<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-roll-efficient-npdao-18" indexInclude="true" ipr="trust200902" number="9009" prepTime="2021-04-09T15:06:39" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="4" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-roll-efficient-npdao-18" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9009" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Efficient Route Invalidation">Efficient Route Invalidation</title>
    <seriesInfo name="RFC" value="9009" stream="IETF"/>
    <author fullname="Rahul Arvind Jadhav" initials="R.A." role="editor" surname="Jadhav">
      <organization showOnFrontPage="true">Huawei</organization>
      <address>
        <postal>
          <street>Kundalahalli Village</street>
          <extaddr>Whitefield</extaddr>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560037</code>
          <country>India</country>
        </postal>
        <phone>+91-080-49160700</phone>
        <email>rahul.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="P" surname="Thubert" fullname="Pascal Thubert">
      <organization abbrev="Cisco" showOnFrontPage="true">Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <extaddr>Building D</extaddr>
          <street>45 Allee des Ormes - BP1200</street>
          <city>MOUGINS - Sophia Antipolis</city>
          <code>06254</code>
          <country>France</country>
        </postal>
        <phone>+33-497-23-26-34</phone>
        <email>pthubert@cisco.com</email>
      </address>
    </author>
    <author fullname="Rabi Narayan Sahoo" initials="R.N." surname="Sahoo">
      <organization showOnFrontPage="true">Huawei</organization>
      <address>
        <postal>
          <extaddr>Whitefield</extaddr>
          <street>Kundalahalli Village</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560037</code>
          <country>India</country>
        </postal>
        <phone>+91-080-49160700</phone>
        <email>rabinarayans0828@gmail.com</email>
      </address>
    </author>
    <author initials="Z" surname="Cao" fullname="Zhen Cao">
      <organization showOnFrontPage="true">Huawei</organization>
      <address>
        <postal>
          <street>W Chang'an Ave</street>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhencao.ietf@gmail.com</email>
      </address>
    </author>
    <date month="04" year="2021"/>
    <keyword>NPDAO</keyword>
    <keyword>DCO</keyword>
    <keyword>no-path</keyword>
    <keyword>route</keyword>
    <keyword>cleanup</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
        This document explains the problems associated with the use of
        No-Path Destination Advertisement Object (NPDAO) messaging in RFC 6550 and also discusses the requirements for an optimized
        route invalidation messaging scheme. Further, this document specifies a new proactive route
        invalidation message called the "Destination Cleanup Object" (DCO),
        which fulfills requirements for optimized route
        invalidation messaging.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9009" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2021 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language-and-t">Requirements Language and Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-rpl-npdao-messaging">RPL NPDAO Messaging</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.3">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.3.1"><xref derivedContent="1.3" format="counter" sectionFormat="of" target="section-1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-why-is-npdao-messaging-impo">Why Is NPDAO Messaging Important?</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-problems-with-the-rpl-npdao">Problems with the RPL NPDAO Messaging</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t indent="0" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-lost-npdao-due-to-link-brea">Lost NPDAO Due to Link Break to the Previous Parent</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t indent="0" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-invalidating-routes-of-depe">Invalidating Routes of Dependent Nodes</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.3">
                <t indent="0" pn="section-toc.1-1.2.2.3.1"><xref derivedContent="2.3" format="counter" sectionFormat="of" target="section-2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-possible-route-downtime-cau">Possible Route Downtime Caused by Asynchronous Operation of the NPDAO and DAO</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-for-npdao-opti">Requirements for NPDAO Optimization</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-req-1-remove-messaging-depe">Req. #1: Remove Messaging Dependency on the Link to the Previous  Parent</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-req-2-route-invalidation-fo">Req. #2: Route Invalidation for Dependent Nodes at the Parent Switching Node</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t indent="0" pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-req-3-route-invalidation-sh">Req. #3: Route Invalidation Should Not Impact Data Traffic</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-to-rpl-signaling">Changes to RPL Signaling</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-change-in-rpl-route-invalid">Change in RPL Route Invalidation Semantics</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-transit-information-option-">Transit Information Option Changes</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-destination-cleanup-object-">Destination Cleanup Object (DCO)</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-secure-dco">Secure DCO</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dco-options">DCO Options</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.3.1"><xref derivedContent="4.3.3" format="counter" sectionFormat="of" target="section-4.3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-path-sequence-in-the-dco">Path Sequence in the DCO</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.4">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.4.1"><xref derivedContent="4.3.4" format="counter" sectionFormat="of" target="section-4.3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-destination-cleanup-option-">Destination Cleanup Option Acknowledgment (DCO-ACK)</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.5">
