
From nobody Tue Feb  5 04:52:25 2019
Return-Path: <pthubert@cisco.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C263130E46 for <roll@ietfa.amsl.com>; Tue,  5 Feb 2019 04:52:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.641
X-Spam-Level: 
X-Spam-Status: No, score=-14.641 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.142, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=O7uxIEfJ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=lfVHjXUp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mHbxOQKj8wOC for <roll@ietfa.amsl.com>; Tue,  5 Feb 2019 04:52:20 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D8D14130F4C for <roll@ietf.org>; Tue,  5 Feb 2019 04:52:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=31192; q=dns/txt; s=iport; t=1549371139; x=1550580739; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Uz7CER4gXm2epfl4DvMMczHQctilCrMG2Rzb8bl7j7E=; b=O7uxIEfJq0yh+zZwlTxHMGF8BrdnK0Qa/1dcKEFcAXJLVtIL+3d8ivAr gQTMV+JEZaZCJ1GQ+5EOE+PEpKqAZAOm8yirQ6QLuRXLw6eGULF7hOvSk 1bqlc+RlXPjDE6BFLb5sgffgLV094puuyOZu44825ZwoDD3XJ8vbiMY9m 0=;
IronPort-PHdr: =?us-ascii?q?9a23=3A0HMRSxyQMVnCLpnXCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YhWN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZudFU3mJvPwcwQxHd9JUxlu+HToeUU=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ADAAAOhllc/4oNJK1lGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUQQBAQEBAQsBgQ0jJSsDZ3QECyeEA4NHA4RQiytKgg2?= =?us-ascii?q?YEBSBEANUCwEBIwmEQAIXgnsiNAkNAQMBAQIBAQJtHAyFSgEBAQQjChMBATc?= =?us-ascii?q?BDwIBCA4DBAEBIQoCAgIwHQgCBAENBQiDG4EdTAMVAQIMoDMCihRxgS+CeAE?= =?us-ascii?q?BBYEwAYNaDQuCCwMFiXl2KIEqF4FAP4ERRoJMgldHAQECAYEmJgISK4JcMYI?= =?us-ascii?q?mkBeHBotjCQKHNIVDhV+BbIVDiAmDD4oqhTGMCwIEAgQFAg0BAQWBRjiBVnA?= =?us-ascii?q?VgyeCHINuhRSFP3IBgSeNUgEB?=
X-IronPort-AV: E=Sophos;i="5.56,564,1539648000";  d="scan'208,217";a="510986832"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Feb 2019 12:52:18 +0000
Received: from XCH-RCD-013.cisco.com (xch-rcd-013.cisco.com [173.37.102.23]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id x15CqIAb024152 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 5 Feb 2019 12:52:18 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-RCD-013.cisco.com (173.37.102.23) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 5 Feb 2019 06:52:17 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 5 Feb 2019 06:52:16 -0600
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Tue, 5 Feb 2019 07:52:16 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uz7CER4gXm2epfl4DvMMczHQctilCrMG2Rzb8bl7j7E=; b=lfVHjXUpzMTbga47OBjMvZA8MFpcEU/vm9XZ9agvzh36VHbrNeN2Ra2GrImtTduaT5rowv4EzyoxNiBQCYZ/he2a7GIn6i3Njk9gRglfzdD8er9bthWL3JnIG2S3bQ8V/lazbXR9DyO5x4SiMKNrkPou886N4uAiiw/iTSaRsz4=
Received: from SN6PR11MB3471.namprd11.prod.outlook.com (52.135.112.221) by SN6PR11MB3405.namprd11.prod.outlook.com (52.135.110.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1580.20; Tue, 5 Feb 2019 12:52:14 +0000
Received: from SN6PR11MB3471.namprd11.prod.outlook.com ([fe80::1c9f:935:667b:8957]) by SN6PR11MB3471.namprd11.prod.outlook.com ([fe80::1c9f:935:667b:8957%3]) with mapi id 15.20.1580.019; Tue, 5 Feb 2019 12:52:15 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Ines Robles <mariainesrobles@googlemail.com>, roll <roll@ietf.org>
CC: Michael Richardson <mcr+ietf@sandelman.ca>
Thread-Topic: Security Considerations for useofrplinfo draft
Thread-Index: AQHUuN4npKdToAw+/E6+cODB9wdI16XQ7IqQ
Date: Tue, 5 Feb 2019 12:52:05 +0000
Deferred-Delivery: Tue, 5 Feb 2019 12:51:25 +0000
Message-ID: <SN6PR11MB347140FE3032D19E7F202331D86E0@SN6PR11MB3471.namprd11.prod.outlook.com>
References: <CAP+sJUeGoYDwJ=RHs80Og6WszT3=OTk_Ohfy9BuzKwubZxW4TQ@mail.gmail.com>
In-Reply-To: <CAP+sJUeGoYDwJ=RHs80Og6WszT3=OTk_Ohfy9BuzKwubZxW4TQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pthubert@cisco.com; 
x-originating-ip: [2001:420:44f3:1300:dd25:e359:77ae:dc51]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SN6PR11MB3405; 6:SbhR1RbXVqBhDqHyk5VGfnwOUhs/rl39XnEnc9q6NeAcdlDpPTnVjpKr/SMJBlkDejToWFtpDoWM98C5mygi1jGcQAR/31mR6CYZbQmxaadUDbvbKxUvBWTA14LPcwb5tS23RTYBT2ire4/WMMAriRwWGOCBTMsvpLuD8BkLXgM22abUxXWXQQQ2Uk7urOWbKetXvnvhPZYwk4yiUCdosSig1d7tRS3oKIu95eyOShoUGbcYf85Y6MXI5wI6PfxMFZLIA3I0EL1LvEcEKvqjMRrg2g2Kb4OzZZ+89B2zXepfK5W/JxlY6HuHc2VkxzUgz4R/hiwDM+Ic46jG9JXdGs2QfZApVZTm5BGItWzOZtXfcH2iAern3cP7/GuXuNA9ZdNGHe8bgKdlFbub93z54Ex2V5fdYV3Hl+wVOdf2fpYg+oqZjaD5tmlyeGaHVmtKRTh/4JCgFXj4a83LWiploA==; 5:wZ0KONBGhQrJsMIYXHlreGg6+FsFYwvz0tVji3DhdoZjMOhdRyQxY0Io5wOIDzCRVGzvF1ciVp6t4Z9axSuWCeoSoAaYtE4EeKKFgrruoBiHERfr8XWhfwPYiXKhX6P5BAXZKHDGJ1eXbE75hIXlp8tj8XVBMVRAZddZDP3Kgdp+jQy9FjoZl+kl6g54+XFYM9d0+ynBhC+YcYGCsCYCQw==; 7:e3Iehfjf3ohoWrZfX7JC69E2HZBVO87e1woL/X9UWqWZ8ogpQlbclEjVWxh7ETB8rgroMaGYZD67iw9Ztwrwyt4HPsc85Kngw+dfZ6L8APuLW1TtbbE8VttJPqSsFEJ7bAkAzNoTgDj56CGqGQIrHQ==
x-ms-office365-filtering-correlation-id: 8dc67365-64bd-4b27-13a7-08d68b68c0fb
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605077)(2017052603328)(7153060)(7193020); SRVR:SN6PR11MB3405; 
x-ms-traffictypediagnostic: SN6PR11MB3405:
x-microsoft-antispam-prvs: <SN6PR11MB34058D2F0AFE224A243287FAD86E0@SN6PR11MB3405.namprd11.prod.outlook.com>
x-forefront-prvs: 0939529DE2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(396003)(346002)(136003)(376002)(366004)(189003)(199004)(186003)(66574012)(2420400007)(606006)(110136005)(229853002)(446003)(236005)(6306002)(46003)(316002)(55016002)(11346002)(476003)(25786009)(54896002)(9686003)(86362001)(6436002)(76176011)(7696005)(71190400001)(14454004)(71200400001)(478600001)(97736004)(7736002)(8676002)(14444005)(6246003)(486006)(15650500001)(7110500001)(966005)(53936002)(99286004)(790700001)(6116002)(8936002)(74316002)(106356001)(6506007)(81156014)(81166006)(105586002)(102836004)(68736007)(53546011)(4326008)(2906002)(6666004)(33656002)(10710500007)(256004); DIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR11MB3405; H:SN6PR11MB3471.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ZrOnO6LFzYfuTittqMTQ6F4FW7hngNR3OS90qVwnSi3gvOAz70q+zrSj/O9JAr8Mir3Dh4D/AgjxgqMLlOMyIuDvzn3Te07GkluaMDEPDcElqlVnLICQBYTj4S6p9dwqiOQb3su6q4mlxehBr22/hLLgZspw6oPzFmkziOdrrdb7Hq0VRrFlXgzK6bB0XDXdl37+2KCSvu0wTWkkpBCP1PV5kX5IjEi7O3YjL+Vs7I95N0zgBHIGoppBQlVsC0xKbs3v1snN658oxFo36/ggarppkvUDTJ4GKl0sxW4nNH+p/rcx4a2klj/uXa4iz41FWuaQQzhYkhcqhUNCUkHqXuseXSMbJ3B5MJs3HZD5OaHfBN/HrzaKp7h8Ufpdkb+vpgjmJOmeU0UwXs/xVwJuqSqb6d4X4IpjhQRR6Jwj5DQ=
Content-Type: multipart/alternative; boundary="_000_SN6PR11MB347140FE3032D19E7F202331D86E0SN6PR11MB3471namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8dc67365-64bd-4b27-13a7-08d68b68c0fb
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Feb 2019 12:52:14.8432 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR11MB3405
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.23, xch-rcd-013.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/M6TDtyFDnKNxEX2EVKNb7zgy0zU>
Subject: Re: [Roll] Security Considerations for useofrplinfo draft
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Feb 2019 12:52:24 -0000

