Re: [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Fri, 31 January 2020 16:55 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D5C712096F; Fri, 31 Jan 2020 08:55:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Nic6qlzV; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=lbfx/cRN
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Em4BcHPrOtOK; Fri, 31 Jan 2020 08:55:52 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B778212090A; Fri, 31 Jan 2020 08:55:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22136; q=dns/txt; s=iport; t=1580489751; x=1581699351; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=TpgUdxsuia7A824nhbf3EwMRBxubEJxhxMzzjMOdOAM=; b=Nic6qlzVAFU/XAzGiTe/ezexGcCdIINDL03e4kLeCz8vjuYvgURXi3MD wtIhBb+ZOxBJowVI4Xpnr/MkgwXDS8sh7kz6EiE4tbuA7UvDByQMMW+6O BT62hgboz0atTWsKcbRNGw1yCFr+u5hkazxsGFYKsTwxPjohouOQ3XKhb Q=;
IronPort-PHdr: 9a23:73L7dxwc6swpToDXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YhWN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1kAgMQSkRYnBZudFU3mJvPwcwQxHd9JUxlu+HToeUU=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CgBQB7WzRe/4wNJK1lHAEBAQEBBwEBEQEEBAEBgXuBVCQsBWxYIAQLKoQUg0YDinaCX5gPglIDVAkBAQEMAQEYCwoCAQGEQAIXghokOBMCAw0BAQQBAQECAQUEbYU3DIVmAQEBAQIBAQEQEQQNDAEBLAIJAQQLAgEGAhIIAiYCAgIlCxUCDgIEAQ0FCBqDBYJKAw4gAQIMkXOQZgKBOYhidX8zgn8BAQWBLwGDZhiCDAMGgQ4qhR6EOYJJGoFBP4ERR4FOfj6CZAEBgWWDDjKCLI09IAEDgnWPWI5AdgqCO40MiU6CSIgNi2uCX4FmjmCbGAIEAgQFAg4BAQWBaSJEgRRwFTuCbFAYDY4dg3OFFIU/dIEpjSABAQ
X-IronPort-AV: E=Sophos;i="5.70,386,1574121600"; d="scan'208";a="712098459"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 31 Jan 2020 16:55:50 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 00VGto9s031938 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 31 Jan 2020 16:55:50 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 31 Jan 2020 10:55:49 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 31 Jan 2020 11:55:49 -0500
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 31 Jan 2020 10:55:48 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LxZpgD5ACc386LxGKU+fs61UWYbaZlGkGicFn7GcdFArhsBX4s2xug4P31yrrjkMPu568IaaSjzkKIU223/kSedHWBptNWB+euh+TprAT1Tw7TkDQj7wJQiDQ+HyBgcTauQYstCXzMyTawglG66/VUkWgfStCcfffYSNx6Uw9p8B+WW81FJvhjqwn643xG5OpBYc5JetDbWrivU3JRXy8gqqQ7U8+RMmlf0bTgYK0hml5pOM+m8EDBSN9EvsA5Fz2rUelqWQ3egSQDwqkmncDN5OE+mj7rxcSDi6T09Km1i+ieDLLeCYZYJaQ62U7/ILvdielNcQdkAtEewQ6oYUXw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TpgUdxsuia7A824nhbf3EwMRBxubEJxhxMzzjMOdOAM=; b=KpStU+Q4EkoAahkmSqN0N+g5zRvoe9NTUP9mJpca9YS1vibtR6YtS/eCjBm3pPp3VjDKNMimPfoNNQIQn0ahBD7X8oC7YrrV6scFuEadgjDzzT8WWmjc1NPyMEQt+IAEQwuuAAiWaRfTl72dmbzkpsTjezBQWUBZ9RluNagmVjvE+5YTOoRNPF3ONV9hpa1ve774b0YDL5fdkIPZas4oLBeSNr5A8Y23wd3v+towh1yTgRioG0+FPwSKC4eNp57uSTRwiwJ+MuN9NOCT22iU1lkBs1HfavqXwnwNJBjyyrZIPA9sYrQrvwkwkdzqp21BeAK7wIyngDk0ApEGmvaPSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TpgUdxsuia7A824nhbf3EwMRBxubEJxhxMzzjMOdOAM=; b=lbfx/cRNNfLnpJv0VHMbcC9kYyRGlisfXv8OVV+vtNg3EJXspDtXvjgLi1RAGE1Sy8C7OWpcnMfUpogYAKm6duJ9LLCLhVperNh2AsKUq9EyiL6uVuRahWtdHpINzzgQpSqjy3AKTbPlEZvFSZIvLcOWG9fZy9sBQ61gE7ldUvE=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (20.178.250.159) by MN2PR11MB3773.namprd11.prod.outlook.com (20.178.253.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.19; Fri, 31 Jan 2020 16:55:47 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::fd76:1534:4f9a:452a%3]) with mapi id 15.20.2665.027; Fri, 31 Jan 2020 16:55:47 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Dominique Barthel <dominique.barthel@orange.com>, "iot-directorate@ietf.org" <iot-directorate@ietf.org>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-6lo-backbone-router.all@ietf.org" <draft-ietf-6lo-backbone-router.all@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Thread-Topic: [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13
Thread-Index: AQHV15Xp0DqdMH5N3U2Lk4byUboXAqgE4HWQ
Date: Fri, 31 Jan 2020 16:55:42 +0000
Deferred-Delivery: Fri, 31 Jan 2020 16:55:28 +0000
Message-ID: <MN2PR11MB3565CC1EFF3F90284256549CD8070@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <158040668306.10190.15300577530854340486@ietfa.amsl.com>
In-Reply-To: <158040668306.10190.15300577530854340486@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com;
x-originating-ip: [2001:420:44f3:1300:41e7:7725:e525:b2e8]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ae5f9160-8489-4020-bfa1-08d7a66e6b86
x-ms-traffictypediagnostic: MN2PR11MB3773:
x-microsoft-antispam-prvs: <MN2PR11MB3773F1F8861AF82BD1CE6A4ED8070@MN2PR11MB3773.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3631;
x-forefront-prvs: 029976C540
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(39860400002)(136003)(346002)(376002)(199004)(189003)(9686003)(81166006)(8676002)(33656002)(55016002)(64756008)(66946007)(66446008)(76116006)(66476007)(8936002)(2906002)(86362001)(4326008)(66556008)(81156014)(71200400001)(66574012)(30864003)(5660300002)(6506007)(110136005)(966005)(478600001)(186003)(316002)(7696005)(54906003)(6666004)(52536014); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3773; H:MN2PR11MB3565.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: l3JgaDPKg1+e51OL20u+8hvYpV46tFr+JWBPrAmtcxpoiLbvHkBpT+IhsPniNBXxcnFH+lUK53W6xjnE3ve0at35y2Hbsw/vfgcAX4ZfdSWyn4tJGac8KfTR/Wt41hedEYZZvIyTmnyUDpeTnzEBgWqDSAPSSxfJsv1+df9cXLjeR8tWwjMzBaXH/qTq107YhYfMbl50GNovncn+ESvic2qc+qrhfdrqzXvI2Z5nXNvCLSdypFxcwI/N0bXoYamIy2RhnNrY0PD51lsL+Ol5YxExPYiUhBk5qOfRb8eWwkdoG6ViuYP2dpuK9ap5JEORi/J96KpKCgeTNWU20GN24CPzh7QtMvX7Ndiw559ck7fWHtFnL8GIEsywH4F3B+jdw7hCPXHDYKYErwMlPhUx/xkx/1LH0lehtQLRXs7gTZ7SFZc1Xe77hAnO8XcojPx6QxA8PWKu7JmytU9rIfqlEErJFtms9x6EjIWa9ofFnk5m0zo/kMKaR686gjGCNNbZ7VQqTVPSz0sFHmczJecs8w==
x-ms-exchange-antispam-messagedata: cEFkXxf1uljF4vF4ik5oq9/0kNuC9mzCPDfp8sOAK58mIcIHgMlIEvyma3MbS9TuO/6Atuwi0mxNucqRgTQn0H3HFdsBd8umhZA6GIKQ5UmttXrilgIGOxmm7KI4yaJ1B4ZVVaJyRyUKxvQQBBWRQi2O7uFUH4e3amArGUU0AsCe2rrvBaRCUOu5/inCh/c/JeGqTU0HzfcbwGygdiJcTw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ae5f9160-8489-4020-bfa1-08d7a66e6b86
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Jan 2020 16:55:47.5351 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 97gT1yFg9ccoERoMGgJko+yZRqqkZKjQSBhSC/f/oCVWwqq/KvP+c4yUBL5XvAD0kl+XUQrUY88BPyg2xGypQQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3773
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xch-rcd-007.cisco.com
X-Outbound-Node: alln-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/nADC5i1y_uVWYz7SPCZBKGIxRGs>
Subject: Re: [6lo] Iotdir last call review of draft-ietf-6lo-backbone-router-13
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jan 2020 16:55:55 -0000

Hello Dominique:

Many thanks for your great review! Let's see below:
 
> # Comments/Questions:
> Picture 1., which gives a global view of the architecture we are talking about,
> should be referenced as soon as end of Intro (specifically, together with “This
> specification defines the 6BBR as a Routing Registrar …”.

Good point! the intro text now looks like:

"
   This specification defines the 6BBR as a Routing Registrar [RFC8505]
   that provide proxy services for IPv6 Neighbor Discovery.  As
   represented in Figure 1, Backbone Routers federate multiple LLNs over
   a Backbone Link to form a MultiLink Subnet (MLSN).  Backbone Routers
   placed along the LLN edge of the Backbone handle IPv6 Neighbor
   Discovery, and forward packets on behalf of registered nodes.
"

> 3. Overview:
> Picture 1 shows one 6BBR per LLN. Can an LLN operate with multiple 6BBRs,
> to avoid single point of failure?

Sure; I reused an image that illustrates RPL DODAGs but that was a bad idea.
What about this (sorry if your font is not fixed size): ?

                |
              +-----+               +-----+       +-----+ IPv6
    (default) |     |    (Optional) |     |       |     | Node
       Router |     |          6LBR |     |       |     | or
              +-----+               +-----+       +-----+ 6LN
                 |  Backbone side      |             |
     ----+-------+-----------------+---+-------------+----+-----
         |                         |                      |
      +------+                 +------+                +------+
      | 6BBR |                 | 6BBR |                | 6BBR |
      |      |                 |      |                |      |
      +------+                 +------+                +------+
         o     Wireless side   o   o  o      o           o o
     o o   o  o  o   o  o  o o   o  o  o   o o  o  o  o o     o   o
    o  o o  o o   o o  o   o   o  o  o  o       o     o  o  o o o
    o   o  o  o  o  o   o  o  o  LLN  o   o  o  o  o   o   o  o   o
      o   o o   o   o   o  o     o  o    o      o     o     o o
     o     o                o

> 
> “The combined Binding Tables of all the 6BBRs on a backbone form a
> distributed database of 6LNs that reside in the LLNs or on the IPv6 Backbone.”
> From the definition of 6LN and from Figure 1., it had not occurred to me that a
> 6LN could reside on the Backbone. Can you clear out this doubt?

Actually a 6LN is a L3 construct and as such can be attached to any network including Wi-Fi or Ethernet.
e.g., you could have a device that sleeps and needs a 6BBR acting 	as sleeping proxy.
There might be a need for additional text when we really work on a 6LN sitting in the backbone, e.g., to insist that the 6LN does not listen to multicast NS so it ignores DAD and Lookup, which are handled by the 6BBR.
Suggestion is to turn the last block of the intro as:

"
   A 6LoWPAN node (6LN) registers all its IPv6 Addresses using an
   NS(EARO) as specified in [RFC8505] to the 6BBR.  The 6BBR is also a
   Border Router that performs IPv6 Neighbor Discovery (IPv6 ND)
   operations on its Backbone interface on behalf of the 6LNs that have
   registered addresses on its LLN interfaces without the need of a
   broadcast over the wireless medium.  A 6LN that resides on the
   backbone does not register to the SNMA groups associated to its
   Registered Addresses and defers to the 6BBR to answer or preferably
   forward to it as unicast the corresponding multicast packets. 
"




> “The proxy-ND operation can co-exist with IPv6 ND over the Backbone.”
> I seems to me that IPv6 ND will happen on the Backbone no matter what the
> 6BBR does. Do you mean “The proxy-ND operation of the 6BBR can co-exist
> with the 6BBR bridging IPv6 ND between the Backbone and the LLN.”?

I agree ND will be there. I meant that there can be normal nodes doing ND and 6BBR proxying ND on a same backbone.
Proposed clarification:
"

   The operation of IPv6 ND and of proxy-ND are not mutually exclusive
   on the Backbone, meaning that nodes attached to the Backbone and
   using IPv6 ND can transparently interact with 6LNs that rely on a
   6BBR to proxy ND for them, whether the 6LNs are reachable over a LLN
   or directly attached to the Backbone.

"


> 
> “The 6BBR may co-exist with a proprietary snooping or …“. My understanding
> of the 6BBR is that is is a box containing a set of functions. Which function of
> the 6BBR is specifically being referenced here?

Clarifying to
"
   The [RFC8505] registration mechanism used to learn addresses to be
   proxied for may co-exist in a 6BBR with a proprietary snooping or the
   traditional bridging functionality of an Access Point, in order to
   support legacy LLN nodes that do not support this specification.

"
Works ?



> 3.2 Access Link
> Figure 2 has two arrows pointing to nowhere. What is the information being
> conveyed by this representation? multicast? Another arrow has the (multicast)
> annotation but does not have the same graphical representation.

True and True. 

The RS(multicast) is intercepted by the AP, so it will never be really multicast over the wireless.
The multiple arrows effectively denote a real multicast.

Let le add text to explain that prior to the picture
"
    The RS sent initially by the 6LN(STA) is a transmitted as a multicast but
    since it is intercepted by the 6BBR, it is never effectively broadcasted.
    The multiple arrows associated to the ND messages on the backbone denote a
    real Layer-2 broadcast.

"



> 3.3 Route-Over Mesh
> I suggest to add a picture showing the LLN mesh structure, with 6LNs, 6LRs
> and a 6LBR. This would ease the reading of the text. I’m sure you can rip one
> such picture off of another draft. BTW, can there be multiple 6LBRs for one
> LLN, much like multiple DAG roots for RPL. If yes, this needs to be
> mentionned, and maybe doarn in the picture.

OK let me add pictures for both cases
"
   The simplest topology from the Layer-3 perspective occurs when the
   wireless network appears as a single hop hub-and-spoke network as
   shown in Figure 2.  The Layer-2 operation may effectively be hub-and-
   spoke (e.g., Wi-Fi) or Mesh-Under, with a Layer-2 protocol handling
   the complex topology.

                    |
                 +-----+               +-----+       +-----+ IPv6
       (default) |     |    (Optional) |     |       |     | Node
          Router |     |          6LBR |     |       |     | or
                 +-----+               +-----+       +-----+ 6LN
                    |  Backbone side      |             |
        ----+-------+-----------------+---+-------------+----+-----
            |                         |                      |
         +------+                 +------+                +------+
         | 6BBR |                 | 6BBR |                | 6BBR |
         | 6LR  |                 | 6LR  |                | 6LR  |
         +------+                 +------+                +------+
      (6LN) (6LN) (6LN)       (6LN) (6LN) (6LN)          (6LN) (6LN)



                      Figure 2: Access Link Use case
"

And 

"


3.3.  Route-Over Mesh

   A more complex Multi-Link Subnet topology occurs when the wireless
   network appears as a Layer-3 Mesh network as shown in Figure 4.  A
   so-called Route-Over routing protocol exposes routes between 6LRs
   towards both 6LRs and 6LNs, and a 6LBR acts as Root of the Layer-3
   Mesh network and proxy-registers the LLN addresses to the 6BBR.

                   |
                +-----+               +-----+       +-----+ IPv6
      (default) |     |    (Optional) |     |       |     | Node
         Router |     |          6LBR |     |       |     | or
                +-----+               +-----+       +-----+ 6LN
                   |  Backbone side      |             |
       ----+-------+-----------------+---+-------------+----+-----
           |                         |                      |
        +------+                 +------+                +------+
        | 6BBR |                 | 6BBR |                | 6BBR |
        +------+                 +------+                +------+
            |                        |                       |
        +------+                 +------+                +------+
        | 6LBR |                 | 6LBR |                | 6LBR |
        +------+                 +------+                +------+
       (6LN) (6LR) (6LN)       (6LR) (6LN) (6LR)        (6LR) (6LR)(6LN)
    (6LN)(6LR) (6LR) (6LN)   (6LN) (6LR)(6LN) (6LR)  (6LR)  (6LR) (6LN)
      (6LR)(6LR) (6LR)         (6LR)  (6LR)(6LN)    (6LR) (6LR)(6LR)
    (6LR)  (6LR)    (6LR)   (6LR) (6LN)(6LR) (6LR)    (6LR) (6LR) (6LR)
    (6LN) (6LN)(6LN) (6LN) (6LN)       (6LN) (6LN)  (6LN)  (6LN) (6LN)

                    Figure 4: Route-Over Mesh Use case"

> Figure 3. Same comment about arrows pointing to nowhere (a 3 arrows bunch,
> in this picture, as opposed to 2, in the previous picture).
> 

Added same text

Please let me know if we are OK so far; I'll continue next week.

In the meantime,  could you please resend the nits in a format that is not concatenated, if you still have that?
As below it is unreadable : (

Many thanks again!

pascal


> 3.4
> “Addresses in a LLN … must be registered … “. Is the use of lowercase “must”
> intended? “Over the LLN, Binding Table management is as follows:” Sorry to
> sound stupid, but the list of actions does not include the initial registration.
> Likewise, the transitions between the Tentative, Reachable or Stale states are
> not described fully, left to the reader to imagine. The tone of voice of the
> Binding Table management is narrative. Why is RFC2119 language not used?
> After reading section 9, it occurred to me that this description might just be a
> preview of section 9. If true, please state this explicitely and add a forward
> reference.
> 
> 5
> “If this registration is”. Not sure what “this” refers to. Was this piece of text
> moved around?
> 
> 7.
> “Global including Unique Local addresses”
> Why “including”? Aren’t they disjoint ranges?
> 
> 9.
> How does Section 9 “Creating and Maintaining a Binding” articulate with
> Section
> 3.4 “The Binding Table”? Is 3.4 just a preview (hence the narrative style)? In
> which case, a forward reference from 3.4 to 9 would be useful.
> 
> 9.2
> “An NS(DAD) with no EARO or with an EARO that indicates a duplicate If the
> Registration Lifetime is of a long duration, …” Cut&Paste error?
> 
> # Nits:
> - “In practice, IPv6 addresses very rarely conflict because of the entropy of the
> 64-bit Interface IDs, not because address duplications are detected and
> resolved.” -> “In practice, the fact that IPv6 addresses very rarely conflict is
> mostly attributable to the entropy of the 64-bit Interface IDs, not to the
> address duplicate detection and resolution mechanisms”. - inconsistent use of
> “broadcasted” versus “broadcast” - 1. Intro : “that provide proxy services” ->
> “provides” - 2.2 Bridging proxy : “6BR” -> “6BBR” - 3 Overview: “Figure 1
> illustrates backbone link” -> “Figure 1 illustrates a backbone link” - 3
> Overview: “In the case, the co-existing function” -> “Any such co-existing
> function” - 3 Overview: “Registering Node” is a term defined in RFC8505.
> However, “registering node” is also found in this document, without
> capitalization. Please check if this is intentional. - 3 Overview: “.. MAY also be
> used with a 6LBR, if one is present, and the 6BBR.” -> “between a 6LBR, if one
> is present, and the 6BBR.” - 3.2 “The 6BBRs applies” -> “6BBR” - 3.2 “in that
> example” -> “in this example” - 3.3 “The 6LBR (acting as Registering Node)
> proxies the registration to the 6BBR, using [RFC8505] to register the addresses
> the 6LN (Registered Node) on its behalf to the 6BBR”. -> “the addresses of the
> 6LN” -> “its” is ambiguous. I believe that, grammatically, "it" refers to the
> subject, which is “the 6LBR” in this sentence. Better avoid any ambiguity by
> rewriting, probably cutting the sentence into several ones. - 3.3 “As a non-
> normative example of a Route-Over Mesh, the 6TiSCH architecture suggests …
> , and is … ”. Ambiguous sentence. Break it in two. -> “a 6LBR that serves the
> LLN. The latter is either …”. - 3.4 “a LLN”-> “an LLN” ? - 3.4 “Conflicting
> registrations are solved by the 6BBRs transparently to the Registering Nodes.”
> -> “6BBRs, transparently” - 3.6 “The router can then determine the
> -> freshest
> EARO in case of a conflicting NA(EARO) messages,” -. “in case of conflicting
> NA(EARO) messages,” - 5. “This specification enables an address to be
> registered to more than one 6BBR.” -> “allows for an address to be registered
> at more than on 6BBR”. - 5. “a 6LBR MUST be capable to maintain a state”->
> “capable of maintaining” - 8. “It acts as a Layer-2 Bridge for all types unicast
> packets” -> “all types of unicast packets” - 8. “the 6BBR MUST either answer
> directly to the NS(Lookup) message or” -> “the 6BBR MUST either answer the
> NS(Lookup) message directly or” - 8. “it is eventually be discovered“ -> “it is
> eventually discovered“ - 9. “pointing on the registering node” -> “pointing to
> the registering node” - 9. “A Bridging Proxy MAY register Link Local addresses
> to the 6BBR and proxy ND for those addresses over the backbone.”. ->
> “register at the 6BBR“ or “register by the 6BBR”. -> “for these addresses” - 9.
> “the current DAD operation continues as it was” -> “continues unaltered” ? -
> 9.2 “in order to a allow for a parallel registration to arrive to this node” -> “to
> allow” -> “to arrive at” - 9.2 “that is not as fresh as this“ -> “that is not as fresh
> as this Binding“? - 9.3 “the 6BBR MUST attempts a NUD procedure” ->
> “attempt” - 10 “routing registrar” -> “Routing Registrar”
> - 11 Security Considerations: “either by means of physical or IP security for the
> Backbone Link or MAC-layer security.” bad grammatical construct. - 11
> Security Considerations: “A possible attack …  can easily … take over.” From
> the quoted text, it looks that the attack described succeeds. From the next
> sentence in the paragraph, it looks that the attack does not succeed. Can you
> rephrase or elaborate? For example “One could think that a possible attack
> would be …. But …” - 12 Protocol Constants: “relatively long value” is used
> twice, even though the recommended value is very different. I guess you
> mean “STALE_DURATION
>    SHOULD be configured to a value that is long relative to the address
>    lifetime. For example, in LLNs with …, a good value is …”.
> - Appendix B: “The term LLN is used … , meeting the requirements listed in …
> “.
> I guess you mean something slightly different. Using the term “LLN” cannot by
> itself meet the technical requirements of App B.3 of RFC8505. - Appendix B:
> “Each LLN in the subnet is attached at an IPv6 Backbone Router (6BBR).” ->
> “attached to an IPv6 Backbone Router (6BBR)”, or “attached to the Backbone
> through a 6BBR”. - Appendix B: “In this way,” -> “This way, “ - Appendix B:
> “The IPv6 ND operation is minimized as the number of 6LNs grows in the LLN.”
> ND where? On the Backbone, the number of ND operations still grows with
> the number of 6LNs in the LLNs, I beleive. What does “minimized” exactly
> means, btw? In absolute numbers? In relative numbers?
> 
> 
> _______________________________________________
> 6lo mailing list
> 6lo@ietf.org
> https://www.ietf.org/mailman/listinfo/6lo