[Roll] [Errata Verified] RFC9008 (7543)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 12 January 2024 22:59 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D97BEC14F61D; Fri, 12 Jan 2024 14:59:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.659
X-Spam-Level:
X-Spam-Status: No, score=-1.659 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id siytzRLz2qT1; Fri, 12 Jan 2024 14:59:19 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 152A9C14F60C; Fri, 12 Jan 2024 14:59:19 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id B3FA71A0A390; Fri, 12 Jan 2024 14:59:18 -0800 (PST)
To: mathis.marion@silabs.com, mariainesrobles@gmail.com, mcr+ietf@sandelman.ca, pthubert@cisco.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: jgs@juniper.net, iesg@ietf.org, roll@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240112225918.B3FA71A0A390@rfcpa.amsl.com>
Date: Fri, 12 Jan 2024 14:59:18 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/5z3ThoneoSLCSF7ejD753PsZFcA>
Subject: [Roll] [Errata Verified] RFC9008 (7543)
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2024 22:59:23 -0000

The following errata report has been verified for RFC9008,
"Using RPI Option Type, Routing Header for Source Routes, and IPv6-in-IPv6 Encapsulation in the RPL Data Plane". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7543

--------------------------------------
Status: Verified
Type: Technical

Reported by: Mathis Marion <mathis.marion@silabs.com>
Date Reported: 2023-06-14
Verified by: John Scudder (IESG)

Section: 6

Original Text
-------------
As the Rank information in the RPI artifact is changed at each hop, it
will typically be zero when it arrives at the DODAG root.

Corrected Text
--------------
As the Rank information in the RPI artifact is changed at each hop, it
will typically be non-zero when it arrives at the DODAG root.

Notes
-----
The SenderRank is 0 if: 
- The packet comes from Internet (and has an RPI)
- The packet has not been forwarded (ie. if the source is a direct child of the DODAG root), as RFC 6550 section 11.2 tells to set SenderRank to 0 at the source.

The typical case is rather a packet that arrives at the DODAG root from a child node forwarding a packet, in which case SenderRank is set to DAGRank(rank) > 0.

--------------------------------------
RFC9008 (draft-ietf-roll-useofrplinfo-44)
--------------------------------------
Title               : Using RPI Option Type, Routing Header for Source Routes, and IPv6-in-IPv6 Encapsulation in the RPL Data Plane
Publication Date    : April 2021
Author(s)           : M.I. Robles, M. Richardson, P. Thubert
Category            : PROPOSED STANDARD
Source              : Routing Over Low power and Lossy networks
Area                : Routing
Stream              : IETF
Verifying Party     : IESG