQjIcdwPp8TuZ5SJXm3xig8l3MMc | ||||
/8vJuQcGwnHR1vOU7Y4xI7mQfp4gRzICCjVynodN1e2CKJI1eNVFqyFPjNXj | ||||
NEr1DGclUp+qoQYjdR1L44H4JNjIRc4GLb/xUsOKhXOBoy5mAIJvwdvEF9Ww | ||||
wbYy42oYCt9K4wAcY9iRMewYqffgVPe9ZQ7XSjgxMmA7Vea+pOZ000RFzo5l | ||||
bZ02MRznlWwQPWRTr7gmGvNBqhhhSwldFFFNQUC4iz9nVNxwgoRD7fPVG6gu | ||||
woRpGNDUdgb3UYun6O4QzuNtQcyyu9IyQkkWJtP4MC7Yh6zQXjX0KKa0gVNE | ||||
utrbKNP2qGNo1ha66NvdajK8pwXpapaoiFiq8wJsG5SREBSiZes9+FyquISl | ||||
etcAvitdgHL9pb+DLc8Otzx7JUvsY8KhfqWP9Gt9rN/ot/q3v+YZL/Ld8H/5 | ||||
f7zKL/jf/buz4Z///Gem7JfbX25+IbWjX2CKH9dsnzxuw1xl/BdpSf++9o2f | ||||
BFqWlLu26//yRXZv/4u0bKz9K1fp+PL8jzPlG+YK9+hMTWaHwAVfpOVLmwzk | ||||
DrkhP3nz+4Pdf4CWv/9vOy3/uL701v7HaNlc+1eu8m2+JKDtW7Rs+eXR1I6j | ||||
priEPQRcCh4Hx8AQ5NGe0/K3X3mCzb+/fV1f/s6//wf6sl3+6tOJfuFse/NM | ||||
fTm/39kWIHY+K0Vl4xN1wtGxpgQZmb7XfLNK0GNWVhTtOpC0bCR+hjvUiSSB | ||||
EOg+31TiW5kDR8HB39KyFJ+21ef17XBaUF7teb4LwVYmS/mRIzyCuhTawyIU | ||||
MeeVb4aM9eSqAAicL+xAIlfPOJEMSTj1+1TDfl4xuLscU5MRiJ7ZJiCPWVFN | ||||
TCH3G2EuReEKYJH2CywhApOa7rbCaACOvc6QtlwtFwMIjAwXayCFj73egWtO | ||||
ecC8EzxGsu0p6nor1bpaDtxyyYS7IeEUi4FQA/E1XkpqoyBy7qIiVLknIyJ2 | ||||
kjUDPqalgRF+khIi5bqSDVA6jLXprkAt3GzexLtOGwq+cx6U21i3W5V0aoae | ||||
lH7SzQeE1mbLZZW066juBiDp4WGxxhYguaaiemO6FRdoKWxYL5eu1FekuNb6 | ||||
YGsw8Ia07yLgco4y46ARN6nmJTXTbQGJfB7xgeG0ouqZxBoQx3fswPJ2T3eM | ||||
CoA7ZwneRy6yrkaueb7WwGACvr1cPMVtYR+WI9+NF66BHXdVs4pY7B5NhpUX | ||||
S5gJtuwwBg8ZdN93TyI9khh0xNDOpA9gYkncqTpLFN0NFhhvHz4Cu11yOVdg | ||||
crfSjPFt3Vutm29S/hqv06YI9bwbYbN9kW6F/0QbekJOMC+Gnvsf9/f1gM0k | ||||
7MpWvf/xjdWDwprkOZK1jjM4JMZMe2wI+VCXAvk5a15JVhKqIhH883keJawl | ||||
pbXAnuuSL/naAl9szSmq6kFHiwlZDcSScNO31Zu+mDryugvIul+UU5mBFnDm | ||||
VOFpmRdWb72wGus5rLiVHy3y9W2o2oHcC36mjFeKGZJFOnlTO/JNeCLqTFeQ | ||||
q5rr4dflrCLDZOSwrSxPzEk7w6Nw6Ho45D2ei4xPRq7NWv9GrAHnegg6xhp+ | ||||
uBOf7sT4Mlnzsdi7U4odHPfg+PJ2N1SCGEJ2F+7iQClzVrG3Q1JEytiDUgk9 | ||||
WIOTzkpLWdFwuk11BLlb7FcuYllCJblzWlTb0IYgGPZ3iWGJf08FmQzm+JcM | ||||
DtlksFe/UcbhxJ/OYLIMASs601jZ8b26MOV6dSi4Lri5xksGHhhMpx6kx94N | ||||