--_000_SN6PR11MB347140FE3032D19E7F202331D86E0SN6PR11MB3471namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGVsbG8gSW5lcw0KDQpQbGVhc2Ugc2VlIGJlbG93Og0KDQpJIHVzZWQNCg0KICAqICAgVG8gbWFr
ZSBteSBjb21tZW50cw0KDQoNCkFsbCB0aGUgYmVzdCwNCg0KUGFzY2FsDQoNCkZyb206IEluZXMg
Um9ibGVzIDxtYXJpYWluZXNyb2JsZXNAZ29vZ2xlbWFpbC5jb20+DQpTZW50OiBtZXJjcmVkaSAz
MCBqYW52aWVyIDIwMTkgMjE6NTUNClRvOiByb2xsIDxyb2xsQGlldGYub3JnPg0KQ2M6IE1pY2hh
ZWwgUmljaGFyZHNvbiA8bWNyK2lldGZAc2FuZGVsbWFuLmNhPjsgUGFzY2FsIFRodWJlcnQgKHB0
aHViZXJ0KSA8cHRodWJlcnRAY2lzY28uY29tPg0KU3ViamVjdDogU2VjdXJpdHkgQ29uc2lkZXJh
dGlvbnMgZm9yIHVzZW9mcnBsaW5mbyBkcmFmdA0KDQpEZWFyIGFsbCwNCg0KUGxlYXNlLCB3ZSB3
b3VsZCBsaWtlIHRvIGhhdmUgeW91ciBvcGluaW9uIHRvIGFkZHJlc3MgdGhlIGZvbGxvd2luZyBt
YWpvciBjb21tZW50cy9xdWVzdGlvbnM6DQoNClRpY2tldDogMTkxIGh0dHBzOi8vdHJhYy5pZXRm
Lm9yZy90cmFjL3JvbGwvdGlja2V0LzE5MQ0KDQoiTm9kZXMgd2l0aGluIHRoZSBMTE4gY2FuIHVz
ZSB0aGUgSVB2Ni1pbi1JUHY2IG1lY2hhbmlzbSB0byBtb3VudCBhbg0KICAgYXR0YWNrIG9uIGFu
b3RoZXIgcGFydCBvZiB0aGUgTExOLCB3aGlsZSBkaXNndWlzaW5nIHRoZSBvcmlnaW4gb2YgdGhl
DQogICBhdHRhY2suICBUaGUgbWVjaGFuaXNtIGNhbiBldmVuIGJlIGFidXNlZCB0byBtYWtlIGl0
IGFwcGVhciB0aGF0IHRoZQ0KICAgYXR0YWNrIGlzIGNvbWluZyBmcm9tIG91dHNpZGUgdGhlIExM
TiwgYW5kIHVubGVzcyBjb3VudGVyZWQsIHRoaXMNCiAgIGNvdWxkIGJlIHVzZWQgdG8gbW91bnQg
YSBEaXN0cmlidXRlZCBEZW5pYWwgT2YgU2VydmljZSBhdHRhY2sgdXBvbiBub2RlcyBlbHNld2hl
cmUgaW4gdGhlIEludGVybmV0LiAgU2VlIFtERE9TLUtSRUJTXSBmb3IgYW4gZXhhbXBsZSBvZg0K
ICAgc3VjaCBhdHRhY2tzIGFscmVhZHkgc2VlbiBpbiB0aGUgcmVhbCB3b3JsZC4iDQoNCiAgIFtt
YWpvcl0gSXMgdGhlcmUgYW55IHBvc3NpYmxlIG1pdGlnYXRpb24gdG8gdGhpcyBpbnNpZGUtdGhl
LUxMTiBhdHRhY2s/DQogICBXb3VsZCBhdXRoZW50aWNhdGlvbiBoZWxwIC0tIGlzIGl0IGV2ZW4g
cG9zc2libGU/DQoNCg0KDQogICogICBUaGVyZSBpcyBhbiBMMiBhdXRoZW50aWNhdGlvbiBpbiBt
b3N0IGFueSBjYXNlcy4gQnV0IGlmIGEgcm9ndWUgbWFuYWdlcyB0byBnZXQgaW4gdGhlbiBtYW55
IGF0dGFja3MgYXJlIHBvc3NpYmxlIOKAkyB0aGVyZSBpcyBubyB6ZXJvIHRydXN0LiBUaGlzIGlz
IGp1c3Qgb25lLiBBbm90aGVyIGlzIHNlbmRpbmcgREFPcyBvbiBiZWhhbGYgb2YgdGhlIGRldmlj
ZS4NCiAgKiAgIFdoYXQgY2FuIGJlIGRvbmUgdG8gYWxsZXZpYXRlIHRoaXMgcGFydGljdWxhciBh
dHRhY2sgaXMgU0FWSSwgdXNpbmcgUkZDIDg1MDUgKyBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0
bWwvZHJhZnQtaWV0Zi02bG8tYXAtbmQuIFRoZSByb2d1ZSB3aWxsIG5vdCBiZSBhYmxlIHRvIHNv
dXJjZSB3aXRoIGFuIGFkZHJlc3MgdGhhdCBpcyBub3QgcmVnaXN0ZXJlZCwgYW5kIHRoZSByZWdp
c3RyYXRpb24gY2hlY2tzIGZvciB0b3BvbG9naWNhbCBjb3JyZWN0bmVzcy4NCg0KDQpUaWNrZXQg
MTkyOiBodHRwczovL3RyYWMuaWV0Zi5vcmcvdHJhYy9yb2xsL3RpY2tldC8xOTINCg0KICAgIiBC
bG9ja2luZyBvciBjYXJlZnVsIGZpbHRlcmluZyBvZiBJUHY2LWluLUlQdjYgdHJhZmZpYyBlbnRl
cmluZyB0aGUNCiAgIExMTiBhcyBkZXNjcmliZWQgYWJvdmUgd2lsbCBtYWtlIHN1cmUgdGhhdCBh
bnkgYXR0YWNrIHRoYXQgaXMgbW91bnRlZA0KICAgbXVzdCBvcmlnaW5hdGUgZnJvbSBjb21wcm9t
aXNlZCBub2RlcyB3aXRoaW4gdGhlIExMTi4gIFRoZSB1c2Ugb2YNCiAgIEJDUDM4IGZpbHRlcmlu
ZyBhdCB0aGUgUlBMIHJvb3Qgb24gZWdyZXNzIHRyYWZmaWMgd2lsbCBib3RoIGFsZXJ0IHRoZQ0K
ICAgb3BlcmF0b3IgdG8gdGhlIGV4aXN0ZW5jZSBvZiB0aGUgYXR0YWNrLCBhcyB3ZWxsIGFzIGRy
b3AgdGhlIGF0dGFjaw0KICAgdHJhZmZpYy4gIEFzIHRoZSBSUEwgbmV0d29yayBpcyB0eXBpY2Fs
bHkgbnVtYmVyZWQgZnJvbSBhIHNpbmdsZQ0KICAgcHJlZml4LCB3aGljaCBpcyBpdHNlbGYgYXNz
aWduZWQgYnkgUlBMLCBCQ1AzOCBmaWx0ZXJpbmcgaW52b2x2ZXMgYQ0KICAgc2luZ2xlIHByZWZp
eCBjb21wYXJpc29uIGFuZCBzaG91bGQgYmUgdHJpdmlhbCB0byBhdXRvbWF0aWNhbGx5DQogICBj
b25maWd1cmUuIg0KDQogICBbbWFqb3JdIEJDUDM4IHdpbGwgc3RvcCBhbiBhdHRhY2ssIGJ1dCBv
bmx5IGlmIHRoZSBzb3VyY2UgYWRkcmVzc2VzIGFyZSBzcG9vZmVkLiAgV2hhdCBpZiB0aGV5J3Jl
IG5vdD8gIEdpdmVuIHRoYXQgdGhlIGF0dGFjayBtYXkgYmUgaGlkZGVuLCBhbmQgYXNzdW1pbmcg
dGhhdCBub2RlcyBhcmUgY29tcHJvbWlzZWQgYWNyb3NzIG11bHRpcGxlIExMTnMsIGFuIGF0dGFj
a2VyIG1heSBub3QgY2FyZSBlbm91Z2ggdG8gc3Bvb2YgdGhlIG9yaWdpbnMuDQoNCg0KICAqICAg
U2FtZSBhbnN3ZXIgYXMgYWJvdmUgZm9yIGFuIGF0dGFjayBvcmlnaW5hdGVkIGluc2lkZSB0aGUg
bmV0d29yay4gRm9yIGFuIGF0dGFjayBvcmlnaW5hdGVkIG91dHNpZGUsIElQIGluIElQIGNhbiBi
ZSB1c2VkIHRvIGhpZGUgaW5uZXIgcm91dGluZyBoZWFkZXJzLCBidXQgUkgzIGlzIHByb3RlY3Rl
ZCBieSBpdHMgZGVmaW5pdGlvbi4gT3RoZXJ3aXNlLCBlLmcuLCBEb1MsIElQIGluIElQIHNlZW1z
IG9mIGxpdHRsZSB2YWx1ZS4NCg0KICAgVGlja2V0IDE5MzogaHR0cHM6Ly90cmFjLmlldGYub3Jn
L3RyYWMvcm9sbC90aWNrZXQvMTkzDQoNCiAgICJUaGUgUkgzIGhlYWRlciB1c2FnZSBkZXNjcmli
ZWQgaGVyZSBjYW4gYmUgYWJ1c2VkIGluIGVxdWl2YWxlbnQgd2F5cw0KICAgd2l0aCBhbiBJUHY2
LWluLUlQdjYgaGVhZGVyIHRvIGFkZCB0aGUgbmVlZGVkIFJIMyBoZWFkZXIuICBBcyBzdWNoLA0K
ICAgdGhlIGF0dGFja2VyJ3MgUkgzIGhlYWRlciB3aWxsIG5vdCBiZSBzZWVuIGJ5IHRoZSBuZXR3
b3JrIHVudGlsIGl0DQogICByZWFjaGVzIHRoZSBlbmQgaG9zdCwgd2hpY2ggd2lsbCBkZWNhcHN1
bGF0ZSBpdC4gIEFuIGVuZC1ob3N0IFNIT1VMRA0KICAgYmUgc3VzcGljaW91cyBhYm91dCBhIFJI
MyBoZWFkZXIgd2hpY2ggaGFzIGFkZGl0aW9uYWwgaG9wcyB3aGljaCBoYXZlDQogICBub3QgeWV0
IGJlZW4gcHJvY2Vzc2VkLCBhbmQgU0hPVUxEIGlnbm9yZSBzdWNoIGEgc2Vjb25kIFJIMyBoZWFk
ZXIuIg0KDQogICBbbWFqb3JdIFdoYXQgZG9lcyAiU0hPVUxEIGJlIHN1c3BpY2lvdXMiIG1lYW4/
ICBIb3cgaXMgdGhhdCBhIE5vcm1hdGl2ZSBiZWhhdmlvcj8gIFdvdWxkIGJlaW5nIHN1c3BpY2lv
dXMgaW5jbHVkZSBkcm9wcGluZyB0aGUgcGFja2V0IG9yIHNvbWUgb3RoZXIgc2ltaWxhciBhY3Rp
b24/ICBXaGVuIHdvdWxkIHRoZSByb3V0ZXIgKm5vdCogYmUgc3VzcGljaW91cz8gIFdoeSBpcyB0
aGF0IG5vdCBhICJNVVNUIj8NCg0KICAgVGhlIHByZXNlbmNlIG9mIHRoZSBzZWNvbmQgUkgzIG1l
YW5zIHRoYXQgdGhlcmUgaXMgYSBjb25maWd1cmF0aW9uIG1pc3Rha2Ugc29tZXdoZXJlIGVsc2Ug
aW4gdGhlIG5ldHdvcmsuICBJdCB3b3VsZCBiZSByZWFzb25hYmxlIHRvIGluY3JlbWVudCBhIGNv
dW50ZXIgaW4gYSBNSUIgKGlmIHdlIGhhZCBhIE1JQikgd2hlbiB0aGlzIG9jY3Vycy4gIEJhc2Vk
IHVwb24gdGhlIFBvc3RlbCBkb2N0cmluZSwgaWdub3JpbmcgdGhlIGV4dHJhIGhlYWRlciAobm90
IGFjdGluZyBvbiBpdCksIGlzIHRoZSBiZXN0IHBvbGljeS4gQW4gUkgzIGhlYWRlciB3YXMgbm90
IGNvbXBsZXRlbHkgY29uc3VtZWQgaXMgZGlzY3Vzc2VkIGluIFJGQw0KDQogICBodHRwczovL3Rv
b2xzLmlldGYub3JnL2h0bWwvcmZjNjU1NCNzZWN0aW9uLTQuMiBzYXlzIHRoYXQgYW4gUkgzIGhl
YWRlciB3aXRoIGFkZGl0aW9uYWwg4oCcbm9uLXplcm8gU2VnbWVudHMgTGVmdCB2YWx1ZSwgaWYg
dGhlIElQdjYgRGVzdGluYXRpb24gQWRkcmVzcyBpcyBub3Qgb24tbGlua+KAnSBzaG91bGQgYmUg
ZHJvcHBlZC4gIEluIHRoaXMgY2FzZSwgdGhlIFJIMyBoZWFkZXIgaXMgKmluc2lkZSogdGhlIG91
dGVyIElQdjYtaW4tSVB2NiBoZWFkZXIsIHdoaWNoIGhhcyB0aGVuIGJlZW4gZm9yd2FyZGVkLg0K
ICAgV2UgdGhpbmsgdGhhdCB0aGlzIGhlYWRlciBzaG91bGQgc2ltcGx5IGJlIGlnbm9yZWQgaW4g
cHJvY2Vzc2luZyB0aGUgcGFja2V0LiAgVG8gZG8gb3RoZXJ3aXNlIChzdWNoIGFzIGZvcndhcmRp
bmcpIHdvdWxkIHBlcm1pdCBleHRlcm5hbCBhdHRhY2tlcnMgdG8gc2VuZCB0cmFmZmljIHRoYXQg
YXBwZWFycyB0byBvcmlnaW5hdGUgaW5zaWRlIHRoZSBMTE4uDQoNCg0KICAqICAgVGhlIHJ1bGUg
b2YgUkgzIG9ubHkgYWxsb3dzIHN0cmljdCBzb3VyY2Ugcm91dGUgb3BlcmF0aW9uLiBUaGlzIGlz
IHRydWUgZXZlbiBpZiBhbiBJUCBpbiBJUCBoaWRlcyBhbiBpbm5lciBSSDMuIFRoaXMgZG9lcyBu
b3QgY29uc3RpdHV0ZSBhIGJyZWFjaC4gTm90ZSB0aGF0IElQIGluIElQIGluIElQIGluIElQIGNv
dWxkIGJlIGEgYnJlYWNoIHRoYXQgcmVwcm9kdWNlcyB0aGUgcHJvYmxlbSBvZiBhIFJIMC4gQnV0
IHRoZW4sIHRoYXQgaXMgZ2VuZXJhbCB0byBhbGwgSVB2NiBhbmQgbm90IHNwZWNpZmljIHRvIHRo
aXMgZG9jdW1lbnQNCg0KDQoNCiAgIFRoYW5rIHlvdSB2ZXJ5IG11Y2ggaW4gYWR2YW5jZSwNCg0K
VGhlIGF1dGhvcnMuDQo=

