<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-roll-enrollment-priority-15" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="join-metric">Controlling Secure Network Enrollment in RPL networks</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-roll-enrollment-priority-15"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="R. A." surname="Jadhav" fullname="Rahul Arvind Jadhav">
      <organization>Huawei Tech</organization>
      <address>
        <email>rahul.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Thubert" fullname="Pascal Thubert">
      <organization>Cisco Systems</organization>
      <address>
        <email>pthubert@cisco.com</email>
      </address>
    </author>
    <author initials="K." surname="Iwanicki" fullname="Konrad Iwanicki">
      <organization>University of Warsaw</organization>
      <address>
        <email>iwanicki@mimuw.edu.pl</email>
      </address>
    </author>
    <date year="2026" month="January" day="24"/>
    <area>Internet</area>
    <workgroup>ROLL Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 58?>

<t><xref target="RFC9032"/> defines a method by which a potential <xref target="RFC9031"/> enrollment proxy can announce itself as available for new RPL nodes to enroll on a network.
The announcement includes a priority for enrollment.
This document provides a mechanism by which a  Routing Protocol for Low-Power and Lossy Networks (RPL) Root can globally disable enrollment announcements or adjust the base priority for enrollment operations.</t>
    </abstract>
  </front>
  <middle>
    <?line 64?>

<section anchor="problems">
      <name>Introduction</name>
      <t><xref target="RFC7554"/> describes the use of the Time-Slotted Channel Hopping (TSCH) mode of <xref target="ieee802154"/>.
<xref target="RFC9031"/> and <xref target="RFC9032"/> describe mechanisms by which a new node (the "Pledge") can use a
nearby router as a Join Proxy.
<xref target="RFC9032"/> describes an extension to the 802.15.4 Enhanced Beacon that is used by a Join Proxy to announce its existence such that Pledges can find them.</t>
      <section anchor="motivation-and-overview">
        <name>Motivation and Overview</name>
        <t>Not every routing member of a mesh ought to announce itself as a <em>Join Proxy</em>.
There are a variety of local reasons for which a 6LowPAN Router (6LR) might not want to provide the <em>Join Proxy</em> function.
Some reasons include low available battery power, already high committed network bandwidth, and lack of available free memory for Neighbor Cache Entry (NCE) slots.
An NCE entry is needed in order to maintain communication with the Pledge nodes trying to enroll.</t>
        <t>There are other situations where the operator of the network would like to selectively enable or disable the enrollment process in a specific Destination Oriented Directed Acyclic Graph (DODAG).
In particular, as the enrollment process involves permitting unencrypted traffic into the best effort part of a network, it would be better to turn the enrollment process off when no new nodes are expected.</t>
        <t>This document describes a Routing Protocol for Low-Power and Lossy Networks (RPL) Destination Information Object (DIO) option that can be used to set a minimum enrollment priority.
The minimum priority expresses the inability of the RPL DODAG globally to accept new joins.
It may derive from multiple constraining factors, for instance, the size of the DODAG, the occupancy of the bandwidth at the DODAG Root, the memory capacity at the Root, or an administrative decision.
Each potential <em>Join Proxy</em> utilizes this value as a base on which to add values relating to local conditions, such as its Rank and number of pending joins.
As explained in <xref target="RFC9032"/>, higher values decrease the likelihood of an unenrolled node sending enrollment traffic via this <em>Join Proxy</em>.
In particular, by setting the minimum enrollment priority to the maximum value allowed, a network operator can globally disable all new enrollment traffic.</t>
        <t>Moreover, when a RPL domain is composed of multiple DODAGs, a node at the edge of more than one such DODAG may not only join any of the DODAGs but also move between them in order to keep their relative sizes balanced.
For this, the approximate knowledge of the size of the DODAGs is also an essential metric.
Depending on the network policy, the size of the DODAG may or may not affect the minimum enrollment priority.
Therefore, since making one proportional to the other would be limiting their value, the current size of the DODAG is advertised separately in the new option.</t>
        <t>Updates to the option propagate through the network according to the trickle algorithm.
The contents of the option are generated at the DODAG Root and do not change at any hop.
If the contents represent an update that is considered important (e.g., quickly disabling any enrollments), the option can trigger trickle timer resets at the nodes to speed up its propagation.</t>
      </section>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>The term 6LR means 6LowPAN Router, and is defined in <xref target="RFC6606"/>.
It refers to a router that forwards packets in a 6LowPAN network.</t>
      <t>The terms DAO, DODAG, DODAG root, DIO, trickle timer are from <xref target="RFC6550"/>.
The lollipop counter function comes from <xref section="7.2" sectionFormat="comma" target="RFC6550"/>.</t>
      <t>The term (1)"Join" has been used in documents such as <xref target="RFC9031"/> to denote the activity of a new node authenticating itself to the network to obtain authorization to become a member of the network.</t>
      <t>In the context of the <xref target="RFC6550"/> RPL protocol, the term (2)"Join" has an alternative meaning: that of a node (already authenticated to the network, and already authorized to be a member of the network), deciding which part of the RPL DODAG to attach to.
This term "Join" has to do with preferred parent selection processes.</t>
      <t>In order to avoid the ambiguity of this term, this document refers to the process (1)"Join" as enrollment, leaving the term "Join" to mean (2)"Join".
The term "onboarding" (or "IoT Onboarding") is increasingly used to describe what is now called (1)Join in other documents, and is called enrollment in this document.
However, the term <em>Join Proxy</em> is retained with its (1)"Join" meaning from <xref target="RFC9031"/>.</t>
    </section>
    <section anchor="protocol-definition">
      <name>Protocol Definition</name>
      <t>This document uses the extensions mechanism specified by <xref target="RFC6550"/>.
No mechanism is needed to enable it.</t>
      <section anchor="option-format">
        <name>Option Format</name>
        <t>The following option is defined for transmission in DIOs issued by the DODAG Root to be propagated within the DODAG.</t>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | Type = TBD01  |Opt Length = 4 |Version Number |T| Min Priority|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Exp  |DODAGSz|
   +-+-+-+-+-+-+-+-+
]]></artwork>
        <dl>
          <dt>Type</dt>
          <dd>
            <t>To be assigned by IANA.</t>
          </dd>
          <dt>Version Number</dt>
          <dd>
            <t>An 8-bit unsigned integer set by the DODAG root and denoting the version number of the contents of the option. The version number is interpreted as a lollipop counter (see Section 7.2 of <xref target="RFC6550"/>).</t>
          </dd>
          <dt>T</dt>
          <dd>
            <t>A bit indicating whether the particular version of the option is important in that adopting its contents should trigger a trickle timer reset at the node.</t>
          </dd>
          <dt>Min Priority</dt>
          <dd>
            <t>A 7-bit field providing a base value for the Enhanced Beacon Join priority.  A value of 0x7f (127) disables the <em>Join Proxy</em> function entirely.</t>
          </dd>
          <dt>Exp</dt>
          <dd>
            <t>A 4-bit unsigned integer indicating the power of 2 that defines the unit of the DODAG Size, such that (unit = 2^Exp).</t>
          </dd>
          <dt>DODAGSz</dt>
          <dd>
            <t>A 4-bit unsigned integer expressing the size of the DODAG in units that depend on the Exp field.</t>
          </dd>
        </dl>
        <t>The DODAG Size is calculated as (DODAGSz * 2^Exp).</t>
        <t>The DODAG Size can be measured by the Root based on the DAO activity.
In such a case, it represents the number of routes not the number of nodes, and can thus be used to infer the load only in a network where each node advertises roughly the same number of addresses and generates roughly the same amount of traffic.</t>
        <t>As the DODAG Size is always a multiple of a power of 2, when the actual size falls between two such values, the DODAG Root is to always round up.</t>
        <t>Future work such as <xref target="I-D.ietf-roll-capabilities"/> will enable collection of capabilities such as this one in reports to the DODAG Root.</t>
        <t>In any case, the DODAG Size may slightly change between one DIO and the next, so the value transmitted is considered as an approximation.</t>
      </section>
      <section anchor="option-processing">
        <name>Option Processing</name>
        <t>The contents of the option MUST be generated by the DODAG Root.
A 6LR MUST NOT change the option when propagating it.</t>
        <t>Whenever the DODAG root changes the values of Min Priority or DODAG Size in the option, it MUST also increment the value of Version Number.
Moreover, if the change is considered important (i.e., it is expected to propagate in the DODAG quickly), the DODAG Root SHOULD also set the T bit to 1; otherwise, it MUST set the bit to 0.</t>
        <t>Upon receiving the option, a 6LR first checks the value of the Version Number field in the option, <em>vr</em>, versus the value of the Version Number it has last adopted locally, <em>vl</em>.</t>
        <ul spacing="normal">
          <li>
            <t>If <em>vl</em> is greater than <em>vr</em> (in the lollipop counter order), then the 6LR MUST ignore the received option.</t>
          </li>
          <li>
            <t>Otherwise, the 6LR MUST adopt the contents of the option (i.e., the values of Version Number, Min Priority, DODAG Size, and the T bit) as its local ones.
Moreover, if <em>vl</em> was smaller than <em>vr</em> (in the lollipop counter order) and the T bit in the received option was set, then the 6LR MUST reset its DIO trickle timer.</t>
          </li>
        </ul>
        <t>A 6LR, which would otherwise be willing to act as a <em>Join Proxy</em>, will examine the locally adopted value of Min Priority and to that number add any additional local consideration (such as upstream congestion, number of NCE slots available, etc.).</t>
        <t>The maximum resulting value any 6LR can obtain this way is 0x7f.</t>
        <t>The resulting priority, if less than 0x7f, should enable the <em>Join Proxy</em> function.</t>
      </section>
      <section anchor="upwards-compatibility">
        <name>Upwards Compatibility</name>
        <t>A 6LR that did not support this option would not act on it or propagate it in its DIO messages.
In effect, the 6LR's subtree nodes could not receive any telemetry.
Therefore, 6LRs that support this option but do not receive it via any path SHOULD assume a default value of 0x40 as their base value for the Enhanced Beacon Join Priority.</t>
        <t>A 6LR downstream of a 6LR where there was such an interruption in the telemetry could err in two directions:</t>
        <ul spacing="normal">
          <li>
            <t>If the value implied by the base value of 0x40 was too low, then the 6LR might continue to attract enrollment traffic when none should have been collected.
This is a stressor for the network, but this would also be what would occur without this option at all.</t>
          </li>
          <li>
            <t>If the value implied by the base value of 0x40 was too high, then the 6LR might deflect enrollment traffic to other parts of the DODAG, possibly refusing any enrollment traffic at all.
In order for this to happen, some significant congestion must be seen in the sub-DODAG where the implied 0x40 was introduced.
The 0x40 is only the half-way point, so if such an amount of congestion was present, then this sub-DODAG of the DODAG simply winds up being more cautious than it needed to be.</t>
          </li>
        </ul>
        <t>It is possible that the temporal alternation of the above two situations might introduce cycles of accepting and then rejecting enrollment traffic.
This is something an operator should consider if they incrementally deploy this option to an existing Low-power/Lossy-Network (LLN).
In addition, an operator would be unable to turn off enrollment traffic by sending a maximum value enrollment priority to the sub-DODAG.
This situation is unfortunate, but without this option, the situation would occur all over the DODAG, rather than just in the sub-DODAG that the option did not reach.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As per <xref target="RFC7416"/>, RPL control frames either run over a secured layer 2 or use the <xref target="RFC6550"/> Secure DIO methods at layer 3.
This option can be placed into either a "clear" (layer-2 secured) DIO or a layer-3 Secure DIO.</t>
      <t>In most deployments involving wireless technology, layer 2 is always encrypted using a layer-2 specific technology, and so privacy of this option is available.</t>
      <t>However, a malicious node that was part of the RPL control plane (i.e., had been enrolled into the layer-2 security) would be able to see the values of this option and, based upon the observed minimal enrollment priority, could signal a confederate that it was a good time to send malicious join traffic.</t>
      <t>What is more, such a malicious node, being already part of the RPL control plane, could also send DIOs with a different minimal enrollment priority, which would cause downstream mesh routers to change their <em>Join Proxy</em>  behavior: lower minimal priorities would cause downstream nodes to accept more Pledges than the network was expecting; higher minimal priorities could cause the enrollment process to stall.</t>
      <t>The use of layer-2 or layer-3 security for RPL control messages prevents the two aforementioned attacks by non-participating nodes by preventing malicious nodes from becoming part of the control plane.</t>
      <t>Nevertheless, a node that is attacked and has malware placed on it creates vulnerabilities in the same way such an attack on any node involved in Internet routing protocol does.
The rekeying provisions of <xref target="RFC9031"/> exist to permit an operator to remove such nodes from the network.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>There are no new privacy issues caused by this extension.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Allocate a new number TBD01 from Registry RPL Control Message Options.