                    <t indent="0" pn="section-toc.1-1.4.2.3.2.5.1"><xref derivedContent="4.3.5" format="counter" sectionFormat="of" target="section-4.3.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-secure-dco-ack">Secure DCO-ACK</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dco-base-rules">DCO Base Rules</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-unsolicited-dco">Unsolicited DCO</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t indent="0" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-other-considerations">Other Considerations</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.6.2">
                  <li pn="section-toc.1-1.4.2.6.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.6.2.1.1"><xref derivedContent="4.6.1" format="counter" sectionFormat="of" target="section-4.6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-invalidation-of-dependent-n">Invalidation of Dependent Nodes</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.6.2.2">
                    <t indent="0" pn="section-toc.1-1.4.2.6.2.2.1"><xref derivedContent="4.6.2" format="counter" sectionFormat="of" target="section-4.6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-npdao-and-dco-in-the-same-n">NPDAO and DCO in the Same Network</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.6.2.3">
                    <t indent="0" pn="section-toc.1-1.4.2.6.2.3.1"><xref derivedContent="4.6.3" format="counter" sectionFormat="of" target="section-4.6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-considerations-for-dco-retr">Considerations for DCO Retries</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.6.2.4">
                    <t indent="0" pn="section-toc.1-1.4.2.6.2.4.1"><xref derivedContent="4.6.4" format="counter" sectionFormat="of" target="section-4.6.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-dco-with-multiple-preferred">DCO with Multiple Preferred Parents</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-new-registry-for-the-destin">New Registry for the Destination Cleanup Object (DCO) Flags</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-new-registry-for-the-destina">New Registry for the Destination Cleanup Object (DCO) Acknowledgment Flags</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-rpl-rejection-status-values">RPL Rejection Status Values</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-messaging">Example Messaging</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="A.1" format="counter" sectionFormat="of" target="section-a.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-dco-messaging">Example DCO Messaging</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="A.2" format="counter" sectionFormat="of" target="section-a.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-example-dco-messaging-with-">Example DCO Messaging with Multiple Preferred Parents</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
            RPL (the Routing Protocol for Low-Power and Lossy Networks) as defined in
            <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>
            specifies a proactive distance-vector-based routing
            scheme. RPL has optional messaging in the form of DAO
            (Destination Advertisement Object) messages, which the 6LBR (6LoWPAN Border Router) and 6LR (6LoWPAN Router) can use to learn a route
            towards the downstream nodes. ("6LoWPAN" stands for "IPv6 over Low-Power Wireless Personal Area Network".) In Storing mode, DAO messages would
            result in routing entries being created on all intermediate 6LRs
            from a node's parent all the way towards the 6LBR.
      </t>
      <t indent="0" pn="section-1-2">
            RPL allows the use of No-Path DAO (NPDAO) messaging to invalidate a
            routing path corresponding to the given target, thus releasing
            resources utilized on that path. An NPDAO is a DAO message with a
            route lifetime of zero.  It originates at the target node and always
            flows upstream towards the 6LBR. This document explains the
            problems associated with the use of NPDAO messaging in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> and
            also discusses the requirements for an optimized route invalidation
            messaging scheme. Further, this document specifies a new proactive route invalidation
            message called the "Destination Cleanup Object" (DCO),
            which fulfills requirements for optimized route invalidation
            messaging.
      </t>
      <t indent="0" pn="section-1-3">
            This document only caters to RPL's Storing Mode of Operation
            (MOP). The Non-Storing MOP does not require the use of an NPDAO for route
            invalidation, since routing entries are not maintained on 6LRs.
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.1">
        <name slugifiedName="name-requirements-language-and-t">Requirements Language and Terminology</name>
        <t indent="0" pn="section-1.1-1">The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
        "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>",
        "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>",
        "<bcp14>SHOULD NOT</bcp14>",
        "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
        "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document
        are to be interpreted as described in BCP 14
        <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only
        when, they appear in all capitals, as shown here.</t>
        <t indent="0" pn="section-1.1-2">
                This specification requires readers to be familiar with all the
                terms and concepts that are discussed in "RPL: IPv6 Routing
                Protocol for Low-Power and Lossy Networks" <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>.
        </t>
        <dl newline="true" spacing="normal" indent="3" pn="section-1.1-3">
          <dt pn="section-1.1-3.1">Low-Power and Lossy Network (LLN):</dt>
          <dd pn="section-1.1-3.2">
              A network in which both the routers and their
              interconnects are constrained. LLN routers typically
              operate with constraints on processing power, memory,
              and energy (battery power). Their interconnects are
              characterized by high loss rates, low data rates, and
              instability.
          </dd>
          <dt pn="section-1.1-3.3">6LoWPAN Router (6LR):</dt>
          <dd pn="section-1.1-3.4">
              An intermediate router that is able to send and receive Router
              Advertisements (RAs) and Router Solicitations (RSs) as well as
              forward and route IPv6 packets.
          </dd>
          <dt pn="section-1.1-3.5">Directed Acyclic Graph (DAG):</dt>
          <dd pn="section-1.1-3.6">
              A directed graph having the property that all edges are
              oriented in such a way that no cycles exist.
          </dd>
          <dt pn="section-1.1-3.7">Destination-Oriented DAG (DODAG):</dt>
          <dd pn="section-1.1-3.8">
              A DAG rooted at a single destination, i.e., at a single
              DAG root with no outgoing edges.
          </dd>
          <dt pn="section-1.1-3.9">6LoWPAN Border Router (6LBR):</dt>
          <dd pn="section-1.1-3.10">
              A border router that is a DODAG root and is the edge
              node for traffic flowing in and out of the 6LoWPAN.
          </dd>
          <dt pn="section-1.1-3.11">Destination Advertisement Object (DAO):</dt>
          <dd pn="section-1.1-3.12">
              DAO messaging allows downstream routes to the nodes to
              be established.
          </dd>
          <dt pn="section-1.1-3.13">DODAG Information Object (DIO):</dt>
          <dd pn="section-1.1-3.14">
              DIO messaging allows upstream routes to the 6LBR to be
              established. DIO messaging is initiated at the DAO
              root.
          </dd>
          <dt pn="section-1.1-3.15">Common ancestor node:</dt>
          <dd pn="section-1.1-3.16">
              A 6LR/6LBR node that is the first common node between
              two paths of a target node.
          </dd>
          <dt pn="section-1.1-3.17">No-Path DAO (NPDAO):</dt>
          <dd pn="section-1.1-3.18">
              A DAO message that has a target with a lifetime of 0. Used for
              the purpose of route invalidation.
          </dd>
          <dt pn="section-1.1-3.19">Destination Cleanup Object (DCO):</dt>
          <dd pn="section-1.1-3.20">
              A new RPL control message code defined by this
              document. DCO messaging improves proactive route
              invalidation in RPL.
          </dd>
          <dt pn="section-1.1-3.21">Regular DAO:</dt>
          <dd pn="section-1.1-3.22">
              A DAO message with a non-zero lifetime. Routing
              adjacencies are created or updated based on this
              message.
          </dd>
          <dt pn="section-1.1-3.23">Target node:</dt>
          <dd pn="section-1.1-3.24">
              The node switching its parent whose routing adjacencies
              are updated (created/removed).
          </dd>
        </dl>
      </section>
      <section anchor="current_npdao" numbered="true" toc="include" removeInRFC="false" pn="section-1.2">
        <name slugifiedName="name-rpl-npdao-messaging">RPL NPDAO Messaging</name>
        <t indent="0" pn="section-1.2-1">
                RPL uses NPDAO messaging in Storing mode so that the node
                changing its routing adjacencies can invalidate the previous
                route. This is needed so that nodes along the previous path can
                release any resources (such as the routing entry) they maintain
                on behalf of the target node.