9eeP5AZirYYvFZIEnXo4uKm3bNosPZT1LkIZJESxYv2FDJR3JuG3VxCi2Fmx | ||||
inXARZV3ncNqYnzENfAwLJquwSSbuwLBQmrQ3ePt+q/awtBI3QRTZ7Ag4Kln | ||||
7jjO3BZL31X/pbbiJUZwrXyx5FskqZlzIQmGRNUmqPi41DHGtS8tJEURaggI | ||||
tUDb66bgum/VSJW6WKvN+DlSVzwuNDDUz5Uo3POE0levKil3AuJfhP1JKA7x | ||||
uyV0o4VxO7lSQJ8Ez7YZ53llkkzufL1acuRLkt3oCnoJMKucMCnxB2e8KhMz | ||||
vKaLCFKpM1dz+VONs3UGYKd/qM1yrgdn12fjH3Z1XfVbB0TP9zoN3WsroRyM | ||||
EufaFYtVGoqYL+SVguxDcxdBT8aKG/d5XbBSUuskdMXALJMe+p69R1AW+rRS | ||||
wNGLXEKOXHd0xuY68w6KquKVzKN9dpUlwqfrqW2iDaV2vk+nVIEyj9WChBoK | ||||
391V10j9+Dx8fhj/pY3BvUqgpB1cdmVUHDaSO5fzTUP76jIUopkiuX+3hZu5 | ||||
ruKrZI0vOWkTHfIzBJTZZdM1oP8dlrxHfSoUPWOuEO6s8niPK5BVLg7UdmaT | ||||
pnT2GWNMG6JFWH0M0bO0CBjUF4BxCrBjstAh6uMjySQHbyXP3+V+lJiU1bZF | ||||
0iqBpW29moN1CsIHFxdnu1FxL135MLysKKuJK4ZfOlIl7hjvq8xxpFhKtuWk | ||||
n2JI1Xe+9Z3at/snJy+Pj0ZajtOhL+k1aqE4n+tCLtyobfAxjT8bl78bOJos | ||||
z9aKE88YII+Ojw85QPaheXdTso0PzFO2/wBPo23LpVPIj37jVRE6+AI9e+EW | ||||
IYJa6gWy3zwF9Uim9zatOiYqUWWInz5qZEZ9ez2ZmsfK5T7c/gVCTZmme6HX | ||||
YpjH/sRnXU6UA5OB1uJFL1+pyOaQdz07yGVyhtTUQqoMlAfEyqOoKeVVd2fP | ||||
Bexmi0oibyULTuIXJNchtzbBCpGmV/SStbrS11BKX9QpzTf3JE/poCCfG1uL | ||||
vRKBxmvfJICHe0VuYopXrt2tSujGK2dRKnRnqKa1NC872Zk4XRhpa17GV608 | ||||
cgjLmXf/NqDTTr4DUAkC49tRRvrYnnMlShjstImbb3k3IhY4THx3sz2jCFnA | ||||
c4edYxgKTRp8QRZh6DLcu7B9qucXzOTrObOO6mHordJS+tzu3o8PXx/LG57B | ||||
YoOfGMAjRIez+VZS23tD6UmCfBkhCECQfuDWklOATH3HSTVKSj6IMOuiMrno | ||||
X1dQSBidtl5QEIraRi9lMJ6ehc6J0HgY3jbtoPxJhMWhaMdtT2u6u3m0peNG | ||||
dM61SI2kOSq8TkK9glErwfGIZUvB1dxrIXJrO6VC+KHN4BDyePvOd9dQWjOz | ||||
4U0aMnw1aF3KrdyMmfrlacXJCKObof7j7elu26RLfKUmV4G8oZWkXd5kdUUh | ||||
hpKGeWjyCOVM1TU2dFBdnKl93uMAFWJBkxiejG/kFSEVWuICGBWU0h1cXnhq | ||||
/WSvZ0J6Q2K5KT6l4k47XZoFBZJ1qP/iWfNEEoHo5Q8RPQGweOUaVZS0ZWmo | ||||
NUvhjIS24DyQJ+UwhIg0YjcZO1IGvzQGpkzxtVz3IPuzlwX67pVsDiOp37FD | ||||
VkEi7KxCYcF77hnnRsKlgFFqV+Gm464ZamLX1DDf3lUL9hGs275dIP6Z3np5 | ||||
oe9idSy29odkT41xvGDfmdxm+taxbXt3y9RpDSR/Ft3aZeKqz94LFPNt6y9J | ||||
