ROLL Working Group M. Robles
Internet-Draft Ericsson
Updates: 6550 (if approved) M. Richardson
Intended status: Standards Track SSW
Expires: October 5, 2017 P. Thubert
Cisco
April 3, 2017

When to use RFC 6553, 6554 and IPv6-in-IPv6
draft-ietf-roll-useofrplinfo-13

Abstract

This document looks at different data flows through LLN (Low-Power and Lossy Networks) where RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is used to establish routing. The document enumerates the cases where RFC 6553, RFC 6554 and IPv6-in-IPv6 encapsulation is required. This analysis provides the basis on which to design efficient compression of these headers.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on October 5, 2017.

Copyright Notice

Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) [RFC6550] is a routing protocol for constrained networks. RFC 6553 [RFC6553] defines the "RPL option" (RPI), carried within the IPv6 Hop-by-Hop header to quickly identify inconsistencies (loops) in the routing topology. RFC 6554 [RFC6554] defines the "RPL Source Route Header" (RH3), an IPv6 Extension Header to deliver datagrams within a RPL routing domain, particularly in non-storing mode.

These various items are referred to as RPL artifacts, and they are seen on all of the data-plane traffic that occurs in RPL routed networks; they do not in general appear on the RPL control plane traffic at all which is mostly hop-by-hop traffic (one exception being DAO messages in non-storing mode).

It has become clear from attempts to do multi-vendor interoperability, and from a desire to compress as many of the above artifacts as possible that not all implementors agree when artifacts are necessary, or when they can be safely omitted, or removed.

An interim meeting went through the 24 cases defined here to discover if there were any shortcuts, and this document is the result of that discussion. This document should not be defining anything new, but it may clarify what is correct and incorrect behaviour.

The related document A Routing Header Dispatch for 6LoWPAN (6LoRH) [I-D.ietf-roll-routing-dispatch] defines a method to compress RPL Option information and Routing Header type 3 [RFC6554], an efficient IP-in-IP technique, and use cases proposed for the [Second6TischPlugtest] involving 6loRH.

The related document updates [RFC6550]. In general, any packet that leaves the RPL domain of an LLN (or leaves the LLN entirely) will NOT be discarded, when it has the [RFC6553] RPL Option Header known as the RPI or [RFC6554] SRH3 Extension Header (S)RH3. Due to changes to [I-D.ietf-6man-rfc2460bis] the RPI Hop-by-Hop option MAY be left in place even if the end host does not understand it.

2. Terminology and Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

Terminology defined in [RFC7102] applies to this document: LBR, LLN, RPL, RPL Domain and ROLL.

RPL-node: It is device which implements RPL, thus we can say that the device is RPL-capable or RPL-aware. Please note that the device can be found inside the LLN or outside LLN. In this document a RPL-node which is a leaf of a DODAG is called RPL-aware-leaf.

RPL-not-capable: It is device which do not implement RPL, thus we can say that the device is not-RPL-aware. Please note that the device can be found inside the LLN. In this document a not-RPL-node which is a leaf of a DODAG is called not-RPL-aware-leaf.

2.1. hop-by-hop IPv6-in-IPv6 headers

The term "hop-by-hop IPv6-in-IPv6" header refers to: adding a header that originates from a node to an adjacent node, using the addresses (usually the GUA or ULA, but could use the link-local addresses) of each node. If the packet must traverse multiple hops, then it must be decapsulated at each hop, and then re-encapsulated again in a similar fashion.

3. Sample/reference topology

A RPL network is composed of a 6LBR (6LoWPAN Border Router), Backbone Router (6BBR), 6LR (6LoWPAN Router) and 6LN (6LoWPAN Node) as leaf logically organized in a DODAG structure (Destination Oriented Directed Acyclic Graph).

RPL defines the RPL Control messages (control plane), a new ICMPv6 [RFC4443] message with Type 155. DIS (DODAG Information Solicitation), DIO (DODAG Information Object) and DAO (Destination Advertisement Object) messages are all RPL Control messages but with different Code values. A RPL Stack is showed in Figure 1.

RPL supports two modes of Downward traffic: in storing mode (RPL-SM), it is fully stateful or an in non-storing (RPL-NSM), it is fully source routed. A RPL Instance is either fully storing or fully non-storing, i.e. a RPL Instance with a combination of storing and non-storing nodes is not supported with the current specifications at the time of writing this document.

+--------------+
| Upper Layers |
|              |
+--------------+
|   RPL        |
|              |
+--------------+
|   ICMPv6     |
|              |
+--------------+
|   IPv6       |
|              |
+--------------+
|   6LoWPAN    |
|              |
+--------------+
|   PHY-MAC    |
|              |
+--------------+


                

Figure 1: RPL Stack.


                                 +---------+
                             +---+Internet |
                             |   +---------+
                             |
                        +----+--+
                        | DODAG |  node:01
              +---------+ Root  +----------+
              |         | 6LBR  |          |
              |         +----+--+          |
              |              |             |
              |              |             |
             ...            ...           ...
              |              |             |
        +-----+-+         +--+---+      +--+---+
        |6LR    |         |      |      |      |
  +-----+       |         |      |      |      |
  |     |   11  |         |   12 |      |   13 +------+
  |     +-----+-+         +-+----+      +-+----+      |
  |           |             |             |           |
  |           |             |             |           |
  | 21        | 22          | 23          | 24        | 25
+-+---+     +-+---+      +--+--+       +- --+     +---+-+
|Leaf |     |     |      |     |       |Leaf|     |Leaf |
| 6LN |     |     |      |     |       | 6LN|     | 6LN |
+-----+     +-----+      +-----+       +----+     +-----+

                

Figure 2: A reference RPL Topology.

Figure 2 shows the reference RPL Topology for this document. The numbers in or above the nodes are there so that they may be referenced in subsequent sections. In the figure, a 6LN can be a router or a host. The 6LN leafs marked as (21) is a RPL host that does not have forwarding capability and (25) is a RPL router. The leaf marked 6LN (24) is a device which does not speak RPL at all (not-RPL-aware), but uses Router-Advertisements, 6LowPAN DAR/DAC and efficient-ND only to participate in the network [RFC6775]. In the document this leaf (24) is often named IPv6 node. The 6LBR in the figure is the root of the Global DODAG.

This document is in part motivated by the work that is ongoing at the 6TiSCH working group. The 6TiSCH architecture [I-D.ietf-6tisch-architecture] draft explains the network architecture of a 6TiSCH network.

4. Use cases

In data plane context a combination of RFC6553, RFC6554 and IPv6-in-IPv6 encapsulation is going to be analyzed for the following traffic flows.

This version of the document assumes the changes in [I-D.ietf-6man-rfc2460bis] are passed (at the time to write this specification, the draft is on version 05).

The uses cases describe the communication between RPL-aware-nodes, with the root (6LBR), and with Internet. This document also describe the communication between nodes acting as leaf that does not understand RPL and they are part of hte LLN. We name these nodes as not-RPL-aware-leaf.(e.g. section 5.4- Flow from not-RPL-aware-leaf to root) We describe also how is the communication inside of the LLN when it has the final destination addressed outside of the LLN e.g. with destination to Internet. (e.g. section 5.7- Flow from not-RPL-aware-leaf to Internet)

The uses cases comprise as follow:

  • RPL-aware-leaf to root
  • root to RPL-aware-leaf
  • not-RPL-aware-leaf to root
  • root to not-RPL-aware-leaf
  • RPL-aware-leaf to Internet
  • Internet to RPL-aware-leaf
  • not-RPL-aware-leaf to Internet
  • Internet to not-RPL-aware-leaf
  • RPL-aware-leaf to RPL-aware-leaf (storing and non-storing)
  • RPL-aware-leaf to not-RPL-aware-leaf (non-storing)
  • not-RPL-aware-leaf to RPL-aware-leaf (storing and non-storing)
  • not-RPL-aware-leaf to not-RPL-aware-leaf (non-storing)

This document assumes the rule that a Header cannot be inserted or removed on the fly inside an IPv6 packet that is being routed. This is a fundamental precept of the IPv6 architecture as outlined in [RFC2460]. Extensions may not be added or removed except by the sender or the receiver.

But, options in the Hop-by-Hop option which are marked with option type 01 ([RFC2460] section 4.2 and [I-D.ietf-6man-rfc2460bis]) SHOULD be ignored when received by a host or router which does not understand that option.

This means that in general, any packet that leaves the RPL domain of an LLN (or leaves the LLN entirely) will NOT be discarded, when it has the [RFC6553] RPL Option Header known as the RPI or [RFC6554] SRH3 Extension Header (S)RH3.

The recent change to the second of these rules means that the RPI Hop-by-Hop option MAY be left in place even if the end host does not understand it.

NOTE: There is some possible security risk when the RPI information is released to the Internet. At this point this is a theoretical situation. It is clear that the RPI option would waste some network bandwidth when it escapes.

An intermediate router that needs to add an extension header (SHR3 or RPI Option) must encapsulate the packet in an (additional) outer IP header. The new header can be placed is placed after this new outer IP header.

A corollory is that an SHR3 or RPI Option can only be removed by an intermediate router if it is placed in an encapsulating IPv6 Header, which is addressed to the intermediate router. When it does so, the whole encapsulating header must be removed. (A replacement may be added). This sometimes can result in outer IP headers being addressed to the next hop router using link-local addresses.

Both RPI and RH3 headers may be modified in very specific ways by routers on the path of the packet without the need to add to remove an encapsulating header. Both headers were designed with this modification in mind, and both the RPL RH and the RPL option are marked mutable but recoverable: so an IPsec AH security header can be applied across these headers, but it can not secure the values which mutate.

RPI should be present in every single RPL data packet. There is one exception in non-storing mode: when a packet is going down from the root. In a downward non-storing mode, the entire route is written, so there can be no loops by construction, nor any confusion about which forwarding table to use (as the root has already made all routing decisions). There still may be cases (such as in 6tisch) where the instanceID portion of the RPI header may still be needed to pick an appropriate priority or channel at each hop.

In the tables present in this document, the term "RPL aware leaf" is has been shortened to "Raf", and "not-RPL aware leaf" has been shortened to "~Raf" to make the table fit in available space.

The earlier examples are more extensive to make sure that the process is clear, while later examples are more concise.

5. Storing mode

In storing mode (fully stateful), the sender cannot determine whether the destination is RPL-capable and thus would need an IP-in-IP header. The IP-in-IP header needs to be addressed on a hop-by-hop basis so that the last 6LR can remove the RPI header. Additionally, The sender can determine if the destination is inside the LLN by looking if the destination address is matched by the DIO's PIO option.

The following table summarizes what headers are needed in the following scenarios, and indicates when the IP-in-IP header must be inserted on a hop-by-hop basis, and when it can target the destination node directly. There are these possible situations: hop-by-hop necessary (indicated by "hop"), or destination address possible (indicated by "dst"). In all cases hop by hop can be used. In cases where no IP-in-IP header is needed, the column is left blank.

In all cases the RPI headers are needed, since it identifies inconsistencies (loops) in the routing topology. In all cases the RH3 is not need because we do not indicate the route in stroing mode.

The leaf can be a router 6LR or a host, both indicated as 6LN (Figure 2).

IP-in-IP encapsulation in Storing mode
Use Case IP-in-IP IP-in-IP dst
Raf to root No --
root to Raf No --
root to ~Raf No --
~Raf to root Yes root
Raf to Int No --
Int to Raf Yes raf
~Raf to Int root raf
~Raf to Int Yes root
Int to ~Raf Yes hop
Raf to Raf No --
Raf to ~Raf No --
~Raf to Raf Yes dst
~Raf to ~Raf Yes hop

5.1. Example of Flow from RPL-aware-leaf to root

In storing mode, RFC 6553 (RPI) is used to send RPL Information instanceID and rank information.

As stated in Section 16.2 of [RFC6550] a RPL-aware-leaf node does not generally issue DIO messages; a leaf node accepts DIO messages from upstream. (When the inconsistency in routing occurs, a leaf node will generate a DIO with an infinite rank, to fix it). It may issue DAO and DIS messages though it generally ignores DAO and DIS messages.

In this case the flow comprises:

RPL-aware-leaf (6LN) --> 6LR_i --> root(6LBR)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LN) to destination (6LBR).

As it was mentioned In this document 6LRs, 6LBR are always full-fledge RPL routers.

The 6LN inserts the RPI header, and sends the packet to 6LR which decrements the rank in RPI and sends the packet up. When the packet arrives at 6LBR, the RPI is removed and the packet is processed.

No IP-in-IP header is required.

The RPI header can be removed by the 6LBR because the packet is addressed to the 6LBR. The 6LN must know that it is communicating with the 6LBR to make use of this scenario. The 6LN can know the address of the 6LBR because it knows the address of the root via the DODAGID in the DIO messages.

Storing: Summary of the use of headers from RPL-aware-leaf to root
Header 6LN 6LR_i 6LBR
Inserted headers RPI -- --
Removed headers -- -- RPI
Re-added headers -- -- --
Modified headers -- RPI --
Untouched headers -- -- --

5.2. Example of Flow from root to RPL-aware-leaf

In this case the flow comprises:

root (6LBR) --> 6LR_i --> RPL-aware-leaf (6LN)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LBR) to destination (6LN).

In this case the 6LBR inserts RPI header and sends the packet down, the 6LR is going to increment the rank in RPI (examines instanceID for multiple tables), the packet is processed in 6LN and RPI removed.

No IP-in-IP header is required.

Storing: Summary of the use of headers from root to RPL-aware-leaf
Header 6LBR 6LR_i 6LN
Inserted headers RPI -- --
Removed headers -- -- RPI
Re-added headers -- -- --
Modified headers -- RPI --
Untouched headers -- -- --

5.3. Example of Flow from root to not-RPL-aware-leaf

In this case the flow comprises:

root (6LBR) --> 6LR_i --> not-RPL-aware-leaf (IPv6)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LBR) to destination (IPv6).

As the RPI extension can be ignored by the not-RPL-aware leaf, this situation is identical to the previous scenario.

Storing: Summary of the use of headers from root to not-RPL-aware-leaf
Header 6LBR 6LR_i IPv6
Inserted headers RPI -- --
Removed headers -- -- --
Re-added headers -- -- --
Modified headers -- RPI --
Untouched headers -- -- RPI (Ignored)

5.4. Example of Flow from not-RPL-aware-leaf to root

In this case the flow comprises:

not-RPL-aware-leaf (IPv6) --> 6LR_1 --> 6LR_i --> root (6LBR)

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from source (IPv6) to destination (6LBR). For example, 6LR_1 (i=1) is the router that receives the packets from the IPv6 node.

When the packet arrives from IPv6 node to 6LR_1, the 6LR_1 will insert a RPI header, encapsuladed in a IPv6-in-IPv6 header. The IPv6-in-IPv6 header can be addressed to the next hop, or to the root. The root removes the header and processes the packet.

Storing: Summary of the use of headers from not-RPL-aware-leaf to root
Header IPv6 6LR_1 6LR_i 6LBR
Inserted headers -- IP-in-IP(RPI) -- --
Removed headers -- -- -- IP-in-IP(RPI)
Re-added headers -- -- -- --
Modified headers -- -- IP-in-IP(RPI) --
Untouched headers -- -- -- --

5.5. Example of Flow from RPL-aware-leaf to Internet

RPL information from RFC 6553 MAY go out to Internet as it will be ignored by nodes which have not been configured to be RPI aware.

In this case the flow comprises:

RPL-aware-leaf (6LN) --> 6LR_i --> root (6LBR) --> Internet

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LN) to 6LBR.

No IP-in-IP header is required.

Note: In this use case we use a node as leaf, but this use case can be also applicable to any RPL-node type (e.g. 6LR)

Storing: Summary of the use of headers from RPL-aware-leaf to Internet
Header 6LN 6LR_i 6LBR Internet
Inserted headers RPI -- -- --
Removed headers -- -- -- --
Re-added headers -- -- -- --
Modified headers -- RPI -- --
Untouched headers -- -- RPI RPI (Ignored)

5.6. Example of Flow from Internet to RPL-aware-leaf

In this case the flow comprises:

Internet --> root (6LBR) --> 6LR_i --> RPL-aware-leaf (6LN)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from 6LBR to destination(6LN).

When the packet arrives from Internet to 6LBR the RPI header is added in a outer IPv6-in-IPv6 header and sent to 6LR, which modifies the rank in the RPI. When the packet arrives at 6LN the RPI header is removed and the packet processed.

Storing: Summary of the use of headers from Internet to RPL-aware-leaf
Header Internet 6LBR 6LR_i 6LN
Inserted headers -- IP-in-IP(RPI) -- --
Removed headers -- -- -- IP-in-IP(RPI)
Re-added headers -- -- -- --
Modified headers -- -- IP-in-IP(RPI) --
Untouched headers -- -- -- --

5.7. Example of Flow from not-RPL-aware-leaf to Internet

In this case the flow comprises:

not-RPL-aware-leaf (IPv6) --> 6LR_1 --> 6LR_i -->root (6LBR) --> Internet

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from source(IPv6) to 6LBR.

The 6LR_1 (i=1) node will add an IP-in-IP(RPI) header addressed either to the root, or hop-by-hop such that the root can remove the RPI header before passing upwards.

The originating node will ideally leave the IPv6 flow label as zero so that the packet can be better compressed through the LLN. The 6LBR will set the flow label of the packet to a non-zero value when sending to the Internet.

Storing: Summary of the use of headers from not-RPL-aware-leaf to Internet
Header IPv6 6LR_1 6LR_i [i=2,..,n]_ 6LBR Internet
Inserted headers -- IP-in-IP(RPI) -- -- --
Removed headers -- -- -- IP-in-IP(RPI) --
Re-added headers -- -- -- -- --
Modified headers -- -- IP-in-IP(RPI) -- --
Untouched headers -- -- -- -- --

5.8. Example of Flow from Internet to non-RPL-aware-leaf

In this case the flow comprises:

Internet --> root (6LBR) --> 6LR_i --> not-RPL-aware-leaf (IPv6)

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from 6LBR to not-RPL-aware-leaf (IPv6). 6LR_i updates the rank in the RPI.

The 6LBR will have to add an RPI header within an IP-in-IP header. The IP-in-IP can be addressed to the not-RPL-aware-leaf, leaving the RPI inside.

The 6LBR MAY set the flow label on the inner IP-in-IP header to zero in order to aid in compression.

Storing: Summary of the use of headers from Internet to non-RPL-aware-leaf
Header Internet 6LBR 6LR_i IPv6
Inserted headers -- IP-in-IP(RPI) -- --
Removed headers -- -- -- --
Re-added headers -- -- -- --
Modified headers -- -- IP-in-IP(RPI) --
Untouched headers -- -- -- RPI (Ignored)

5.9. Example of Flow from RPL-aware-leaf to RPL-aware-leaf

In [RFC6550] RPL allows a simple one-hop optimization for both storing and non-storing networks. A node may send a packet destined to a one-hop neighbor directly to that node. Section 9 in [RFC6550].

In this case the flow comprises:

6LN --> 6LR_ia --> common parent (6LR_x) --> 6LR_id --> 6LN

6LR_ia are the intermediate routers from source to the common parent (6LR_x) In this case, "1 <= ia >= n", n is the number of routers (6LR) that the packet go through from 6LN to the common parent (6LR_x).

6LR_id are the intermediate routers from the common parent (6LR_x) to destination 6LN. In this case, "1 <= id >= m", m is the number of routers (6LR) that the packet go through from the common parent (6LR_x) to destination 6LN.

This case is assumed in the same RPL Domain. In the common parent, the direction of RPI is changed (from increasing to decreasing the rank).

While the 6LR nodes will update the RPI, no node needs to add or remove the RPI, so no IP-in-IP headers are necessary. This may be done regardless of where the destination is, as the included RPI will be ignored by the receiver.

Storing: Summary of the use of headers for RPL-aware-leaf to RPL-aware-leaf
Header 6LN src 6LR_ia 6LR_x (common parent) 6LR_id 6LN dst
Inserted headers RPI -- -- -- --
Removed headers -- -- -- -- RPI
Re-added headers -- -- -- -- --
Modified headers -- RPI RPI RPI --
Untouched headers -- -- -- -- --

5.10. Example of Flow from RPL-aware-leaf to non-RPL-aware-leaf

In this case the flow comprises:

6LN --> 6LR_ia --> common parent (6LR_x) --> 6LR_id --> not-RPL-aware 6LN (IPv6)

6LR_ia are the intermediate routers from source (6LN) to the common parent (6LR_x) In this case, "1 <= ia >= n", n is the number of routers (6LR) that the packet go through from 6LN to the common parent (6LR_x).

6LR_id are the intermediate routers from the common parent (6LR_x) to destination not-RPL-aware 6LN (IPv6). In this case, "1 <= id >= m", m is the number of routers (6LR) that the packet go through from the common parent (6LR_x) to destination 6LN.

This situation is identical to the previous situation Section 5.9

Storing: Summary of the use of headers for RPL-aware-leaf to RPL-aware-leaf
Header 6LN src 6LR_ia 6LR_x(common parent) 6LR_id IPv6
Inserted headers RPI -- -- -- --
Removed headers -- -- -- -- RPI
Re-added headers -- -- -- -- --
Modified headers -- RPI RPI RPI --
Untouched headers -- -- -- -- RPI(Ignored)

5.11. Example of Flow from not-RPL-aware-leaf to RPL-aware-leaf

In this case the flow comprises:

not-RPL-aware 6LN (IPv6) --> 6LR_ia --> common parent (6LR_x) --> 6LR_id --> 6LN

6LR_ia are the intermediate routers from source (not-RPL-aware 6LN (IPv6)) to the common parent (6LR_x) In this case, "1 <= ia >= n", n is the number of routers (6LR) that the packet go through from source to the common parent.

6LR_id are the intermediate routers from the common parent (6LR_x) to destination 6LN. In this case, "1 <= id >= m", m is the number of routers (6LR) that the packet go through from the common parent (6LR_x) to destination 6LN.

The 6LR_ia (ia=1) receives the packet from the the IPv6 node and inserts and the RPI header encapsulated in IPv6-in-IPv6 header. The IP-in-IP header is addressed to the destination 6LN.

Storing: Summary of the use of headers from not-RPL-aware-leaf to RPL-aware-leaf
Header IPv6 6LR_ia common parent (6LRx) 6LR_id 6LN
Inserted headers -- IP-in-IP(RPI) -- -- --
Removed headers -- -- -- -- IP-in-IP(RPI)
Re-added headers -- -- -- -- --
Modified headers -- -- IP-in-IP(RPI) IP-in-IP(RPI) --
Untouched headers -- -- -- -- --

5.12. Example of Flow from not-RPL-aware-leaf to not-RPL-aware-leaf

In this case the flow comprises:

not-RPL-aware 6LN (IPv6 src)--> 6LR_1--> 6LR_ia --> root (6LBR) --> 6LR_id --> not-RPL-aware 6LN (IPv6 dst)

6LR_ia are the intermediate routers from source (not-RPL-aware 6LN (IPv6 src)) to the root (6LBR) In this case, "1 < ia >= n", n is the number of routers (6LR) that the packet go through from IPv6 src to the root.

6LR_id are the intermediate routers from the root to destination (IPv6 dst). In this case, "1 <= id >= m", m is the number of routers (6LR) that the packet go through from the root to destination (IPv6 dst).

This flow is identical to Section 5.11

The 6LR_1 receives the packet from the the IPv6 node and inserts the RPI header (RPIa) encapsulated in IPv6-in-IPv6 header. The IPv6-in-IPv6 header is addressed to the 6LBR. The 6LBR remove the IPv6-in-IPv6 header and insert another one (RPIb) with destination to 6LR_m node.

One of the side-effects of inserting IP-in-IP RPI header at 6LR_1, is that now all the packets will go through the 6LBR, even though there exists a shorter P2P path to the destination 6LN in storing mode. One possible solution is given by the work in [I-D.ietf-roll-dao-projection]. Once we have route projection, the root can find that this traffic deserves optimization (based on volume and path length, or additional knowledge on that particular flow) and project a DAO into 6LR_1.

Storing: Summary of the use of headers from not-RPL-aware-leaf to non-RPL-aware-leaf
Header IPv6 src 6LR_1 6LR_ia 6LBR 6LR_m IPv6 dst
Inserted headers -- IP-in-IP(RPI_a) -- IP-in-IP(RPI_b) -- --
Removed headers -- -- -- -- -- --
Re-added headers -- -- -- -- IP-in-IP(RPI_b) --
Modified headers -- -- IP-in-IP(RPI_a) -- IP-in-IP(RPI_b) --
Untouched headers -- -- -- -- -- --

6. Non Storing mode

Headers needed in Non-Storing mode: RPI, RH3, IP-in-IP encapsulation
Use Case RPI RH3 IP-in-IP IP-in-IP dst
Raf to root Yes No No --
root to Raf Opt Yes No --
root to ~Raf No Yes Yes 6LR
~Raf to root Yes No Yes root
Raf to Int Yes No Yes root
Int to Raf Opt Yes Yes dst
~Raf to Int Yes No Yes root
Int to ~Raf Opt Yes Yes 6LR
Raf to Raf Yes Yes Yes root/dst
Raf to ~Raf Yes Yes Yes root/6LR
~Raf to Raf Yes Yes Yes root/6LN
~Raf to ~Raf Yes Yes Yes root/6LR

6.1. Example of Flow from RPL-aware-leaf to root

In non-storing mode the leaf node uses default routing to send traffic to the root. The RPI header must be included to avoid/detect loops.

RPL-aware-leaf (6LN) --> 6LR_i --> root(6LBR)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LN) to destination (6LBR).

This situation is the same case as storing mode.

Non Storing: Summary of the use of headers from RPL-aware-leaf to root
Header 6LN 6LR_i 6LBR
Inserted headers RPI -- --
Removed headers -- -- RPI
Re-added headers -- -- --
Modified headers -- RPI --
Untouched headers -- -- --

6.2. Example of Flow from root to RPL-aware-leaf

In this case the flow comprises:

root (6LBR) --> 6LR_i --> RPL-aware-leaf (6LN)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LBR) to destination (6LN).

The 6LBR will insert an RH3, and may optionally insert an RPI header. No IP-in-IP header is necessary as the traffic originates with an RPL aware node, the 6LBR. The destination is known to RPL-aware because, the root knows the whole topology in non-storing mode.

Non Storing: Summary of the use of headers from root to RPL-aware-leaf
Header 6LBR 6LR_i 6LN
Inserted headers (opt: RPI), RH3 -- --
Removed headers -- -- RH3,RPI
Re-added headers -- -- --
Modified headers -- RH3 --
Untouched headers -- -- --

6.3. Example of Flow from root to not-RPL-aware-leaf

In this case the flow comprises:

root (6LBR) --> 6LR_i --> not-RPL-aware-leaf (IPv6)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LBR) to destination (IPv6).

In 6LBR the RH3 is added, modified in each intermediate 6LR (6LR_1 and so on) and it is fully consumed in the last 6LR (6LR_n), but left there. If RPI is left present, the IPv6 node which does not understand it will ignore it (following 2460bis), thus encapsulation is not necesary. Due the complete knowledge of the topology at the root, the 6LBR is able to address the IP-in-IP header to the last 6LR.

Non Storing: Summary of the use of headers from root to not-RPL-aware-leaf
Header 6LBR 6LR_i(i=1) 6LR_n(i=n) IPv6
Inserted headers (opt: RPI), RH3 -- -- --
Removed headers -- RH3 -- --
Re-added headers -- -- -- --
Modified headers -- (opt: RPI), RH3 (opt: RPI), RH3 --
Untouched headers -- -- -- RPI

6.4. Example of Flow from not-RPL-aware-leaf to root

In this case the flow comprises:

not-RPL-aware-leaf (IPv6) --> 6LR_1 --> 6LR_i --> root (6LBR)

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from source (IPv6) to destination (6LBR). For example, 6LR_1 (i=1) is the router that receives the packets from the IPv6 node.

In this case the RPI is added by the first 6LR (6LR1), encapsulated in an IP-in-IP header, and is modified in the followings 6LRs. The RPI and entire packet is consumed by the root.

Non Storing: Summary of the use of headers from not-RPL-aware-leaf to root
Header IPv6 6LR_1 6LR_i 6LBR
Inserted headers -- IP-in-IP(RPI) -- --
Removed headers -- -- -- IP-in-IP(RPI)
Re-added headers -- -- -- --
Modified headers -- -- IP-in-IP(RPI) --
Untouched headers -- -- -- --

6.5. Example of Flow from RPL-aware-leaf to Internet

In this case the flow comprises:

RPL-aware-leaf (6LN) --> 6LR_i --> root (6LBR) --> Internet

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from source (6LN) to 6LBR.

This case is identical to storing-mode case.

The IPv6 flow label should be set to zero to aid in compression, and the 6LBR will set it to a non-zero value when sending towards the Internet.

Non Storing: Summary of the use of headers from RPL-aware-leaf to Internet
Header 6LN 6LR_i 6LBR Internet
Inserted headers RPI -- -- --
Removed headers -- -- -- --
Re-added headers -- -- -- --
Modified headers -- RPI -- --
Untouched headers -- -- RPI RPI (Ignored)

6.6. Example of Flow from Internet to RPL-aware-leaf

In this case the flow comprises:

Internet --> root (6LBR) --> 6LR_i --> RPL-aware-leaf (6LN)

6LR_i are the intermediate routers from source to destination. In this case, "1 <= i >= n", n is the number of routers (6LR) that the packet go through from 6LBR to destination(6LN).

The 6LBR must add an RH3 header. As the 6LBR will know the path and address of the target node, it can address the IP-in-IP header to that node. The 6LBR will zero the flow label upon entry in order to aid compression.

The RPI may be added or not, it is optional.

Non Storing: Summary of the use of headers from Internet to RPL-aware-leaf
Header Internet 6LBR 6LR_i 6LN
Inserted headers -- IP-in-IP(RH3,opt:RPI) -- --
Removed headers -- -- -- IP-in-IP(RH3,opt:RPI)
Re-added headers -- -- -- --
Modified headers -- -- IP-in-IP(RH3,opt:RPI) --
Untouched headers -- -- -- --

6.7. Example of Flow from not-RPL-aware-leaf to Internet

In this case the flow comprises:

not-RPL-aware-leaf (IPv6) --> 6LR_1 --> 6LR_i -->root (6LBR) --> Internet

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from source(IPv6) to 6LBR. e.g 6LR_1 (i=1).

In this case the flow label is recommended to be zero in the IPv6 node. As RPL headers are added in the IPv6 node, the first 6LR (6LR_1) will add an RPI header inside a new IP-in-IP header. The IP-in-IP header will be addressed to the root. This case is identical to the storing-mode case (Section 5.7).

Non Storing: Summary of the use of headers from not-RPL-aware-leaf to Internet
Header IPv6 6LR_1 6LR_i [i=2,..,n]_ 6LBR Internet
Inserted headers -- IP-in-IP(RPI) -- -- --
Removed headers -- -- -- IP-in-IP(RPI) --
Re-added headers -- -- -- -- --
Modified headers -- -- IP-in-IP(RPI) -- --
Untouched headers -- -- -- -- --

6.8. Example of Flow from Internet to not-RPL-aware-leaf

In this case the flow comprises:

Internet --> root (6LBR) --> 6LR_i --> not-RPL-aware-leaf (IPv6)

6LR_i are the intermediate routers from source to destination. In this case, "1 < i >= n", n is the number of routers (6LR) that the packet go through from 6LBR to not-RPL-aware-leaf (IPv6).

The 6LBR must add an RH3 header inside an IP-in-IP header. The 6LBR will know the path, and will recognize that the final node is not an RPL capable node as it will have received the connectivity DAO from the nearest 6LR. The 6LBR can therefore make the IP-in-IP header destination be the last 6LR. The 6LBR will set to zero the flow label upon entry in order to aid compression.

NonStoring: Summary of the use of headers from Internet to non-RPL-aware-leaf
Header Internet 6LBR 6LR_1 6LR_i(i=2,..,n) IPv6
Inserted headers -- IP-in-IP(RH3,opt:RPI) -- -- --
Removed headers -- -- -- IP-in-IP(RH3, RPI) --
Re-added headers -- -- -- -- --
Modified headers -- -- IP-in-IP(RH3, RPI) IP-in-IP(RH3, RPI) --
Untouched headers -- -- -- -- RPI

6.9. Example of Flow from RPL-aware-leaf to RPL-aware-leaf

In this case the flow comprises:

6LN src --> 6LR_ia --> root (6LBR) --> 6LR_id --> 6LN dst

6LR_ia are the intermediate routers from source to the root In this case, "1 <= ia >= n", n is the number of routers (6LR) that the packet go through from 6LN to the root.

6LR_id are the intermediate routers from the root to the destination. In this case, "1 <= ia >= m", m is the number of the intermediate routers (6LR).

This case involves only nodes in same RPL Domain. The originating node will add an RPI header to the original packet, and send the packet upwards.

The originating node SHOULD put the RPI into an IP-in-IP header addressed to the root, so that the 6LBR can remove that header. If it does not, then additional resources are wasted on the way down to carry the useless RPI option.

The 6LBR will need to insert an RH3 header, which requires that it add an IP-in-IP header. It SHOULD be able to remove the RPI, as it was contained in an IP-in-IP header addressed to it. Otherwise, there MAY be an RPI header buried inside the inner IP header, which should get ignored.

Networks that use the RPL P2P extension [RFC6997] are essentially non-storing DODAGs and fall into this scenario or scenario Section 6.2, with the originating node acting as 6LBR.

Non Storing: Summary of the use of headers for RPL-aware-leaf to RPL-aware-leaf
Header 6LN src 6LR_ia 6LBR 6LR_id 6LN dst
Inserted headers IP-in-IP(RPI1) -- IP-in-IP(RH3 to 6LN, opt RPI2) -- --
Removed headers -- -- IP-in-IP(RPI1) -- IP-in-IP(RH3, opt RPI2)
Re-added headers -- -- -- -- --
Modified headers -- RPI1 -- RPI2 --
Untouched headers -- -- -- -- --

6.10. Example of Flow from RPL-aware-leaf to not-RPL-aware-leaf

In this case the flow comprises:

6LN --> 6LR_ia --> root (6LBR) --> 6LR_id --> not-RPL-aware (IPv6)

6LR_ia are the intermediate routers from source to the root In this case, "1 <= ia >= n", n is the number of intermediate routers (6LR)

6LR_id are the intermediate routers from the root to the destination. In this case, "1 <= ia >= m", m is the number of the intermediate routers (6LR).

As in the previous case, the 6LN will insert an RPI (RPI_1) header which MUST be in an IP-in-IP header addressed to the root so that the 6LBR can remove this RPI. The 6LBR will then insert an RH3 inside a new IP-in-IP header addressed to the 6LN destination node. The RPI is optional from 6LBR to 6LR_id (RPI_2).

Non Storing: Summary of the use of headers from RPL-aware-leaf to not-RPL-aware-leaf
Header 6LN 6LR_1 6LBR 6LR_id IPv6
Inserted headers IP-in-IP(RPI1) -- IP-in-IP(RH3, opt RPI_2) -- --
Removed headers -- -- IP-in-IP(RPI_1) IP-in-IP(RH3, opt RPI_2) --
Re-added headers -- -- -- -- --
Modified headers -- IP-in-IP(RPI_1) -- IP-in-IP(RH3, opt RPI_2) --
Untouched headers -- -- -- -- opt RPI_2

6.11. Example of Flow from not-RPL-aware-leaf to RPL-aware-leaf

In this case the flow comprises:

not-RPL-aware 6LN (IPv6) --> 6LR_ia --> root (6LBR) --> 6LR_id --> 6LN

6LR_ia are the intermediate routers from source to the root In this case, "1 <= ia >= n", n is the number of intermediate routers (6LR)

6LR_id are the intermediate routers from the root to the destination. In this case, "1 <= ia >= m", m is the number of the intermediate routers (6LR).

This scenario is mostly identical to the previous one. The RPI is added by the first 6LR (6LR_1) inside an IP-in-IP header addressed to the root. The 6LBR will remove this RPI, and add it's own IP-in-IP header containing an RH3 header and optional RPI (RPI_2).

Non Storing: Summary of the use of headers from not-RPL-aware-leaf to RPL-aware-leaf
Header IPv6 6LR_1 6LBR 6LR_id 6LN
Inserted headers -- IP-in-IP(RPI_1) IP-in-IP(RH3, opt RPI_2) -- --
Removed headers -- -- IP-in-IP(RPI_1) -- IP-in-IP(RH3, opt RPI_2)
Re-added headers -- -- -- -- --
Modified headers -- -- -- IP-in-IP(RH3, opt RPI_2) --
Untouched headers -- -- -- -- --

6.12. Example of Flow from not-RPL-aware-leaf to not-RPL-aware-leaf

In this case the flow comprises:

not-RPL-aware 6LN (IPv6 src)--> 6LR_ia --> root (6LBR) --> 6LR_id --> not-RPL-aware (IPv6 dst)

6LR_ia are the intermediate routers from source to the root In this case, "1 <= ia >= n", n is the number of intermediate routers (6LR)

6LR_id are the intermediate routers from the root to the destination. In this case, "1 <= ia >= m", m is the number of the intermediate routers (6LR).

This scenario is the combination of the previous two cases.

Non Storing: Summary of the use of headers from not-RPL-aware-leaf to not-RPL-aware-leaf
Header IPv6 src 6LR_1 6LBR 6LR_id IPv6 dst
Inserted headers -- IP-in-IP(RPI_1) IP-in-IP(RH3) -- --
Removed headers -- -- IP-in-IP(RPI_1) IP-in-IP(RH3, opt RPI_2) --
Re-added headers -- -- -- -- --
Modified headers -- -- -- -- --
Untouched headers -- -- -- -- --

7. Observations about the cases

7.1. Storing mode

[I-D.ietf-roll-routing-dispatch] shows that the hop-by-hop IP-in-IP header can be compressed using IP-in-IP 6LoRH (IP-in-IP-6LoRH) header as described in Section 7 of the document.

There are potential significant advantages to having a single code path that always processes IP-in-IP headers with no options.

Thanks to the relaxation of the RFC2460 rule about discarding unknown Hop-by-Hop options, there is no longer any uncertainty about when to use an IPIP header in the storing mode case. The RPI header SHOULD always be added when 6LRs originate packets (without IPIP headers), and IPIP headers should always be added (addressed to the root when on the way up, to the end-host when on the way down) when a 6LR finds it needs to insert an RPI header.

In order to support the above two cases with full generality, the different situations (always do IP-in-IP vs never use IP-in-IP) should be signaled in the RPL protocol itself.

7.2. Non-Storing mode

In the non-storing case, dealing with non-RPL aware leaf nodes is much easier as the 6LBR (DODAG root) has complete knowledge about the connectivity of all DODAG nodes, and all traffic flows through the root node.

The 6LBR can recognize non-RPL aware leaf nodes because it will receive a DAO about that node from the 6LN immediately above that node. This means that the non-storing mode case can avoid ever using hop-by-hop IP-in-IP headers.

Unlike in the storing mode case, there is no need for all nodes to know about the existence of non-RPL aware nodes. Only the 6LBR needs to change when there are non-RPL aware nodes. Further, in the non-storing case, the 6LBR is informed by the DAOs when there are non-RPL aware nodes.

8. 6LoRH Compression cases

The [I-D.ietf-roll-routing-dispatch] proposes a compression method for RPI, RH3 and IPv6-in-IPv6.

In Storing Mode, for the examples of Flow from RPL-aware-leaf to non-RPL-aware-leaf and non-RPL-aware-leaf to non-RPL-aware-leaf comprise an IP-in-IP and RPI compression headers. The type of this case is critical since IP-in-IP is encapsulating a RPI header.


+--+-----+---+--------------+-----------+-------------+-------------+
|1 | 0|0 |TSE| 6LoRH Type 6 | Hop Limit | RPI - 6LoRH | LOWPAN IPHC |
+--+-----+---+--------------+-----------+-------------+-------------+

Figure 3: Critical IP-in-IP (RPI).

9. IANA Considerations

There are no IANA considerations related to this document.

10. Security Considerations

The security considerations covering of [RFC6553] and [RFC6554] apply when the packets get into RPL Domain.

The IPIP mechanism described in this document is much more limited than the general mechanism described in [RFC2473]. The willingness of each node in the LLN to decapsulate traffic and forward it could be exploited by nodes to disguise the origin of an attack.

Nodes outside of the LLN will need to pass IPIP traffic through the RPL root in order to perform this attack. To counter the RPL root SHOULD either restrict ingress of IPIP packets (the simpler solution), or it SHOULD do a deep packet inspection wherein it walks the IP header extension chain until it can inspect the upper-layer-payload as described in [RFC7045]. In particular, the RPL root SHOULD do BCP38 ([RFC2827]) processing on the source addresses of all IP headers that it examines in both directions.

Note: there are some situations where a prefix will spread across multiple LLNs via mechanisms such as [I-D.ietf-6lo-backbone-router]. In this case the BCP38 filtering needs to take this into account.

Nodes with the LLN are able to use the IPIP mechanism to mount an attack on another part of the LLN, while disguising the origin of the attack. The mechanism can even be abused to make it appear that the attack is coming from outside the LLN, and unless countered, this could be used to mount a Distributed Denial of Service attack upon nodes elsewhere in the Internet. See [DDOS-KREBS] for an example of such attacks already seen in the real world.

While a typical LLN may be a very poor origin for attack traffic, as the networks tend to very slow, and the nodes often have very low duty cycles, given enough of them, they could still have a significant impact, particularly if the attack was on another LLN! Additionally, some uses of RPL involve large backbone ISP scale equipment [I-D.ietf-anima-autonomic-control-plane], which may be equipped with multiple 100Gb/s interfaces.

Blocking or careful filtering of IPIP traffic entering the LLN as described above will make sure that any attack that is mounted must be originated from compromised nodes within the LLN. The use of BCP38 filtering at the RPL root on egress traffic will both alert the operator to the existence of the attack, as well as drop the attack traffic. As the RPL network is typically numbered from a single prefix, which is itself assigned by RPL, BCP38 filtering involves a single prefix comparison and should be trivial to automatically configure.

There are some scenarios where IPIP traffic SHOULD be allowed to pass through the RPL root, such as the IPIP mediated communications between a new Pledge and the Join Coordinator when using [I-D.ietf-anima-bootstrapping-keyinfra] and [I-D.ietf-6tisch-dtsecurity-secure-join]. This is the case for the RPL root to do careful filtering: it occurs only when the Join Coordinator is not co-located inside the RPL root.

With the above precautions, an attack using IPIP tunnels will be by a node within the LLN on another node within the LLN. Such an attack could, of course, be done directly. An attack of this kind is meaningful only if the source addresses are either fake or if the point is for (amplified) return traffic to be the attack. Such an attack, could also be done without the use of IPIP headers using forged source addresses. If the attack requires bi-directional communication, then IPIP provides no advantages.

[RFC2473] suggests that tunnel entry and exit points can be secured, via the "Use IPsec". This solution has all the problems that [RFC5406] goes into. In an LLN such a solution would degenerate into every node having a tunnel with every other node. It would provide a small amount of origin address authentication at a very high cost; doing BCP38 at every node (linking layer-3 addresses to layer-2 addresses, and to already present layer-2 cryptographic mechanisms) would be cheaper should RPL be run in an environment where hostile nodes are likely to be a part of the LLN.

The RH3 header usage described here can be abused in equivalent ways to the IPIP header. In non-storing networks where an RH3 may be acted upon, packets arriving into the LLN will be encapsulated with an IPIP header in order to add the needed RH3 header. As such, the attacker's RH3 header will not be seen by the network until it reaches the end host, which will decapsulate it. An end-host SHOULD be suspicious about a RH3 header which has additional hops which have not yet been processed, and SHOULD ignore such a second RH3 header.

In addition, the LLN will likely use [I-D.ietf-roll-routing-dispatch] to compress the IPIP and RH3 headers. As such, the compressor at the RPL-root will see the second RH3 header and MAY choose to discard the packet if the RH3 header has not been completely consumed. A consumed (inert) RH3 header could be present in a packet that flows from one LLN, crosses the Internet, and enters another LLN. As per the discussion in this document, such headers do not need to be removed. However, there is no case described in this document where an RH3 is inserted in a non-storing network on traffic that is leaving the LLN, but this document SHOULD NOT preclude such a future innovation. It should just be noted that an incoming RH3 must be fully consumed, or very carefully inspected.

The RPI header, if permitted to enter the LLN, could be used by an attacker to change the priority of a packet by selecting a different RPL instanceID, perhaps one with a higher energy cost, for instance. It could also be that not all nodes are reachable in an LLN using the default instanceID, but a change of instanceID would permit an attacker to bypass such filtering. Like the RH3, an RPI header is to be inserted by the RPL root on traffic entering the LLN by first inserting an IPIP header. The attacker's RPI header therefore will not be seen by the network. Upon reaching the destination node the RPI header has no further meaning and is just skipped; the presence of a second RPI header will have no meaning to the end node as the packet has already been identified as being at it's final destination.

The RH3 and RPI headers could be abused by an attacker inside of the network to route packets on non-obvious ways, perhaps eluding observation. This usage is in fact part of [RFC6997] and can not be restricted at all. This is a feature, not a bug.

[RFC7416] deals with many other threats to LLNs not directly related to the use of IPIP headers, and this document does not change that analysis.

11. Acknowledgments

This work is partially funded by the FP7 Marie Curie Initial Training Network (ITN) METRICS project (grant agreement No. 607728).

The authors would like to acknowledge the review, feedback, and comments of (alphabetical order): Robert Cragie, Simon Duquennoy, Cenk Gündogan, Rahul Jadhav, Peter van der Stok, Xavier Vilajosana and Thomas Watteyne.

12. References

12.1. Normative References

[I-D.ietf-6man-rfc2460bis] <>, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", Internet-Draft draft-ietf-6man-rfc2460bis-09, March 2017.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460, December 1998.
[RFC2473] Conta, A. and S. Deering, "Generic Packet Tunneling in IPv6 Specification", RFC 2473, DOI 10.17487/RFC2473, December 1998.
[RFC2827] Ferguson, P. and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827, May 2000.
[RFC5406] Bellovin, S., "Guidelines for Specifying the Use of IPsec Version 2", BCP 146, RFC 5406, DOI 10.17487/RFC5406, February 2009.
[RFC6550] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP. and R. Alexander, "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks", RFC 6550, DOI 10.17487/RFC6550, March 2012.
[RFC6553] Hui, J. and JP. Vasseur, "The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams", RFC 6553, DOI 10.17487/RFC6553, March 2012.
[RFC6554] Hui, J., Vasseur, JP., Culler, D. and V. Manral, "An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL)", RFC 6554, DOI 10.17487/RFC6554, March 2012.
[RFC7045] Carpenter, B. and S. Jiang, "Transmission and Processing of IPv6 Extension Headers", RFC 7045, DOI 10.17487/RFC7045, December 2013.
[RFC7416] Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A. and M. Richardson, "A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)", RFC 7416, DOI 10.17487/RFC7416, January 2015.

12.2. Informative References

, "
[DDOS-KREBS] Goodin, D., Record-breaking DDoS reportedly delivered by >145k hacked cameras", September 2016.
[I-D.ietf-6lo-backbone-router] Thubert, P., "IPv6 Backbone Router", Internet-Draft draft-ietf-6lo-backbone-router-03, January 2017.
[I-D.ietf-6tisch-architecture] Thubert, P., "An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4", Internet-Draft draft-ietf-6tisch-architecture-11, January 2017.
[I-D.ietf-6tisch-dtsecurity-secure-join] Richardson, M., "6tisch Secure Join protocol", Internet-Draft draft-ietf-6tisch-dtsecurity-secure-join-01, February 2017.
[I-D.ietf-anima-autonomic-control-plane] Behringer, M., Eckert, T. and S. Bjarnason, "An Autonomic Control Plane", Internet-Draft draft-ietf-anima-autonomic-control-plane-06, March 2017.
[I-D.ietf-anima-bootstrapping-keyinfra] Pritikin, M., Richardson, M., Behringer, M., Bjarnason, S. and K. Watsen, "Bootstrapping Remote Secure Key Infrastructures (BRSKI)", Internet-Draft draft-ietf-anima-bootstrapping-keyinfra-05, March 2017.
[I-D.ietf-roll-dao-projection] Thubert, P. and J. Pylakutty, "Root initiated routing state in RPL", Internet-Draft draft-ietf-roll-dao-projection-01, March 2017.
[I-D.ietf-roll-routing-dispatch] Thubert, P., Bormann, C., Toutain, L. and R. Cragie, "6LoWPAN Routing Header", Internet-Draft draft-ietf-roll-routing-dispatch-05, October 2016.
[RFC4443] Conta, A., Deering, S. and M. Gupta, "Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification", RFC 4443, DOI 10.17487/RFC4443, March 2006.
[RFC6775] Shelby, Z., Chakrabarti, S., Nordmark, E. and C. Bormann, "Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)", RFC 6775, DOI 10.17487/RFC6775, November 2012.
[RFC6997] Goyal, M., Baccelli, E., Philipp, M., Brandt, A. and J. Martocci, "Reactive Discovery of Point-to-Point Routes in Low-Power and Lossy Networks", RFC 6997, DOI 10.17487/RFC6997, August 2013.
[RFC7102] Vasseur, JP., "Terms Used in Routing for Low-Power and Lossy Networks", RFC 7102, DOI 10.17487/RFC7102, January 2014.
[Second6TischPlugtest]2nd 6Tisch Plugtest"

Authors' Addresses

Maria Ines Robles Ericsson Hirsalantie 11 Jorvas, 02420 Finland EMail: maria.ines.robles@ericsson.com
Michael C. Richardson Sandelman Software Works 470 Dawson Avenue Ottawa, ON K1Z 5V7 CA EMail: mcr+ietf@sandelman.ca URI: http://www.sandelman.ca/mcr/
Pascal Thubert Cisco Systems, Inc Village d'Entreprises Green Side 400, Avenue de Roumanille Batiment T3, Biot - Sophia Antipolis 06410 France EMail: pthubert@cisco.com