        </t>
        <t indent="0" pn="section-1.2-2">
        Throughout this document, we will refer to the topology shown in <xref target="sample_top" format="default" sectionFormat="of" derivedContent="Figure 1"/>:
        </t>
        <figure anchor="sample_top" align="left" suppress-title="false" pn="figure-1">
          <name slugifiedName="name-sample-topology">Sample Topology</name>
          <artwork align="center" name="" type="" alt="" pn="section-1.2-3.1">
   (6LBR)
     |
     |
     |
    (A)
    / \
   /   \
  /     \
(G)     (H)
 |       |
 |       |
 |       |
(B)     (C)
  \      ;
   \    ;
    \  ;
     (D)
     / \
    /   \
   /     \
 (E)     (F)</artwork>
        </figure>
        <t indent="0" pn="section-1.2-4">
                Node D is connected via preferred parent B. D has an
                alternate path via C towards the 6LBR. Node A is the common
                ancestor for D for paths through B-G and C-H. When
                D switches from B to C, RPL allows sending an NPDAO to B
                and a regular DAO to C.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-1.3">
        <name slugifiedName="name-why-is-npdao-messaging-impo">Why Is NPDAO Messaging Important?</name>
        <t indent="0" pn="section-1.3-1">
                Resources in LLN nodes are typically constrained. There is limited
                memory available, and routing entry records are one of the
                primary elements occupying dynamic memory in the nodes. Route
                invalidation helps 6LR nodes to decide which routing entries can be
                discarded for better use of the limited resources. Thus, it
                becomes necessary to have an efficient route invalidation
                mechanism. Also note that a single parent switch may result in
                a "subtree" switching from one parent to another. Thus, the
                route invalidation needs to be done on behalf of the subtree
                and not the switching node alone. In the above example, when
                Node D switches its parent, route updates need to be done
                for the routing table entries of C, H, A, G, and B with
                destinations D, E, and F. Without efficient route
                invalidation, a 6LR may have to hold a lot of stale route
                entries.
        </t>
      </section>
    </section>
    <section anchor="current_npdao_problems" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-problems-with-the-rpl-npdao">Problems with the RPL NPDAO Messaging</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-lost-npdao-due-to-link-brea">Lost NPDAO Due to Link Break to the Previous Parent</name>
        <t indent="0" pn="section-2.1-1">
                When a node switches its parent, the NPDAO is to be sent to
                its previous parent and a regular DAO to its new parent. In
                cases where the node switches its parent because of transient
                or permanent parent link/node failure, the NPDAO message may
                not be received by the parent.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-invalidating-routes-of-depe">Invalidating Routes of Dependent Nodes</name>
        <t indent="0" pn="section-2.2-1">
                RPL does not specify how route invalidation will work for
                dependent nodes in the switching node subDAG, resulting in
                stale routing entries of the dependent nodes. The only way for a
                6LR to invalidate the route entries for dependent nodes would
                be to use route lifetime expiry, which could be substantially
                high for LLNs.
        </t>
        <t indent="0" pn="section-2.2-2">
                In the example topology, when Node D switches its parent,
                Node D generates an NPDAO on its own behalf. There is no NPDAO
                generated by the dependent child Nodes E and F, through the
                previous path via D to B and G, resulting in stale
                entries on Nodes B and G for Nodes E and F.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.3">
        <name slugifiedName="name-possible-route-downtime-cau">Possible Route Downtime Caused by Asynchronous Operation of the NPDAO and DAO</name>
        <t indent="0" pn="section-2.3-1">
                A switching node may generate both an NPDAO and a DAO via two
                different paths at almost the same time. It is possible
                that the NPDAO may invalidate the previous route and
                the regular DAO sent via the new path gets lost on the way.
                This may result in route downtime, impacting downward
                traffic for the switching node.
        </t>
        <t indent="0" pn="section-2.3-2">
                In the example topology, say that Node D switches from parent
                B to C. An NPDAO sent via the previous route may invalidate
                the previous route, whereas there is no way to determine whether
                the new DAO has successfully updated the route entries on the
                new path.
        </t>
      </section>
    </section>
    <section anchor="requirements" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-requirements-for-npdao-opti">Requirements for NPDAO Optimization</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-req-1-remove-messaging-depe">Req. #1: Remove Messaging Dependency on the Link to the Previous  Parent</name>
        <t indent="0" pn="section-3.1-1">
                When the switching node sends the NPDAO message to the previous
                parent, it is normal that the link to the previous parent is
                prone to failure (that's why the node decided to switch).