This entry should be called Minimum Enrollment Priority.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This has been reviewed by Charlie Perkins, Rifaat Shehk-Yusek, Dave Thaler, and Thomas Watteyne.</t>
      <t>Huimin She contributed text about expressing the DODAG size.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7554">
          <front>
            <title>Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement</title>
            <author fullname="T. Watteyne" initials="T." role="editor" surname="Watteyne"/>
            <author fullname="M. Palattella" initials="M." surname="Palattella"/>
            <author fullname="L. Grieco" initials="L." surname="Grieco"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This document describes the environment, problem statement, and goals for using the Time-Slotted Channel Hopping (TSCH) Medium Access Control (MAC) protocol of IEEE 802.14.4e in the context of Low-Power and Lossy Networks (LLNs). The set of goals enumerated in this document form an initial set only.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7554"/>
          <seriesInfo name="DOI" value="10.17487/RFC7554"/>
        </reference>
        <reference anchor="RFC6550">
          <front>
            <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
            <author fullname="T. Winter" initials="T." role="editor" surname="Winter"/>
            <author fullname="P. Thubert" initials="P." role="editor" surname="Thubert"/>
            <author fullname="A. Brandt" initials="A." surname="Brandt"/>
            <author fullname="J. Hui" initials="J." surname="Hui"/>
            <author fullname="R. Kelsey" initials="R." surname="Kelsey"/>
            <author fullname="P. Levis" initials="P." surname="Levis"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="R. Struik" initials="R." surname="Struik"/>
            <author fullname="JP. Vasseur" initials="JP." surname="Vasseur"/>
            <author fullname="R. Alexander" initials="R." surname="Alexander"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained. LLN routers typically operate with constraints on processing power, memory, and energy (battery power). Their interconnects are characterized by high loss rates, low data rates, and instability. LLNs are comprised of anything from a few dozen to thousands of routers. Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point). This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported. Support for point-to-point traffic is also available. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6550"/>
          <seriesInfo name="DOI" value="10.17487/RFC6550"/>
        </reference>
        <reference anchor="RFC9032">
          <front>
            <title>Encapsulation of 6TiSCH Join and Enrollment Information Elements</title>
            <author fullname="D. Dujovne" initials="D." role="editor" surname="Dujovne"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>In the Time-Slotted Channel Hopping (TSCH) mode of IEEE Std 802.15.4, opportunities for broadcasts are limited to specific times and specific channels. Routers in a TSCH network transmit Enhanced Beacon (EB) frames to announce the presence of the network. This document provides a mechanism by which additional information critical for new nodes (pledges) and long-sleeping nodes may be carried within the EB in order to conserve use of broadcast opportunities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9032"/>
          <seriesInfo name="DOI" value="10.17487/RFC9032"/>
        </reference>
        <reference anchor="RFC9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić"/>
            <author fullname="J. Simon" initials="J." surname="Simon"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="ieee802154" target="http://standards.ieee.org/findstds/standard/802.15.4-2015.html">
          <front>
            <title>IEEE Std. 802.15.4, Part. 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks</title>
            <author initials="" surname="IEEE standard for Information Technology">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7416">
          <front>
            <title>A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)</title>
            <author fullname="T. Tsao" initials="T." surname="Tsao"/>
            <author fullname="R. Alexander" initials="R." surname="Alexander"/>
            <author fullname="M. Dohler" initials="M." surname="Dohler"/>
            <author fullname="V. Daza" initials="V." surname="Daza"/>
            <author fullname="A. Lozano" initials="A." surname="Lozano"/>
            <author fullname="M. Richardson" initials="M." role="editor" surname="Richardson"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs). The development builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks. A systematic approach is used in defining and evaluating the security threats. Applicable countermeasures are application specific and are addressed in relevant applicability statements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7416"/>
          <seriesInfo name="DOI" value="10.17487/RFC7416"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6606">
          <front>
            <title>Problem Statement and Requirements for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing</title>
            <author fullname="E. Kim" initials="E." surname="Kim"/>
            <author fullname="D. Kaspar" initials="D." surname="Kaspar"/>
            <author fullname="C. Gomez" initials="C." surname="Gomez"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) are formed by devices that are compatible with the IEEE 802.15.4 standard. However, neither the IEEE 802.15.4 standard nor the 6LoWPAN format specification defines how mesh topologies could be obtained and maintained. Thus, it should be considered how 6LoWPAN formation and multi-hop routing could be supported.</t>
              <t>This document provides the problem statement and design space for 6LoWPAN routing. It defines the routing requirements for 6LoWPANs, considering the low-power and other particular characteristics of the devices and links. The purpose of this document is not to recommend specific solutions but to provide general, layer-agnostic guidelines about the design of 6LoWPAN routing that can lead to further analysis and protocol design. This document is intended as input to groups working on routing protocols relevant to 6LoWPANs, such as the IETF ROLL WG. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6606"/>
          <seriesInfo name="DOI" value="10.17487/RFC6606"/>
        </reference>
        <reference anchor="I-D.ietf-roll-capabilities">
          <front>
            <title>RPL Capabilities</title>
            <author fullname="Rahul Jadhav" initials="R." surname="Jadhav">
              <organization>Huawei</organization>
            </author>
            <author fullname="Pascal Thubert" initials="P." surname="Thubert">
              <organization>Cisco Systems, Inc</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Rabi Narayan Sahoo" initials="R. N." surname="Sahoo">
              <organization>Juniper</organization>
            </author>
            <date day="9" month="November" year="2021"/>
            <abstract>
              <t>   This draft enables the discovery, advertisement and query of
   capabilities for RPL nodes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-roll-capabilities-09"/>
        </reference>
      </references>
    </references>
    <?line 243?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