3zTZFmXO6btRPKqaUaKBhCN9FSdu0L7J37bLjXotL7nlNTgtqji1mzEnkKhm | ||||
DGmxTozu4Q05Jy/9iePkm/uvvFPDgciGBpjn5+0hN0wgkihcDuIrlsP4iuVu | ||||
C4LvBR954IDHkApxMaJFX12NsHsDMzxcxnJMNyO+oPJcEv3e5qBMkRkFFL1A | ||||
eCEeRSarricx/JJo/PCJWoseLN85LKjkiZCM0LCZQccERnXdnd9apW1ZhOG4 | ||||
PCaN8Q2Q1mUlKRgp2do2XT2Bdl6VjD0o9UhOnqzl91TaQwr9z0LWCddWwf26 | ||||
IvQN9y0GocVAErB57k7sEsg9aUwokrbG7g6H3FCgp7bQ6TKGg67SptoD84tG | ||||
Fx0+jGPTpmSQzuXo1DH1XrLjNo5YRdz+0lnoWPAcKHsaRaM3+lgqFWF2CONp | ||||
fTT6kSW5wEbMo53KHeShG830cCh1vHEbmRSc5KVYPlsC1BSBbpZ2tgHEyaER | ||||
8h6pf0EmI33ukRLalMpMvR3J1/ZeC4WwfjYL1VuYssL4TkrDIZ2QX9cmFqBe | ||||
UgoPveAMBVRMeuLpuYhE10BcHDsXZxjNqR3Vdl0uKeiwgDuyGbKBzgW39FJ1 | ||||
Ak4dlCFXpYYaH9+lK21NrzlWws+8kl1g62GuBIibcGWyGR9IZqv4zkQSZ6Vz | ||||
iSPhN6Jgb4UtsJKxISWyUjnqCqR74UAC7TpvEycg4bPFVLWBufW0DL7iHVDM | ||||
lPgKI+YyorKJ74wwWwUg3e7h25eT2jL5RiLLqDZ8JqxLGFzea+SiQUE5R9Tq | ||||
2uSu0r7kulVXzItOIDaUJnwWIKAiVwUMxO0Y7nctgS/0xfhq/EyE/JA7nh5E | ||||
LZH7u1kZOqZCETe257BWBbC5Vu1/syL57+WEjqy7cGcONLsj11ZT7p6CH0i6 | ||||
p+KLPFQRXieZeXgVINxpEcIdEtoQzBWGId2woac9cVr9Bim++cK/gZpem8yt | ||||
5eJgZtMJ1KwT/5W//m/hL50SWdMndjKt8Nu/9d50/nc2pXH2EB1PeNvvfl4t | ||||
wKKfCCGvS9tehsZWZIQr+W/RUKQjtxODCof19uCnpobf0D9Avf+qP3DsAZah | ||||
u/qSOztzdtlw3sRaGKeDeIOmdA1zjf7ph8tTmKVb6PNHevWlpSZ9yxiqOF0V | ||||
CVldFhX/Ow3UlKrU/wD5JxZBWUkAAA== | ||||
<section anchor="acknowledgements" numbered="false" toc="default"> | ||||
<name>Acknowledgments</name> | ||||
<t><contact fullname="Thomas Watteyne"/> provided extensive editorial comm | ||||
ents on the document. | ||||
<contact fullname="Carles Gomez Montenegro"/> generated a detailed review of the | ||||
document at Working Group Last Call. | ||||
<contact fullname="Tim Evens"/> provided a number of useful editorial suggestion | ||||
s.</t> | ||||
</section> | ||||
</back> | ||||
</rfc> | </rfc> | |||
End of changes. 75 change blocks. | ||||
782 lines changed or deleted | 339 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |