Re: [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc6775-update-13.txt
"Pascal Thubert (pthubert)" <pthubert@cisco.com> Sun, 04 March 2018 15:11 UTC
Return-Path: <pthubert@cisco.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E29412D86F; Sun, 4 Mar 2018 07:11:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.531
X-Spam-Level:
X-Spam-Status: No, score=-14.531 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wBF2TaIjo2rP; Sun, 4 Mar 2018 07:11:12 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BD5912D779; Sun, 4 Mar 2018 07:11:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25701; q=dns/txt; s=iport; t=1520176272; x=1521385872; h=from:to:cc:subject:date:message-id:references: content-transfer-encoding:mime-version; bh=EB1s2HaZ7t5gK/3W9e9SWkGWuvkkpPq+DQt1JMUrGwg=; b=PyaLZEg59S3G5kH5AXkVyIj429+HZsMm/etFEqsxsLKqw8WGZOuL+7TG jND/TbAI9VIyCHb6RceeA8Jqo3rMIFHatUdONTWbonCO4O3lP6RjbWMJ1 vetBlAm8rCvXnR5408CFUrYpzoUGGKNoMQobA+NCGZ2AhmDTjIPKdsDVy s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D9AABDC5xa/4gNJK1RChkBAQEBAQEBAQEBAQEHAQEBAQGDIy2BVigKjW6NeIICexuUNBSCAQqFMAKCYSE0GAECAQEBAQEBAmsnhSMBAQEEGiAtEgwEAgEIEQQBARoCAxAyHQgBAQQBDQUIhROqb4hfgiuFLYENgSGBV4FlAYIfWDaEdggHBAQ6MQaFEASIGh2FQoE7iy4JAolkhw+BcYQ1gx6FPod4iTACERkBgS0BHjiBUnAVGSGCQ4IxHIEEAQ5odxGJdAElB4EDgRgBAQE
X-IronPort-AV: E=Sophos;i="5.47,423,1515456000"; d="scan'208";a="361556465"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 Mar 2018 15:11:09 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id w24FB8RK027490 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 4 Mar 2018 15:11:08 GMT
Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Sun, 4 Mar 2018 09:11:07 -0600
Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1320.000; Sun, 4 Mar 2018 09:11:08 -0600
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "rtg-ads@ietf.org" <rtg-ads@ietf.org>
CC: "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "draft-ietf-6lo-rfc6775-update.all@ietf.org" <draft-ietf-6lo-rfc6775-update.all@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Thread-Topic: Rtg Dir review draft-ietf-6lo-rfc6775-update-13.txt
Thread-Index: AdOtm2nPNYcCdDASR1Wy3aGvKJZ+UgD6GY6QAJGg3LA=
Date: Sun, 04 Mar 2018 15:11:07 +0000
Deferred-Delivery: Sun, 4 Mar 2018 15:10:08 +0000
Message-ID: <4f0fb20b46534e60b6d07776fa28187b@XCH-RCD-001.cisco.com>
References: <061001d3ad9b$7315c8e0$59415aa0$@olddog.co.uk>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.61.70.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/jpQCC8UzG506t-eFqWSrFJCTvzM>
Subject: Re: [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc6775-update-13.txt
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Mar 2018 15:11:24 -0000
I has a second thought on the ICMP code, Adrian (and all); If we expect that a device that supports any future spec supports this, then the code could become a version as opposed to a flag. That way we do not have to bar assignments of even values in the future? Pascal > -----Original Message----- > From: Pascal Thubert (pthubert) > Sent: samedi 3 mars 2018 17:57 > To: 'adrian@olddog.co.uk' <adrian@olddog.co.uk>; rtg-ads@ietf.org > Cc: rtg-dir@ietf.org; draft-ietf-6lo-rfc6775-update.all@ietf.org; 6lo@ietf.org > Subject: RE: Rtg Dir review draft-ietf-6lo-rfc6775-update-13.txt > > Hello Adrian: > > Many, many thanks for this incredible review : ) > > I'm attaching the tentative new draft 15. I'll publish by cutoff as a starting > point and incorporate what we can based on your responses on the below till > then. > Please erase in your response everything for which an agreement is already > found. > > Let's see below: > > > > Comments: > > > > The document is quite hard work. More cross-references would help, and > > bringing the abbreviations to the top would also make things easier. > > But the main problem was the trickle feed of how everything hangs > > together - it's all there, but you have to read the entire document to get the > whole picture. > > > > ==Major== > > > > 4.3 > > > > With this specification, the Registration Unique ID is allowed to be > > extended to different types of identifier, as long as the type is > > clearly indicated. For instance, the type can be a cryptographic > > string and used to prove the ownership of the registration as > > discussed in "Address Protected Neighbor Discovery for Low-power and > > Lossy Networks" [I-D.ietf-6lo-ap-nd]. In order to support the flows > > related to the proof of ownership, this specification introduces new > > status codes "Validation Requested" and "Validation Failed" in the > > EARO. > > > > This seems fine, but I don't see how "the type is clearly indicated". > > > [PT>] changed to > > With this specification, the ROVR is allowed to be of different types, as > long as the type is signaled in the message that carries the new type. > > Note: The new drafts such as AP-ND will have to do that in a fashion that can > be backward compatible. This and following comments seem to indicate that > the reader will believe that the "RUID" is used beyond the scope of a > registration, to index the registration or its owner. > This is not so. So I changed the term ROVR which seems to imply "Index" to > "Registration Ownership Verifier". ROVR is now defined as follows: > > Registration Ownership Verifier (ROVR): > Enables to correlate multiple registrations for a same IPv6 Address. > This can be a unique ID of the Registering Node, such as the EUI-64 > address of an interface. This can also be a token obtained > with cryptographic methods and used as proof of ownership of the > registration. The scope of a ROVR is one registration and it cannot be > used to correlate different registrations. > > > > > In more details for your question above: that AP-ND introduces a new flag in > an MBZ field to indicate its type. The length of the ID is the same as EUI-64 so > an RFC6775-only implementation will miss that the type is different. Collisions > will be extremely rare and will not lead to problematic situation since the ID is > only used as a match to recognize that the node that updates a registration is > the node that made the registration. It is NOT as a key for looking up that > node. 2 nodes could use the same ROVR without a damaging effect, unless > they try to also form the same address. Which make the situation even more > exceedingly rare since AP-ND does not use the crypto ID as IID for forming > addresses. So it would be a double collision of 2 independent 64bits > identifiers. It makes more sense to me to worry whether 64bits is enough > robustness for AP ND and define how to work backward compatibility if the > ROVR can be more than 64bits. I'll take that Q to the WG in London. > > > > I think you also have to restate the uniqueness assumption in this new > > context. Probably that uniqueness is required across {type, value} > > (unless, of course, your answer to my first question is that type is > embedded in value). > > This possibly cuts into backward compatibility as well? > > [PT>] Added the text below: > > Note on ROVR collision: different techniques for forming the > ROVR will operate in different name-spaces. < RFC6775> operates on EUI- > 64 addresses. <xref target="I-D.ietf-6lo-ap-nd"/> generates > cryptographic tokens. While collisions are not expected in the EUI-64 > name-space only, they may still happen in the case of <draft-ietf-6lo-ap-nd> > and in a mixed situation. > An implementation that understands the name-space > MUST consider that ROVRs from different name-spaces are different even if > they have the same value. An RFC6775-only will confuse the name-spaces, > which > slightly increases the risk of an ROVR collision. A collision of ROVR has no > effect if the two Registering Nodes register different addresses, since the > ROVR is only significant within the context of one registration. An ROVR is > not expected to be unique to one registration, and this specification allows > that a node use the same ROVR to register multiple IPv6 addresses. > This is why the ROVR MUST NOT be used as a key to identify the > Registering > Node, or as an index to the registration. It is only used as a match to > recognize that the node that updates a registration for an IPv6 address is > the node that made the original registration for that IPv6 address. > This is done to protect the ownership of the address. > Also, when the ROVR is not an EUI-64 address, then it SHOULD NOT be used > as > the interface ID of the Registered Address. This way, a registration that > uses that ROVR will not collision with that of an IPv6 Address derived from > EUI-64 and using the EUI-64 as ROVR per <xref target="RFC6775"/>. > > > See also 6.1/6.2 > > > [PT>] > Changed the definition of ROVR as mentioned above > > > > Furthermore, 7.1.2 says... > > > > A node that supports this specification MUST always use an EARO as a > > replacement to an ARO in its registration to a router. This is > > harmless since the "T" flag and TID field are reserved in [RFC6775], > > and are ignored by a RFC6775-only router. A router that supports > > this specification answers an ARO with an ARO and answers an EARO > > with an EARO. > > > > ...but this doesn't mention the "variation" of the ROVR that might also arise > > with the EARO. How will the RFC6775-only router handle these new ROVRs > > and their "clearly indicated" types? > > [PT>] added the last sentence in > > A router that supports this specification answers an > ARO with an ARO and answers an EARO with an EARO. A router that > does not will consider the ROVR as an EUI-64 and treat it the same, > which has no consequence if the Registered Addresses are different. > > You'll note that at least one of the addresses are formed in a fashion that is > not related to the ROVR, the chances that both the IID and the ROVR collision > are so low that we can safely ignore them. > > > > > --- > > > > 7.1.2 > > > > One alternate way for a 6LN to discover the router's capabilities is > > to start by registering... > > > > You went to a lot of trouble to define the E-flag. You then made the use of > the > > 6CIO (and hence the E-flag) only a SHOULD, and you defined an alternate > > mechanism. (Note: you say "one alternate" implying there are > > more!) > > > > Choice is not good. It complicates the specification and the implementation. > > Why go there? Can't you settle on one mechanism and make it necessary > and > > sufficient? > [ > [PT>] We chatted on the ML. Seems I can drop the alternate method > altogether and MUST the 6CIO in RS/RA. The 6CIO section now includes: > > The 6CIO MUST be present in both Router Solicitation (RS) and Router > Advertisement (RA) messages, unless the capabilities of this node are > already known by the peer. This can be determined by a 6LR if there is > an existing registration in place for the 6LN that is based on EARO. This > can also be implicit, or configured in all nodes in a network. > > Note that discovering the capabilities in RS RA introduces a capability that is > much needed for AP ND, that is a longer ROVR, which makes the security of > the crypto token stronger. > I'll propose text that allows for that change and discuss with the WG. > > > > > --- > > > > You create new registries in 10.1 and 10.2. You must tell the IANA what > > allocation policies to use > > > > > [PT>] 10.1 has > 'The policy is "IETF Review" or "IESG Approval" [RFC8126].' > > 10.2 does not create a registry, not sure I need to say anything? > > > ==Minor== > > > > You have a number of cases of "SHOULD" and "RECOMMENDED" without > > corresponding "MAY" clauses to describe variations. I think that I could > > deduce the reasons (implementation decided to not do it) and the results > > (function is not as rich), but you really should spell these things out. > > > > --- > [PT>] Did some cleaning, please review diffs in -15 > > > > > Would you consider folding Appendix C into the top of Section 2 so that it is > > possible to find the expansion of abbreviations more easily? > > > [PT>] Done > > > --- > > > > RFC 6775 updates RFC 4944. Does this document also update RFC 4944? > [PT>] It only updates what RFC 6775 introduced. So I'd say now, unless we > need to list all ancestry? > > > > > > --- > > > > I missed a discussion of Manageability and especially diagnosing faults. > > It's not mandatory, but it would have been good. (There is a trickle of info > > about policy configuration in 7.3). > > > [PT>] It is in appendix, and happened as the result of Juergen's review. > > > --- > > > > The 2119 boilerplate should be updated to the most recent, viz. > > > > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL > NOT", > > "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", > > "MAY", and > > "OPTIONAL" in this document are to be interpreted as described in BCP > > 14 [RFC2119] [RFC8174] when, and only when, they appear in all > > capitals, as shown here. > > > > ...which will require you add 8174 as a reference > [PT>] done, thanks! > > > > > --- > > > > Sect 2 expects the reader to be familiar with terms and concepts in a long > list > > of other documents. Doesn't that make them normative refs? > > > > [RFC7102] > > [RFC7228] > > [RFC4861] > > [RFC4862] > > [RFC6606] > > [RFC4919] > > [RFC6775] > > [I-D.ietf-ipv6-multilink-subnets] > [PT>] > [PT>] Done, I removed the latter draft upon Dave's review. > > > > > --- > > > > Sect 2 has > > > > Extended LLN: The aggregation of multiple LLNs as defined in > > [RFC4919], interconnected by a Backbone Link via Backbone > > Routers, and forming a single IPv6 MultiLink Subnet. > > > > I'm not super-familiar with 4919, but a quick scan did not make it obvious > > what you are referencing in that document. "LLN" is not mentioned. Nor is > > "aggregation" or "interconnect" (in this context). > > There is some mention in 4.2 of "seamless integration": is that what you are > > referencing? > [PT>] Actually, RFC 6550 should have been referenced there. I removed the > term aggregation. > > > Multiple LLNs as defined < RFC6550> interconnected > by a Backbone Link via Backbone Routers, and forming a single IPv6 > MultiLink Subnet. > > > > --- > > > > Sect 2 has > > > > Registration: The process during which a 6LN registers its > > address(es) with the Border Router so the 6BBR can serve as > > proxy for ND operations over the Backbone. > > > > Do you mean s/Border/Backbone/ ? > > Otherwise it seems strange that the 6LN registers with the 6LBR so that the > > 6BBR can do something. > [PT>] The backbone router draft explains this further. The text was really > missing. Reworded to: > The process during which a 6LN registers an IPv6 Address with > a 6LR in order to obtain services such as DAD and routing back. > Duding that flow, the 6LBR may serve as proxy for the registration > of the 6LN to the 6BBR so the 6BBR can provide IPv6 ND proxy services over > the Backbone. > > > > --- > > > > Sect 2 > > > > Binding: The association between an IP address with a MAC address, a > > port and/or other information about the node that owns the IP > > address. > > > > This was hard to parse. Possibly you mean... > > > > Binding: The association between an IP address, a MAC address, a > > port, and other information about the node that owns the IP > > address. > > > [PT>] Great, used that text > > > --- > > > > Sect 2 > > > > Registering Node: The node that performs the registration to the > > 6BBR, which may proxy for the registered node. > > > > Confusing! > > The 6BBR is defined as the "proxy for the registration". > > Now we appear to have: > > - a node that needs to be registered > > - a node that does the registration to the 6BBR > > - the 6BBR (the proxy) > > The final subclause of your text ("which may proxy for the registered > > node") could be applied to the node that performs the registration or to the > > 6BBR. > > > [PT>] Indeed! Changed as follows > Registered Node: > The 6LN for which the registration is performed, > and which owns the fields in the Extended ARO option. > Registering Node: > The node that performs the registration; this may be the Registered > Node, > or a proxy such as a 6LBR performing a registration to a 6BBR on > behalf of > the Registered Node. > > > > > > --- > > > > 4.1 > > > > The Extended ARO (EARO) deprecates the ARO and is backward > compatible > > with it. More details on backward compatibility can be found in > > Section 7. > > > > The semantics of the ARO are modified as follows: > > > > Given the "deprecates" statement, you probably want... > > > [PT>] Changed to "replaces" > > > The semantics of the EARO are identical to the ARO with the following > > modifications: > > > > --- > > > > 4.2 > > > > The Transaction ID (TID) is a sequence number that is incremented > > with each re-registration. > > > > Who increments? > [PT>] > Changed to > > The TID is a sequence number that is incremented by the 6LN with each > re-registration to a 6LR. > > > > --- > > > > 4.2 > > > > The TID may also be used by the > > network to track the sequence of movements of a node in order to > > route to the current (freshest known) location of a moving node. > > > > You don't need to track the sequence of movements in order to identify the > > freshest known location. You only have to spot the most recent TID. > > This makes a big difference to implementations: is there a need to track the > > sequence or can an implementation just look for the most recent TID? > > > [PT>] True; the text may also lean towards privacy issues. Changed to: > > The TID is a sequence number that is incremented by the 6LN with > each > re-registration to a 6LR. > The TID is used to detect the freshness of the registration request and > to detect one single registration by multiple 6LoWPAN border > routers (e.g., 6LBRs and 6BBRs) supporting the same 6LoWPAN. > The TID may also be used by the network to route to the current > (freshest known) location of a moving node by spotting the most > recent TID. > > > --- > > > > 4.7 > > > > If the registry in the 6LBR is saturated, then the LBR cannot decide > > whether a new address is a duplicate. In that case, the 6LBR replies > > to a EDAR message with a EDAC message that carries a new Status Code > > indicating "6LBR Registry saturated" Table 1. Note: this code is > > used by 6LBRs instead of Status 2 when responding to a Duplicate > > Address message exchange and passed on to the Registering Node by the > > 6LR. There is no point for the node to retry this registration > > immediately via another 6LR, since the problem is global to the > > network. The node may either abandon that address, de-register other > > addresses first to make room, or keep the address in TENTATIVE state > > and retry later. > > > > Three points: > > > > "cannot" seems strong since the first occurrence of the duplicate might > > already be in the registry. > [PT>] The problem indicated above is confined to a "new" address. I'm not > sure what to do beyond that. > > > > > de-registering an address to make room seems a risky business since some > > other 6LR might grab the space. > [PT>] > [PT>] True, we do not have signaling for doing the de registration and the new > registration transactionally. Unsure what to do with this. > > > > > Shouldn't the actions be at the 6LBR > > - to notify the operator > > - to clear out "old" entries from the registry (although that may require > > magic beyond housekeeping after Registration Lifetime expiration: > > perhaps it could curtail the Delay state?) > > > [PT>] yes, recommendations can be made to take actions ahead of time and > provide management alerts; automatically setting a shorter lifetime may > result in additional traffic and no space saving is all the addresses are used so > I'm not sure we can recommend that. > Part of the OPSDIR review was about this. there's new test in section " > Requirements Related to Operations and Management" that I can tune to > address your concern: > > > Req7.1: A management model SHOULD be provided providing > access to the > 6LBR, monitor its usage vs. capacity, and alert in case of congestion. > > > --- > > > > 5. > > > > The 6CIO is typically sent in a Router Solicitation (RS) message. > > When used to signal capabilities per this specification, the 6CIO is > > typically present in Router Advertisement (RA) messages but can also > > be present in RS, Neighbor Solicitation (NS) and Neighbor > > Advertisement (NA) messages. > > > > I didn't find the two uses of "typically" gave me confidence to know what to > > code. > [PT>] yes, I removed that text already. > > > > > --- > > > > 6.1 > > > > | 3 | Moved: The registration failed because it is not the | > > | | freshest. This Status indicates that the registration is | > > | | rejected because another more recent registration was | > > | | done, as indicated by a same ROVR and a more recent TID. | > > | | One possible cause is a stale registration that has | > > | | progressed slowly in the network and was passed by a more | > > | | recent one. It could also indicate a ROVR collision. | > > > > Do you think "Moved" is the best name to cover all of these possibilities? > [PT>] I'm open to a better term : ) > > > > > But, anyway, how can you have a RUID collision by definition of a RUID? > [PT>] Say I generate a crypto token and the 64 bits are the exact same as the > EUI 64 of another node that uses RFC 6775. As discussed above this would be > extremely rare. > Since one of the IPv6 addresses at least is not derived from the ROVR, having > the harmful collision of both ROVR and IPv6 address is quasi impossible, like > winning the lottery every week for a whole lifetime. > > > > > --- > > > > 6.1 > > > > The node SHOULD maintain the TID in a persistent > > storage. > > > > Unfortunate to push persistent storage requirements. But, since this is a > > SHOULD, all processes are in place to support not storing across restarts. So > > why make anyone do it? Surely you could fall back to the default handling > > without persistent storage. > > > [PT>] Agreed; that text was a bad duplicate of the ROVR section. It is > removed. > > The text in the ROVR section now says: > > The Registering Node SHOULD store the ROVR, or enough > information to > regenerate it, in persistent memory. > Otherwise, if a reboot causes a loss of memory, re-registering the > same address could be impossible until the 6LRs and the 6LBR time > out the > previous registration, or a management action is taken to clear the > relevant > state in the network. > > > --- > > > > 6.2 > > > > Code: The ICMP Code as defined in [RFC4443]. The ICMP Code > > MUST be set to 1 with this specification. An odd > > value of the ICMP Code indicates that the TID field > > is present and obeys this specification. > > > > You're overloading the ICMP Code in an ugly way. But you knew that :-) It > > would probably be more normal to steal the top bit so that allocation of > new > > codes can continue more normally. But failing that, I think you would be > wise > > to make it so the IANA registry clearly shows that the odd values must not > be > > assigned in future (section 10.2). > [PT>] Yes! the EARO should have been transported in DAR DAC. I read that > only odd values should be assigned in the future since the future will always > extend this. > New proposed text: > Also, all even values of the Code field are reserved for the > ICMP types above, and should not be assigned in the future. > > > > > --- > > > > It is not clear whether anything in App A and B is intended to be normative. > > A clear statement would be helpful. > > > > ==Nits== > > > > idnits shows three problems > > > > ** There is 1 instance of too long lines in the document, the longest one > > being 3 characters in excess of 72. > > > > == Missing Reference: 'Perlman83' is mentioned on line 1392, but not > > defined > > > > == Missing Reference: 'IEEEstd802154' is mentioned on line 1615, but not > > defined > > > > The references are caused by you having a third references section. I've not > > seen that before. Why not merge the sections as normal? > > > > --- > > > > Document header > > > > I suspect "cisco" should have a capital "C" > > > [PT>] Did not in the old days : ) > > > --- > > > > I think the document title should spell out "Neighbor Discovery" and > > "IPv6 over Low-Power Wireless Personal Area Networks" > [PT>] Per a previous review, the title is now: > "Registration Extensions for 6LoWPAN Neighbor Discovery" > This seems to work with your comment > > > > > > --- > > > > Sect 1 > > > > s/an IPv6 Low Power Networks/any IPv6 Low Power Network/ > > > > --- > > > > Sect 1 > > > > to enable additional capabilities and enhancements such as: > > > > s/such as/including/ > > > [PT>] done > > --- > > > > You use "NS" in section 4, but don't expand it until 4.1 > > > [PT>] Fixed with the glossary in section 2. > > --- > > > > 4.4 could very usefully point at 6.2 to help the reader parse the text. > [PT>] one for both EARO and DAM. > > > > > --- > > > > Shouldn't the figure in 6.2 show the optional ND options as described in > 4.4? > > > [PT>] Actually that text is not compatible with a variable length ROVR so it > might be better to omit it. I need to check with the group is supporting a > larger ROVR is desirable. > > > --- > > > > 4.7 has "LBR" which should be "6LBR" > > > > --- > [PT>] done > > > > > 6.1 > > > > s/SLLAO option/SLLA option/ (twice) > [PT>] Three times : ) > > > s/The EARO option/The EARO/ (three times) > [PT>] even more > > > > --- > > > > 6.3 > > > > This specification defines new capability bits for use in the 6CIO, > > which was introduced by [RFC7400] for use in IPv6 ND RA messages. > > > > Say "...defines four new..." to save me having to work out which bits are > new. > > > [PT>] Done. > > --- > > > > 6.3 > > Routers that support this specification MUST set the "E" flag and 6LN > > SHOULD favor 6LR routers that support this specification over those > > that do not. > > > > s/6LR routers that support/a 6LR that supports/ > > > > --- > [PT>] done > > > > 8. > > > > This specification extends [RFC6775], and the security section of > > that standard also applies to this as well. > > > > Don't think 6775 is an Internet Standard. > > Suggest s/standard/document/. > [PT>] done
- [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc6775-u… Adrian Farrel
- Re: [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc67… Pascal Thubert (pthubert)
- Re: [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc67… Pascal Thubert (pthubert)
- Re: [RTG-DIR] Rtg Dir review draft-ietf-6lo-rfc67… Pascal Thubert (pthubert)