--_000_SN6PR11MB347140FE3032D19E7F202331D86E0SN6PR11MB3471namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_SN6PR11MB347140FE3032D19E7F202331D86E0SN6PR11MB3471namp_--


From nobody Thu Feb  7 09:10:45 2019
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 208451292F1 for <roll@ietfa.amsl.com>; Thu,  7 Feb 2019 09:10:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.3
X-Spam-Level: 
X-Spam-Status: No, score=-2.3 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BGWh9NuaQ-nM for <roll@ietfa.amsl.com>; Thu,  7 Feb 2019 09:10:41 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38CF5129284 for <roll@ietf.org>; Thu,  7 Feb 2019 09:10:41 -0800 (PST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id B5CE438273 for <roll@ietf.org>; Thu,  7 Feb 2019 12:07:40 -0500 (EST)
Received: by sandelman.ca (Postfix, from userid 179) id 236D92305; Thu,  7 Feb 2019 12:10:40 -0500 (EST)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 221E022ED for <roll@ietf.org>; Thu,  7 Feb 2019 12:10:40 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: roll@ietf.org
In-Reply-To: <154950770196.32664.11730773031794979398@ietfa.amsl.com>
References: <154950770196.32664.11730773031794979398@ietfa.amsl.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature"
Date: Thu, 07 Feb 2019 12:10:40 -0500
Message-ID: <3876.1549559440@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/GofkRFST5DUE23lDhpqvpyEzC8A>
Subject: Re: [Roll] [6tisch] I-D Action: draft-richardson-6tisch-roll-enrollment-priority-02.txt
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Feb 2019 17:10:43 -0000

--=-=-=
Content-Type: text/plain


internet-drafts@ietf.org wrote:
    > A New Internet-Draft is available from the on-line Internet-Drafts directories.
    > This draft is a work item of the IPv6 over the TSCH mode of IEEE 802.15.4e WG of the IETF.

    > Title           : Enabling secure network enrollment in RPL networks
    > Author          : Michael Richardson
    > Filename        : draft-richardson-6tisch-roll-enrollment-priority-02.txt
    > Pages           : 6
    > Date            : 2019-02-06

    > Abstract:
    > [I-D.richardson-6tisch-enrollment-enhanced-beacon] defines a method
    > by which a potential [I-D.ietf-6tisch-minimal-security] can announce
    > itself as a available for new Pledges to Join a network.  The
    > announcement includes a priority for join.  This document provides a
    > mechanism by which a RPL DODAG root can disable join announcements,
    > or adjust the base priority for join operation.

I have refreshed this document: no changes.

We discussed this a year and a half, I think, and again at the London IETF101
meeting.  There was general support in the room for providing something like
this, and is it generally non-invasive.

But, there has been very little discussion on the mailing list.
The IANA considerations make it easier to do as a WG document.
6tisch has a document that needs to reference this.

Would the WG care to consider adopting it?

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAlxcZo8ACgkQgItw+93Q
3WVA9Qf/dpRcgIytfw7Q+ogWXMpdE5j2ZPpLOw5LvbpvObNtYS7s/G89FWtQNX5r
lGaG7/3FBl8pZh+jfKtKxb3fG3ky6yXJtL6RaR8bFUF/AHSSt1bxwOmpWskyTfPe
pzh04ASdnPaYMW05qHkr1a7gXdRgDLwyLfVATuAeSyvcb5l4iDnJZUU1GImdEYPL
CCokLgYlX8hPPW+vbiF44einFtMR9zrR4IZKrU2mCFhXw6LkCt/bOUFksA6h7E/i
EKbN8Nss0+eoyb4kB1wp/sWJ/PgrdqLxSnkFE6qugk931c41UhhtzRn2juDqraZ6
m7M+eDUVabFVXTWtO5InYli3y6hTBA==
=M4Wo
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Thu Feb  7 21:21:00 2019
Return-Path: <rahul.jadhav@huawei.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D702129BBF; Thu,  7 Feb 2019 21:20:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ecSBcjrsf57v; Thu,  7 Feb 2019 21:20:48 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46A81124C04; Thu,  7 Feb 2019 21:20:48 -0800 (PST)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 06848CC7283DCF244500; Fri,  8 Feb 2019 05:20:46 +0000 (GMT)
Received: from BLREML406-HUB.china.huawei.com (10.20.4.43) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 8 Feb 2019 05:20:45 +0000
Received: from BLREML503-MBX.china.huawei.com ([169.254.9.233]) by BLREML406-HUB.china.huawei.com ([10.20.4.43]) with mapi id 14.03.0415.000; Fri, 8 Feb 2019 10:50:34 +0530
From: Rahul Arvind Jadhav <rahul.jadhav@huawei.com>
To: Routing Over Low power and Lossy networks <roll@ietf.org>
CC: "lwip@ietf.org" <lwip@ietf.org>
Thread-Topic: [Roll] [6tisch] I-D Action: draft-richardson-6tisch-roll-enrollment-priority-02.txt
Thread-Index: AQHUvo+3dwiX7GghXUazn6HjEMQlQaXUNscAgAEkB+A=
Date: Fri, 8 Feb 2019 05:20:34 +0000
Message-ID: <982B626E107E334DBE601D979F31785C5DD98665@BLREML503-MBX.china.huawei.com>
References: <154950770196.32664.11730773031794979398@ietfa.amsl.com> <3876.1549559440@localhost>
In-Reply-To: <3876.1549559440@localhost>
Accept-Language: en-IN, zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.18.157.44]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/yafYg0-TTwWTJm9VgxtSl67ubDc>
Subject: Re: [Roll] [6tisch] I-D Action: draft-richardson-6tisch-roll-enrollment-priority-02.txt
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Feb 2019 05:20:51 -0000

<CCing LWIG>>

Hello Michael,

The min-priority information from 6LRs/6LBRs is an important field.
In our experiments, we found that without such a mechanism it won't be poss=
ible to even form a stable network with limited memory in dense deployments=
.
We have a draft in LWIG (https://datatracker.ietf.org/doc/draft-ietf-lwig-n=
br-mgmt-policy/) which talks about managing neighbor cache entries effectiv=
ely with dense deployments and limited memory. Section 2.5.2. in the draft =
explains the need for such a field in the DIO message.
In the last LWIG session I had explained the need for this field in DIO mes=
sages (and quoted your draft) in my presentation.
This time we will be providing performance data in LWIG for this draft and =
the implementation already has min-priority (-like) field in the DIO.

Regards,
Rahul

> -----Original Message-----
> From: Roll [mailto:roll-bounces@ietf.org] On Behalf Of Michael Richardson
> Sent: 07 February 2019 22:41
> To: roll@ietf.org
> Subject: Re: [Roll] [6tisch] I-D Action: draft-richardson-6tisch-roll-enr=
ollment-
> priority-02.txt
>=20
>=20
> internet-drafts@ietf.org wrote:
>     > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>     > This draft is a work item of the IPv6 over the TSCH mode of IEEE 80=
2.15.4e
> WG of the IETF.
>=20
>     > Title           : Enabling secure network enrollment in RPL network=
s
>     > Author          : Michael Richardson
>     > Filename        : draft-richardson-6tisch-roll-enrollment-priority-=
02.txt
>     > Pages           : 6
>     > Date            : 2019-02-06
>=20
> I have refreshed this document: no changes.
>=20
> We discussed this a year and a half, I think, and again at the London IET=
F101
> meeting.  There was general support in the room for providing something
> like this, and is it generally non-invasive.
>=20
> But, there has been very little discussion on the mailing list.
> The IANA considerations make it easier to do as a WG document.
> 6tisch has a document that needs to reference this.
>=20
> Would the WG care to consider adopting it?
>=20
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> -=3D IPv6 IoT consulting =3D-


From nobody Sun Feb 10 10:22:04 2019
Return-Path: <mariainesrobles@googlemail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADF5F1200ED for <roll@ietfa.amsl.com>; Sun, 10 Feb 2019 10:22:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=googlemail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LpGUa2mBtbCh for <roll@ietfa.amsl.com>; Sun, 10 Feb 2019 10:22:00 -0800 (PST)
Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E0F81200D7 for <roll@ietf.org>; Sun, 10 Feb 2019 10:22:00 -0800 (PST)
Received: by mail-ed1-x532.google.com with SMTP id b14so6919061edt.6 for <roll@ietf.org>; Sun, 10 Feb 2019 10:22:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pF3lAaff5UiFug3EeGRmM+z1/1/0XbqcgeM4Jy3///A=; b=G44nwq9hk5rGIpPD5pu/arDFxMTugUDCS/ZxbAtWkKnQYOyc+UDJCCyFRMrNgiA9hk 9YpNqaS+FmGqc8LsIFEpNMb212z8MGYDtfXB0gsUmbk7SSEeS/B+ke3Lbp5HvhhqRzJ/ 33lKnLXXJPyYkuCDDAIcRp44TTiu29p9oKmGhNAMYj8H+feS6PgdvXOj9Zmqsm1lRil9 LPs3HhbJ0KQUeMowAYBYHDf6jMdbGQ56YhBHVkamrNk2T7tpyAVga+DurOaBTi4nXqfy uUl8h6Pb+tkVPxwFH8Kl79a91UTQzTx+LJgTcGSkLJC1gwvJdz1AZH0BiKMZiWF5GRDM v/WQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pF3lAaff5UiFug3EeGRmM+z1/1/0XbqcgeM4Jy3///A=; b=OAkf/q10eIgDjbAUPEMScJEyYVg2b3O7iiTzqygZ7uJ3EWD4utL6fJvizSpWpYJa51 Yxxe0rUXhvFbHHBcFPcAq0ycoVWF8NLuhh6fEhB2/NEWHAgF0WS0V0pGgeydp1ykTXFk McYFz2FnMQjCDo8HAs+S4E+CWE7iPX1Q7UiFXKEn59x+SEMwqKiJwooz8zgTvKG8bBsY 7L3NlKYYhfiMYCnzG1fryIr8EkwZFjTMXAIwOaZwmor3FPlHNTGwKLOS4mLYqTUmkj5F szW3uXTufPfu08nEslvSkTX5QQikcnjgZBYDt6nG9aqdt5J604G05GJ6qc6qxK5sJeL4 9R+w==
X-Gm-Message-State: AHQUAua/ReZRQatwo0HgIHcxVPnXiyMtcqhDx3i5hsRiQ9aTqIMlRCBM Wdzze+dUi0ubInA8VwmK5byGRow91Xwk6fPRORQ=
X-Google-Smtp-Source: AHgI3IZNS4LW7oYUiOtTChxuj4zt+KMT1d8/bWm3A8HHQUaUXQOSfvodfDhShf3bPQosI0NYQ/iv8vkyoe+/T1h0FKc=
X-Received: by 2002:a17:906:4344:: with SMTP id z4mr23859191ejm.27.1549822918312;  Sun, 10 Feb 2019 10:21:58 -0800 (PST)
MIME-Version: 1.0
References: <CAP+sJUeGoYDwJ=RHs80Og6WszT3=OTk_Ohfy9BuzKwubZxW4TQ@mail.gmail.com> <SN6PR11MB347140FE3032D19E7F202331D86E0@SN6PR11MB3471.namprd11.prod.outlook.com>
In-Reply-To: <SN6PR11MB347140FE3032D19E7F202331D86E0@SN6PR11MB3471.namprd11.prod.outlook.com>
From: Ines  Robles <mariainesrobles@googlemail.com>
Date: Sun, 10 Feb 2019 20:21:46 +0200
Message-ID: <CAP+sJUeDXt+8=pmW8+cLAQn76KBjibnmsnuPnC_x9ds4oKuvYQ@mail.gmail.com>
To: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
Cc: roll <roll@ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>
Content-Type: multipart/alternative; boundary="00000000000082caaa05818e44f0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/U9tGpWUpEKlOULYY7iOq7LYHHBs>
Subject: Re: [Roll] Security Considerations for useofrplinfo draft
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Feb 2019 18:22:04 -0000

--00000000000082caaa05818e44f0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thank you very much Pascal

On Tue, Feb 5, 2019 at 2:52 PM Pascal Thubert (pthubert) <pthubert@cisco.co=
m>
wrote:

> Hello Ines
>
>
>
> Please see below:
>
>
>
> I used
>
>    - To make my comments
>
>
>
> All the best,
>
>
>
> Pascal
>
>
>
> *From:* Ines Robles <mariainesrobles@googlemail.com>
> *Sent:* mercredi 30 janvier 2019 21:55
> *To:* roll <roll@ietf.org>
> *Cc:* Michael Richardson <mcr+ietf@sandelman.ca>; Pascal Thubert
> (pthubert) <pthubert@cisco.com>
> *Subject:* Security Considerations for useofrplinfo draft
>
>
>
> Dear all,
>
>
>
> Please, we would like to have your opinion to address the following major
> comments/questions:
>
>
>
> Ticket: 191 https://trac.ietf.org/trac/roll/ticket/191
>
>
>
> "Nodes within the LLN can use the IPv6-in-IPv6 mechanism to mount an
>
>    attack on another part of the LLN, while disguising the origin of the
>
>    attack.  The mechanism can even be abused to make it appear that the
>
>    attack is coming from outside the LLN, and unless countered, this
>
>    could be used to mount a Distributed Denial Of Service attack upon
> nodes elsewhere in the Internet.  See [DDOS-KREBS] for an example of
>
>    such attacks already seen in the real world."
>
>
>
>    [major] Is there any possible mitigation to this inside-the-LLN
> attack?
>
>    Would authentication help -- is it even possible?
>
>
>
>
>
>    - There is an L2 authentication in most any cases. But if a rogue
>    manages to get in then many attacks are possible =E2=80=93 there is no=
 zero trust.
>    This is just one. Another is sending DAOs on behalf of the device.
>    - What can be done to alleviate this particular attack is SAVI, using
>    RFC 8505 + https://tools.ietf.org/html/draft-ietf-6lo-ap-nd. The rogue
>    will not be able to source with an address that is not registered, and=
 the
>    registration checks for topological correctness.
>
>
>
>
>
> Ticket 192: https://trac.ietf.org/trac/roll/ticket/192
>
>
>
>    " Blocking or careful filtering of IPv6-in-IPv6 traffic entering the
>
>    LLN as described above will make sure that any attack that is mounted
>
>    must originate from compromised nodes within the LLN.  The use of
>
>    BCP38 filtering at the RPL root on egress traffic will both alert the
>
>    operator to the existence of the attack, as well as drop the attack
>
>    traffic.  As the RPL network is typically numbered from a single
>
>    prefix, which is itself assigned by RPL, BCP38 filtering involves a
>
>    single prefix comparison and should be trivial to automatically
>
>    configure."
>
>
>
>    [major] BCP38 will stop an attack, but only if the source addresses ar=
e
> spoofed.  What if they're not?  Given that the attack may be hidden, and
> assuming that nodes are compromised across multiple LLNs, an attacker may
> not care enough to spoof the origins.
>
>
>
>    - Same answer as above for an attack originated inside the network.
>    For an attack originated outside, IP in IP can be used to hide inner
>    routing headers, but RH3 is protected by its definition. Otherwise, e.=
g.,
>    DoS, IP in IP seems of little value.
>
>
>
>    Ticket 193: https://trac.ietf.org/trac/roll/ticket/193
>
>
>
>    "The RH3 header usage described here can be abused in equivalent ways
>
>    with an IPv6-in-IPv6 header to add the needed RH3 header.  As such,
>
>    the attacker's RH3 header will not be seen by the network until it
>
>    reaches the end host, which will decapsulate it.  An end-host SHOULD
>
>    be suspicious about a RH3 header which has additional hops which have
>
>    not yet been processed, and SHOULD ignore such a second RH3 header."
>
>
>
>    [major] What does "SHOULD be suspicious" mean?  How is that a Normativ=
e
> behavior?  Would being suspicious include dropping the packet or some oth=
er
> similar action?  When would the router *not* be suspicious?  Why is that
> not a "MUST"?
>
>
>
>    The presence of the second RH3 means that there is a configuration
> mistake somewhere else in the network.  It would be reasonable to increme=
nt
> a counter in a MIB (if we had a MIB) when this occurs.  Based upon the
> Postel doctrine, ignoring the extra header (not acting on it), is the bes=
t
> policy. An RH3 header was not completely consumed is discussed in RFC
>
>
>
>    https://tools.ietf.org/html/rfc6554#section-4.2 says that an RH3
> header with additional =E2=80=9Cnon-zero Segments Left value, if the IPv6
> Destination Address is not on-link=E2=80=9D should be dropped.  In this c=
ase, the
> RH3 header is *inside* the outer IPv6-in-IPv6 header, which has then been
> forwarded.
>
>    We think that this header should simply be ignored in processing the
> packet.  To do otherwise (such as forwarding) would permit external
> attackers to send traffic that appears to originate inside the LLN.
>
>
>
>    - The rule of RH3 only allows strict source route operation. This is
>    true even if an IP in IP hides an inner RH3. This does not constitute =
a
>    breach. Note that IP in IP in IP in IP could be a breach that reproduc=
es
>    the problem of a RH0. But then, that is general to all IPv6 and not
>    specific to this document
>
>
>
>
>
>
>
>    Thank you very much in advance,
>
>
>
> The authors.
>

--00000000000082caaa05818e44f0
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thank you very much Pascal</div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Feb 5, 2019 at 2:52 PM P=
ascal Thubert (pthubert) &lt;<a href=3D"mailto:pthubert@cisco.com">pthubert=
@cisco.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">





<div lang=3D"EN-US">
<div class=3D"gmail-m_702113599660576221WordSection1">
<p class=3D"MsoNormal">Hello Ines<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Please see below:<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">I used <u></u><u></u></p>
<ul style=3D"margin-top:0cm" type=3D"disc">
<li class=3D"gmail-m_702113599660576221MsoListParagraph" style=3D"margin-le=
ft:0cm">To make my comments<u></u><u></u></li></ul>
<p class=3D"gmail-m_702113599660576221MsoListParagraph"><u></u>=C2=A0<u></u=
></p>
<p class=3D"MsoNormal">All the best,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Pascal<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><b>From:</b> Ines Robles &lt;<a href=3D"mailto:maria=
inesrobles@googlemail.com" target=3D"_blank">mariainesrobles@googlemail.com=
</a>&gt; <br>
<b>Sent:</b> mercredi 30 janvier 2019 21:55<br>
<b>To:</b> roll &lt;<a href=3D"mailto:roll@ietf.org" target=3D"_blank">roll=
@ietf.org</a>&gt;<br>
<b>Cc:</b> Michael Richardson &lt;<a href=3D"mailto:mcr%2Bietf@sandelman.ca=
" target=3D"_blank">mcr+ietf@sandelman.ca</a>&gt;; Pascal Thubert (pthubert=
) &lt;<a href=3D"mailto:pthubert@cisco.com" target=3D"_blank">pthubert@cisc=
o.com</a>&gt;<br>
<b>Subject:</b> Security Considerations for useofrplinfo draft<u></u><u></u=
></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<div>
<p class=3D"MsoNormal">Dear all,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Please, we would like to have your opinion to addres=
s the following major comments/questions:<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Ticket: 191 <a href=3D"https://trac.ietf.org/trac/ro=
ll/ticket/191" target=3D"_blank">
https://trac.ietf.org/trac/roll/ticket/191</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&quot;Nodes within the LLN can use the IPv6-in-IPv6 =
mechanism to mount an<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0attack on another part of the LLN, whil=
e disguising the origin of the<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0attack.=C2=A0 The mechanism can even be=
 abused to make it appear that the<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0attack is coming from outside the LLN, =
and unless countered, this<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0could be used to mount a Distributed De=
nial Of Service attack upon nodes elsewhere in the Internet.=C2=A0 See [DDO=
S-KREBS] for an example of<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0such attacks already seen in the real w=
orld.&quot;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0[major] Is there any possible mitigatio=
n to this inside-the-LLN attack?=C2=A0=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0Would authentication help -- is it even=
 possible?=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<ul style=3D"margin-top:0cm" type=3D"disc">
<li class=3D"gmail-m_702113599660576221MsoListParagraph" style=3D"margin-le=
ft:0cm">There is an L2 authentication in most any cases. But if a rogue man=
ages to get in then many attacks are possible =E2=80=93 there is no zero tr=
ust. This is just one. Another is sending DAOs
 on behalf of the device.<u></u><u></u></li><li class=3D"gmail-m_7021135996=
60576221MsoListParagraph" style=3D"margin-left:0cm">What can be done to all=
eviate this particular attack is SAVI, using RFC 8505 +
<a href=3D"https://tools.ietf.org/html/draft-ietf-6lo-ap-nd" target=3D"_bla=
nk">https://tools.ietf.org/html/draft-ietf-6lo-ap-nd</a>. The rogue will no=
t be able to source with an address that is not registered, and the registr=
ation checks for topological correctness.<u></u><u></u></li></ul>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Ticket 192: <a href=3D"https://trac.ietf.org/trac/ro=
ll/ticket/192" target=3D"_blank">
https://trac.ietf.org/trac/roll/ticket/192</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0&quot; Blocking or careful filtering of=
 IPv6-in-IPv6 traffic entering the<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0LLN as described above will make sure t=
hat any attack that is mounted<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0must originate from compromised nodes w=
ithin the LLN.=C2=A0 The use of<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0BCP38 filtering at the RPL root on egre=
ss traffic will both alert the<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0operator to the existence of the attack=
, as well as drop the attack<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0traffic.=C2=A0 As the RPL network is ty=
pically numbered from a single<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0prefix, which is itself assigned by RPL=
, BCP38 filtering involves a<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0single prefix comparison and should be =
trivial to automatically<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0configure.&quot;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0[major] BCP38 will stop an attack, but =
only if the source addresses are spoofed.=C2=A0 What if they&#39;re not?=C2=
=A0 Given that the attack may be hidden, and assuming that nodes are compro=
mised across multiple LLNs, an attacker may not care enough
 to spoof the origins.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<ul style=3D"margin-top:0cm" type=3D"disc">
<li class=3D"gmail-m_702113599660576221MsoListParagraph" style=3D"margin-le=
ft:0cm">Same answer as above for an attack originated inside the network. F=
or an attack originated outside, IP in IP can be used to hide inner routing=
 headers, but RH3 is protected by its
 definition. Otherwise, e.g., DoS, IP in IP seems of little value.<u></u><u=
></u></li></ul>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0Ticket 193: <a href=3D"https://trac.iet=
f.org/trac/roll/ticket/193" target=3D"_blank">
https://trac.ietf.org/trac/roll/ticket/193</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0&quot;The RH3 header usage described he=
re can be abused in equivalent ways<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0with an IPv6-in-IPv6 header to add the =
needed RH3 header.=C2=A0 As such,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0the attacker&#39;s RH3 header will not =
be seen by the network until it<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0reaches the end host, which will decaps=
ulate it.=C2=A0 An end-host SHOULD<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0be suspicious about a RH3 header which =
has additional hops which have<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0not yet been processed, and SHOULD igno=
re such a second RH3 header.&quot;<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0[major] What does &quot;SHOULD be suspi=
cious&quot; mean?=C2=A0 How is that a Normative behavior?=C2=A0 Would being=
 suspicious include dropping the packet or some other similar action?=C2=A0=
 When would the router *not* be suspicious?=C2=A0 Why is that not a &quot;M=
UST&quot;?<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0The presence of the second RH3 means th=
at there is a configuration mistake somewhere else in the network.=C2=A0 It=
 would be reasonable to increment a counter in a MIB (if we had a MIB) when=
 this occurs.=C2=A0 Based upon the Postel doctrine, ignoring
 the extra header (not acting on it), is the best policy. An RH3 header was=
 not completely consumed is discussed in RFC<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
rfc6554#section-4.2" target=3D"_blank">https://tools.ietf.org/html/rfc6554#=
section-4.2</a> says that an RH3 header with additional =E2=80=9Cnon-zero S=
egments Left value, if the IPv6 Destination Address is not on-link=E2=80=9D=
 should
 be dropped.=C2=A0 In this case, the RH3 header is *inside* the outer IPv6-=
in-IPv6 header, which has then been forwarded.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0We think that this header should simply=
 be ignored in processing the packet.=C2=A0 To do otherwise (such as forwar=
ding) would permit external attackers to send traffic that appears to origi=
nate inside the LLN.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<ul style=3D"margin-top:0cm" type=3D"disc">
<li class=3D"gmail-m_702113599660576221MsoListParagraph" style=3D"margin-le=
ft:0cm">The rule of RH3 only allows strict source route operation. This is =
true even if an IP in IP hides an inner RH3. This does not constitute a bre=
ach. Note that IP in IP in IP in IP could
 be a breach that reproduces the problem of a RH0. But then, that is genera=
l to all IPv6 and not specific to this document<u></u><u></u></li></ul>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0 =C2=A0Thank you very much in advance,<u></u><=
u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">The authors.<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>

</blockquote></div>

--00000000000082caaa05818e44f0--


From nobody Wed Feb 13 09:31:43 2019
Return-Path: <rahul.ietf@gmail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EE0D130E69 for <roll@ietfa.amsl.com>; Wed, 13 Feb 2019 09:31:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JNt3x_W8T-E2 for <roll@ietfa.amsl.com>; Wed, 13 Feb 2019 09:31:39 -0800 (PST)
Received: from mail-vs1-xe2e.google.com (mail-vs1-xe2e.google.com [IPv6:2607:f8b0:4864:20::e2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92F38130E63 for <roll@ietf.org>; Wed, 13 Feb 2019 09:31:39 -0800 (PST)
Received: by mail-vs1-xe2e.google.com with SMTP id n10so1864036vso.13 for <roll@ietf.org>; Wed, 13 Feb 2019 09:31:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=SwZsS8P5kWJqTXe198/xGzUsfnvRyeyt84vfE7ZcPrw=; b=qGd/jwjz67f6gHzcwYqbXNRolSfNp6WlFjWatQBB++5u0EirOKTjIDc+NMmQNsPYph j/zPGC/V1D11faUWLOWQnLYi6e6mhRaXhlyVLya+7fJzhNDWOQm1j9wf2Sffz8sHeInI EOaNSxQ2y9mXcqFRfiIoYnAnzdrnLGkrYWaHkYAZW3EoAxQDW5+3LuoC2qXlY7BqHJy8 GN0awARtXvAksvac4JRP9MmawOT/N9jUiiQZDdFxX9cR6eMf5z06cdUkCCdubWBvP8JK 2oEm+NvwNOYxhoA/0Me0pkiy/RcafxEnrZUeCHBl9xRrb6KDlq/IwNsa6IhlQ/v3Zdyx oHHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=SwZsS8P5kWJqTXe198/xGzUsfnvRyeyt84vfE7ZcPrw=; b=adw+QcyTDiU1wNMP/WevqGYHbFBcBHbcaZauJzC3/vR+r4SbfHd9q7aFlz1cb3QqV4 fsW5pqfJKVROvY26iLE/9F5CNcMxDUOVrBehDhx30BCW7dIcNNPTnOzDryTXwd2sfKwN 0gwJimeNjvV1Iv+zthagSRNf5R/7VMFkLfqoz9ZWjA8m+T0vhVfxUElQwR/ob3Oj/Axz jjXgWgdQ7kHHI3Ey+rJ5TU0O76GDREjU56wt40kVkL0APSpdrqDQeg4i8cXCVjqMU0gS B3eYnqvX27PUz5JyzfFTZ17cBc78iwLRvb679U2S4q9rV7rY7+AnKUnTny25Yr2Zz5ta v/Eg==
X-Gm-Message-State: AHQUAuYCLKkGW7668lQSHromWE5QtH5UUebyvfP3HFot+OhOE1We0oYb gcLy3aGbMHMAkuqBd+Mze2YahhDuikMlVNSRJCflxQ==
X-Google-Smtp-Source: AHgI3IZNTxqDu3Yvswen4+SkxlGdExcX0iMJ4GmuGEnvlwxmcN8YZEXWx+2F0vXJ++qXorcjx5fKdmqOPcE44Gv6x4w=
X-Received: by 2002:a67:fbcb:: with SMTP id o11mr729942vsr.208.1550079098278;  Wed, 13 Feb 2019 09:31:38 -0800 (PST)
MIME-Version: 1.0
References: <154987668307.18701.9610331444184480351.idtracker@ietfa.amsl.com>
In-Reply-To: <154987668307.18701.9610331444184480351.idtracker@ietfa.amsl.com>
From: Rahul Jadhav <rahul.ietf@gmail.com>
Date: Wed, 13 Feb 2019 23:01:27 +0530
Message-ID: <CAO0Djp3+tf+jvquiTvDdBVWbx+V5Ovkss5oK4oSuZbhnQxVHMQ@mail.gmail.com>
To: Routing Over Low power and Lossy networks <roll@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000006d6550581c9ea6c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/ZXIcKlfJeMqEaOvWIvcfBcu80sg>
Subject: [Roll] Fwd: New Version Notification for draft-rahul-roll-mop-ext-00.txt
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2019 17:31:42 -0000

--00000000000006d6550581c9ea6c
Content-Type: text/plain; charset="UTF-8"

Hello All,

We have uploaded an ID which talks about extending the MOP and adding
capabilities.

Any feedback will be helpful and appreciated.

Thanks,
Rahul



---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Mon, 11 Feb 2019 at 2:48 PM
Subject: New Version Notification for draft-rahul-roll-mop-ext-00.txt
To: Pascal Thubert <pthubert@cisco.com>, Rahul Arvind Jadhav <
rahul.ietf@gmail.com>



A new version of I-D, draft-rahul-roll-mop-ext-00.txt
has been successfully submitted by Rahul Arvind Jadhav and posted to the
IETF repository.

Name:           draft-rahul-roll-mop-ext
Revision:       00
Title:          RPL Mode of Operation extension
Document date:  2019-02-11
Group:          Individual Submission
Pages:          7
URL:
https://www.ietf.org/internet-drafts/draft-rahul-roll-mop-ext-00.txt
Status:         https://datatracker.ietf.org/doc/draft-rahul-roll-mop-ext/
Htmlized:       https://tools.ietf.org/html/draft-rahul-roll-mop-ext-00
Htmlized:
https://datatracker.ietf.org/doc/html/draft-rahul-roll-mop-ext


Abstract:
   RPL allows different mode of operations which allows nodes to have a
   consensus on the basic primitives that must be supported to join the
   network.  The MOP field in RFC6550 is of 3 bits and is fast
   depleting.  This document extends the MOP field specification and
   adds a notion of capabilities using which the nodes can further
   advertise their support for, possibly optional, capabilities.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

--00000000000006d6550581c9ea6c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div><div><div dir=3D"auto">Hello All,</div></div><div dir=3D"auto"><br></d=
iv><div dir=3D"auto">We have uploaded an ID which talks about extending the=
 MOP and adding capabilities.</div></div><div dir=3D"auto"><br></div><div d=
ir=3D"auto">Any feedback will be helpful and appreciated.</div><div dir=3D"=
auto"><br></div><div dir=3D"auto">Thanks,</div><div dir=3D"auto">Rahul</div=
><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div><div><br><div=
 class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">---------- For=
warded message ---------<br>From: <span dir=3D"ltr">&lt;<a href=3D"mailto:i=
nternet-drafts@ietf.org" target=3D"_blank">internet-drafts@ietf.org</a>&gt;=
</span><br>Date: Mon, 11 Feb 2019 at 2:48 PM<br>Subject: New Version Notifi=
cation for draft-rahul-roll-mop-ext-00.txt<br>To: Pascal Thubert &lt;<a hre=
f=3D"mailto:pthubert@cisco.com" target=3D"_blank">pthubert@cisco.com</a>&gt=
;, Rahul Arvind Jadhav &lt;<a href=3D"mailto:rahul.ietf@gmail.com" target=
=3D"_blank">rahul.ietf@gmail.com</a>&gt;<br></div><br><br><br>
A new version of I-D, draft-rahul-roll-mop-ext-00.txt<br>
has been successfully submitted by Rahul Arvind Jadhav and posted to the<br=
>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-rahul-roll-mop-ext<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A000<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 RPL Mode of Operation extension<br=
>
Document date:=C2=A0 2019-02-11<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Individual Submission<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 7<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-rahul-roll-mop-ext-00.txt" rel=3D"noreferrer" targ=
et=3D"_blank">https://www.ietf.org/internet-drafts/draft-rahul-roll-mop-ext=
-00.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-rahul-roll-mop-ext/" rel=3D"noreferrer" target=3D"_blank">h=
ttps://datatracker.ietf.org/doc/draft-rahul-roll-mop-ext/</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-rahul-roll-mop-ext-00" rel=3D"noreferrer" target=3D"_blank">https://t=
ools.ietf.org/html/draft-rahul-roll-mop-ext-00</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-rahul-roll-mop-ext" rel=3D"noreferrer" target=3D"_blank">ht=
tps://datatracker.ietf.org/doc/html/draft-rahul-roll-mop-ext</a><br>
<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0RPL allows different mode of operations which allows nodes to =
have a<br>
=C2=A0 =C2=A0consensus on the basic primitives that must be supported to jo=
in the<br>
=C2=A0 =C2=A0network.=C2=A0 The MOP field in RFC6550 is of 3 bits and is fa=
st<br>
=C2=A0 =C2=A0depleting.=C2=A0 This document extends the MOP field specifica=
tion and<br>
=C2=A0 =C2=A0adds a notion of capabilities using which the nodes can furthe=
r<br>
=C2=A0 =C2=A0advertise their support for, possibly optional, capabilities.<=
br>
<br>
<br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
The IETF Secretariat<br>
<br>
</div></div>
</div>

--00000000000006d6550581c9ea6c--


From nobody Fri Feb 22 21:01:00 2019
Return-Path: <cabo@tzi.org>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6343128B33; Fri, 22 Feb 2019 21:00:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CW6QleSaNiOx; Fri, 22 Feb 2019 21:00:44 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFFD9130EE8; Fri, 22 Feb 2019 21:00:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost2.informatik.uni-bremen.de [IPv6:2001:638:708:30c8:406a:91ff:fe74:f2b7]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id x1N50ZLp022316; Sat, 23 Feb 2019 06:00:40 +0100 (CET)
Received: from [192.168.217.106] (p54A6C2FE.dip0.t-ipconnect.de [84.166.194.254]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 445wyC00pnz1Bpf; Sat, 23 Feb 2019 06:00:34 +0100 (CET)
From: Carsten Bormann <cabo@tzi.org>
Content-Type: text/plain; charset=utf-8
X-Mao-Original-Outgoing-Id: 572590832.4569269-c2728d1d2d722b7bc8d2673fc200117c
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Sat, 23 Feb 2019 06:00:34 +0100
Message-Id: <1498DCB5-CFA9-418E-A9AA-213D5A06D7DF@tzi.org>
To: 6lo@ietf.org, tisch <6tisch@ietf.org>, lp-wan <lp-wan@ietf.org>, lwip@ietf.org, Routing Over Low power and Lossy networks <roll@ietf.org>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/l-rsvG5acth9ysiq9l3M-nBv9VE>
Subject: [Roll] Constrained Node/Network Cluster @ IETF104: DRAFT AGENDA
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Feb 2019 05:00:47 -0000

Here is my usual eclectic condensed agenda based on the DRAFT AGENDA
for IETF104.  Remember that there is still quite some potential for
changes.

cose/teep and lpwan/t2trg are some annoying conflicts that meet the eye.
I also don't like that I'll have to miss the cacao BOF (vs. core),
dinrg/suit, coinrg/git.

All times are CET (Central European Time) =3D=3D UTC +1 hours.  Note =
that
there is no daylight saving time in effect at the time in Europe (this
starts on the Sunday *after* IETF).  (You can get pure UTC times on
https://datatracker.ietf.org/meeting/agenda-utc, for those who want to
listen from remote.)

Gr=C3=BC=C3=9Fe, Carsten

SATURDAY/SUNDAY, March 23/24. 2019
-- Hackathon (including various interops) (Grand Hilton Ballroom)
-- Sun 1700-1900  Welcome Reception - Congress Hall 1/2
-- Sun 1800-2000  Hot RFC Lightning Talks - Congress Hall 3

MONDAY, March 25, 2019

0900-1100  Morning Session I
Congress H 3	ART	dispatch	Dispatch WG - Joint with ARTAREA
Congress H 2	INT	6man	IPv6 Maintenance WG
Congress H 1	IRTF	pearg	Privacy Enhancements and Assessments =
Proposed Research Group
Karlin 3	RTG	bier	Bit Indexed Explicit Replication WG

1120-1220  Morning Session II
Congress H 1	INT ***	6tisch	IPv6 over the TSCH mode of IEEE =
802.15.4e WG
Congress H 2	SEC	tls	Transport Layer Security WG
Karlin 1/2	TSV	rmcat	RTP Media Congestion Avoidance =
Techniques WG

1350-1550  Afternoon Session I
Karlin 1/2	INT ***	6lo	IPv6 over Networks of =
Resource-constrained Nodes WG
Congress H 2	IRTF	irtfopen	IRTF Open Meeting
Congress H 3	SEC	secdispatch	Security Dispatch WG

1610-1810  Afternoon Session II
Congress H 2	ART	httpbis	Hypertext Transfer Protocol WG
Congress H 3	IAB	smart	Stopping Malware and Researching Threats
Karlin 1/2	INT	dnssd	Extensions for Scalable DNS Service =
Discovery WG
Berlin/Brussels	IRTF	qirg	Quantum Internet Proposed Research Group
Karlin 3	RTG ***	roll	Routing Over Low power and Lossy =
networks WG
Athens/Barcel.	SEC	oauth	Web Authorization Protocol WG
Congress H 1	TSV	tsvwg	Transport Area Working Group WG

TUESDAY, March 26, 2019

0900-1100  Morning Session I
Karlin 3	ART	uta	Using TLS in Applications WG - 1000 - =
1100
Karlin 1/2	INT	homenet	Home Networking WG
Congress H 3	RTG	rtgarea	Routing Area Open Meeting
Berlin/Brussels	SEC ***	cose	CBOR Object Signing and Encryption WG
Grand Hilton BR	SEC ***	teep	Trusted Execution Environment =
Provisioning WG
Congress H 2	TSV	quic	QUIC WG

1120-1220  Morning Session II
Berlin/Brussels	INT ***	lwig	Light-Weight Implementation Guidance WG
Congress H 1	IRTF	qirg	Quantum Internet Proposed Research Group
Athens/Barcel.	RTG	bier	Bit Indexed Explicit Replication WG
Congress H 3	TSV	tsvwg	Transport Area Working Group WG

1350-1550  Afternoon Session I
Berlin/Brussels	ART ***	core	Constrained RESTful Environments WG
Congress H 3	OPS	anima	Autonomic Networking Integrated Model =
and Approach WG
Congress H 2	SEC	mls	Messaging Layer Security WG
Grand Hilton BR	TSV	tsvarea	Transport Area Open Meeting

1610-1810  Afternoon Session II
Congress H 1	INT ***	lpwan	IPv6 over Low Power Wide-Area Networks =
WG
Congress H 3	IRTF***	t2trg	Thing-to-Thing
Congress H 2	SEC	tls	Transport Layer Security WG

WEDNESDAY, March 27, 2019

0900-1100  Morning Session I
Karlin 1/2	IRTF***	dinrg	Decentralized Internet Infrastructure
Congress H 3	RTG	detnet	Deterministic Networking WG
Berlin/Brussels	RTG	rift	Routing In Fat Trees WG
Grand Hilton BR	SEC ***	suit	Software Updates for Internet of Things =
WG
Congress H 2	TSV	quic	QUIC WG

1120-1320  Morning Session II
Grand Hilton BR	IRTF	cfrg	Crypto Forum  - 12:20 - 13:20
Grand Hilton BR	SEC	acme	Automated Certificate Management =
Environment WG - 11:20 - 12:20

1500-1700  Afternoon Session I
Grand Hilton BR	OPS	wgtlgo	Technology Deep Dive - Modern Router =
Architecture BOF

THURSDAY, March 28, 2019

0900-1030  Morning Session I
Karlin 3	ART ***	cbor	Concise Binary Object Representation =
Maintenance and Extensions WG
Congress H 3	IRTF	panrg	Path Aware Networking RG
Athens/Barcel.	RTG	babel	Babel routing protocol WG
Congress H 1	SEC	mls	Messaging Layer Security WG
Berlin/Brussels	SEC	oauth	Web Authorization Protocol WG

1050-1220  Morning Session II
Congress H 3	GEN	git	GitHub Integration and Tooling WG
Congress H 1	IRTF	coinrg	Computing in the Network
Congress H 2	IRTF	maprg	Measurement and Analysis for Protocols

1350-1550  Afternoon Session I
Congress H 1	INT	intarea	Internet Area Working Group WG
Grand Hilton BR	SEC ***	rats	Remote ATtestation ProcedureS BOF

1610-1810  Afternoon Session II
Grand Hilton BR	ART	httpbis	Hypertext Transfer Protocol WG
Karlin 1/2	INT ***	paw	Predictable and Available Wireless BOF
Berlin/Brussels	OPS	v6ops	IPv6 Operations WG
Congress H 2	SEC	saag	Security Area Open Meeting

FRIDAY, March 29, 2019

0900-1030  Morning Session I
Congress H 3	ART ***	core	Constrained RESTful Environments WG
Grand Hilton BR	INT	6man	IPv6 Maintenance WG
Berlin/Brussels	SEC	cacao	Collaborative Automated Course of Action =
Operations for Cyber Security BOF

1050-1250  Morning Session II
Athens/Barcel.	INT	ipwave	IP Wireless Access in Vehicular =
Environments WG
Congress H 1	IRTF	icnrg	Information-Centric Networking
Grand Hilton BR	SEC ***	ace	Authentication and Authorization for =
Constrained Environments WG
Karlin 1/2	TSV	taps	Transport Services WG


From nobody Sun Feb 24 09:41:19 2019
Return-Path: <rahul.ietf@gmail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3B2112958B for <roll@ietfa.amsl.com>; Sun, 24 Feb 2019 09:41:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yxaiYw-Apm-P for <roll@ietfa.amsl.com>; Sun, 24 Feb 2019 09:41:15 -0800 (PST)
Received: from mail-vk1-xa35.google.com (mail-vk1-xa35.google.com [IPv6:2607:f8b0:4864:20::a35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90A1512941A for <roll@ietf.org>; Sun, 24 Feb 2019 09:41:15 -0800 (PST)
Received: by mail-vk1-xa35.google.com with SMTP id e131so1591580vkf.10 for <roll@ietf.org>; Sun, 24 Feb 2019 09:41:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=Z2VPKCUsj2ET8idzJGwaeQ2goPKRq7/0PcekV5z8hFs=; b=pvATcBA7qeqsr5TSXUrAKHKSuxQHJ1Quwk+PYM91JGKNVU2FWJI/JCB+A1rA6DUDaR V7abOE1H4myZjFUwvQcujjwAuQI3iUETm2dVNWce45P1hu+fvOQw2EznxlqfB2Aidbma +N/jJgxEZ+5ebanzMcYh0mNm+hsgyv/FvJXjl9rrJHGn3grYZdhdwlKhYMJMYPKdqeFm dm9XR9XbuEY+mAp6HtyZt6XFuQ/J5YSjnAcd621R/R+O5rJR7d8T0rXpXhm5RLR7eJS+ rYFngym4seSKALe4kqEdnxxQzKFHvl7bWUttPtYiN/fsW7NUamNnXsra4c25AXkAQ9Cg ShJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=Z2VPKCUsj2ET8idzJGwaeQ2goPKRq7/0PcekV5z8hFs=; b=de2e+oYNqDpvztgDnM7T+GiE/773M6p7VcnmM1hNL+4Wwem1dKOiTtJuVUso9KmS6f vdnPa0crPz8Po+Q/SIA+PFMeMJXrDu3s1JD35aV32e4kBN5j0FPellk4CMIZTx8HH7c6 uBnkxsr/8TI7Lq8thXnnGOTEv+YWhQnGLXQiI8TyQx1heaofzs9SIli1GGhIxyIeV9ku Ut87cWNmrraHiZnmB41I4IJI8vWPxra7aa5QluX5XltEFK/TeEwKK09Dl5aZytPBTNkf shA9M+btcKafWGuIcc78byZsLk7wwuRNigC1NOXgHHtYUFGvmHmtOjitPh+u/q4T2fgn APdA==
X-Gm-Message-State: AHQUAuZ2PrLDW8G7MuM5LL7GGNr90uj3rfgURenXsyHEinbMOs+X48mN EzoT1sb2scWD+4bMjs7/1uE14prTlfqiUGL+bCqW4DcJ
X-Google-Smtp-Source: AHgI3IZkixv4451MR597Etmyw6wQwlru9GhyDUX1a1blnJxZllvTLB5nBF0ucfkuOu2t0Djz8r6dvPUix86Re6KEcf4=
X-Received: by 2002:a1f:2acb:: with SMTP id q194mr7210085vkq.92.1551030074032;  Sun, 24 Feb 2019 09:41:14 -0800 (PST)
MIME-Version: 1.0
From: Rahul Jadhav <rahul.ietf@gmail.com>
Date: Sun, 24 Feb 2019 23:11:02 +0530
Message-ID: <CAO0Djp2c8wgsNhvDatscMdsh8hUTUkU0x3s_q50nNk6tiA-gjA@mail.gmail.com>
To: Routing Over Low power and Lossy networks <roll@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/Av_HnMYEtY_FRHN0JVDrPEUYOFI>
Subject: [Roll] ROLL-NSA extension for PRE
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Feb 2019 17:41:18 -0000

Hello All,

Following is my review of draft-ietf-roll-nsa-extension-00:

PRE could be an interesting technique that can be applied to subset of
traffic which is critical or requires low-latency. The draft talks
about extending NSA to send the node's parent-set in the DIO such that
the receiving child node could use this information to choose the
alternate paths appropriately.

1. Section 3 talks about three policies for alternative parent
selection. As i understand different nodes could use any of the
policies (strict, medium, relaxed) without having to worry about
interop. Also it will be optimum to choose strict policy followed by
medium and relaxed respectively. Is this correct?

2. Regarding compression, i didnt find a dispatch-like bit identifying
whether the PS addresses are compressed or not. Isn't it required for
the recipient to know whether the PS is compressed?

3. Most of the text is 6tisch specific and specifically says 6tisch
nodes whilst explaining the technique. I believe the technique is
generically applicable to non-6tisch scenarios as well. True?

4. I think a section on reparenting is needed. How would the child
node behave when its parent is reparenting? During reparenting, the
parent might send its updated DIO with its new parent set. The
implications of using CA strict policy in this case might result in
child choosing a different AP which certainly is not desirable if the
parent still has connectivity to its old parent and the reparenting is
done based on metric changes.

5. I am wondering if it is possible to attach a field "such as
min-priority [1]" field which is a derivative of the metric
calculation in context to every parent in the parent-set. This greatly
helps the child nodes in deciding the CA policy to use even though as
I understand that the parent-set is already attached in NSA in the
decreasing preference order.

Regards,
Rahul

[1] draft-richardson-6tisch-roll-enrollment-priority-01


From nobody Wed Feb 27 08:20:18 2019
Return-Path: <mariainesrobles@googlemail.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7083513101E for <roll@ietfa.amsl.com>; Wed, 27 Feb 2019 08:20:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=googlemail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nj0qf4r4_O-X for <roll@ietfa.amsl.com>; Wed, 27 Feb 2019 08:20:14 -0800 (PST)
Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com [IPv6:2a00:1450:4864:20::52c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A529D131000 for <roll@ietf.org>; Wed, 27 Feb 2019 08:20:13 -0800 (PST)
Received: by mail-ed1-x52c.google.com with SMTP id g9so14405686eds.3 for <roll@ietf.org>; Wed, 27 Feb 2019 08:20:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=47NZOKWutfIvmOFgbBYEQlhk7Zg5Wm7b/46bll9pQu0=; b=FNh3CJGpTROIdBBfLJOc6xTnQ8V/kh5th0ml6skpWgiTcvH6jJuDKwn4tPkmF4djfZ 2+6xwk6n6z74rYpjLMUfdO1WnKQK+jrQHkAZutZ/AceguIizxsuDVAQbxPdUjlAyA8cP KBmpODXnk+9J/YPJhyvKaFrOwxKfOLAcQlXvYIvP3sHSI1vud0wCA25wROLyUp3Wh70P EPuqQ9vX/0wO7Z4B5gWRYn0UijO9vSHSw5lT0UfQ1LbElX+p+PKSGr0OVUR1jBSA/uv2 BGSgok79iTZq1vz2gp00602/r/b/mrtt7SsZWJW7JuXkyhdefxm22cF6qoaQWZV7v8cG 3ZSQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=47NZOKWutfIvmOFgbBYEQlhk7Zg5Wm7b/46bll9pQu0=; b=Lt65Ec8H1F6eHK1dmnP79q9Yw+69+ZvoJtHc2r+2XK0Qj/muf9nJHRrehbMyWUDYFX 10e+w31mqaBPHl0S2OUvLlYy1wXK7nsNsugwKnWYKElWklSJjuSJIvylGyV2RWUVTaQc SMKVRXuzAulnjOu/b4frAhnni1U3sYQvrPTn8sKG6UTx/nASzCdL2IvPyDPYLWWNx6bn qjHkgoMn8U2O6ZEQwdGHImPlFt2J/1yQJU5Tp4aYlha3nsfQul3Gf81waLXJcjSJORBH +DKDnqS/XqLTdTG+THUiAaqVlsi1QB02LZW3RrwY/I4ijZDjOVczqtv8SpT7Y/vLp77m 20Aw==
X-Gm-Message-State: AHQUAuYPfHs5LE1m8S0THXQuJcXLi1KoTsvSpcDN63/5Ul44Q5m5GIb2 KlAcDty7TasNz+HdCF3siSnow6dClHONZ2gsaqJssXRg
X-Google-Smtp-Source: AHgI3Ib/zgZ3XcAAkzA5mi5NpZly24pCCcBwWrhSEinhFLTFgYENrbAoAi4COIYr2hfWij/7/jFbIulIc9gWDQQNCKg=
X-Received: by 2002:a50:87dc:: with SMTP id 28mr2951044edz.168.1551284411223;  Wed, 27 Feb 2019 08:20:11 -0800 (PST)
MIME-Version: 1.0
From: Ines  Robles <mariainesrobles@googlemail.com>
Date: Wed, 27 Feb 2019 18:19:59 +0200
Message-ID: <CAP+sJUdHSwrXMDkh1QpBWhW4HKEKvaPNQvXU8T-FU=1wQeQAGg@mail.gmail.com>
To: roll <roll@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000046d3b00582e28c08"
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/NBdgOA0twtGhVQpoZh9AUv2Gahk>
Subject: [Roll] IETF 104 - topics to present
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Feb 2019 16:20:17 -0000

--00000000000046d3b00582e28c08
Content-Type: text/plain; charset="UTF-8"

Dear all,

Please let us know if you wish to present a topic at the IETF 104,
specifying:

- Topic To present
- Time needed for presentation
- Presenter - please clarify onsite or remote-.

Deadline to request the slot: 8th March.

The preliminary agenda states for ROLL: 16:10-18:10 Monday Afternoon
session II

Thank you,

Ines and Peter

--00000000000046d3b00582e28c08
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Dear all,<br><div><br></div><div>Please l=
et us know if you wish to present a topic at the IETF 104, specifying:</div=
><div><br></div><div>- Topic To present</div><div>- Time needed for present=
ation</div><div>- Presenter - please clarify onsite or remote-.</div><div><=
br></div><div>Deadline to request the slot: 8th March.</div><div><br></div>=
<div>The preliminary agenda states for ROLL: 16:10-18:10 Monday Afternoon s=
ession II</div><div><br></div><div>Thank you,</div><div><br></div><div>Ines=
 and Peter</div><div><br></div></div></div>

--00000000000046d3b00582e28c08--