                Therefore, it is required that the route invalidation does not
                depend on the previous link, which is prone to failure. The
                previous link referred to here represents the link between the
                node and its previous parent (from which the node is now
                disassociating).
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-req-2-route-invalidation-fo">Req. #2: Route Invalidation for Dependent Nodes at the Parent Switching Node</name>
        <t indent="0" pn="section-3.2-1">
                It should be possible to do route invalidation for dependent
                nodes rooted at the switching node.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-req-3-route-invalidation-sh">Req. #3: Route Invalidation Should Not Impact Data Traffic</name>
        <t indent="0" pn="section-3.3-1">
                While sending the NPDAO and DAO messages, it is possible that
                the NPDAO successfully invalidates the previous path, while the
                newly sent DAO gets lost (new path not set up successfully).
                This will result in downstream unreachability to the node
                switching paths. Therefore, it is desirable that the route
                invalidation is synchronized with the DAO to avoid the risk of
                route downtime.
        </t>
      </section>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-changes-to-rpl-signaling">Changes to RPL Signaling</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-change-in-rpl-route-invalid">Change in RPL Route Invalidation Semantics</name>
        <t indent="0" pn="section-4.1-1">
                As described in <xref target="current_npdao" format="default" sectionFormat="of" derivedContent="Section 1.2"/>, the NPDAO
                originates at the node changing to a new parent and traverses
                upstream towards the root. In order to solve the problems
                discussed in <xref target="current_npdao_problems" format="default" sectionFormat="of" derivedContent="Section 2"/>, this
                document adds a new proactive route invalidation message
                called the "Destination Cleanup Object" (DCO), which originates at a
                common ancestor node and flows downstream the
                old path. The common ancestor node generates a DCO when removing
                a next hop to a target -- for instance, as a delayed response to
                receiving a regular DAO from another child node with a Path
                Sequence for the target that is the same or newer, in which case the DCO transmission is canceled.
        </t>
        <t indent="0" pn="section-4.1-2">
                The 6LRs in the path for the DCO take such action as route
                invalidation based on the DCO information and subsequently send
                another DCO with the same information downstream to the next
                hop(s). This operation is similar to how the DAOs are handled on
                intermediate 6LRs in the Storing MOP <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>.
                Just like the DAO in the Storing MOP, the DCO is sent using link-local
                unicast source and destination IPv6 addresses. Unlike the DAO, which
                always travels upstream, the DCO always travels downstream.
        </t>
        <t indent="0" pn="section-4.1-3">
                In <xref target="sample_top" format="default" sectionFormat="of" derivedContent="Figure 1"/>, when child Node D decides to
                switch the path from parent B to parent C, it sends a regular DAO to Node C
                with reachability information containing the address of D as
                the target and an incremented Path Sequence. Node C will update
                the routing table based on the reachability information in the
                DAO and will in turn generate another DAO with the same reachability
                information and forward it to H. Node H recursively follows the same
                procedure as Node C and forwards it to Node A. When Node A
                receives the regular DAO, it finds that it already has a
                routing table entry on behalf of the Target Address of Node D.
                It finds, however, that the next-hop information for reaching
                Node D has changed, i.e., Node D has decided to change the
                paths. In this case, Node A, which is the common ancestor node
                for Node D along the two paths (previous and new), can
                generate a DCO that traverses the network downwards over the
                old path to the target. Node A handles normal DAO forwarding to
                the 6LBR as required by <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>.
        </t>
      </section>
      <section anchor="transit_opt_changes" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-transit-information-option-">Transit Information Option Changes</name>
        <t indent="0" pn="section-4.2-1">
                Every RPL message is divided into base message fields and
                additional options, as described in <xref target="RFC6550" section="6" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-6" derivedContent="RFC6550"/>. The base fields apply to the message as a
                whole, and options are appended to add message-specific /
                use-case-specific
                attributes. As an example, a DAO message may be attributed by
                one or more "RPL Target" options that specify that the reachability
                information is for the given targets. Similarly, a Transit
                Information option may be associated with a set of RPL Target
                options.
        </t>
        <t indent="0" pn="section-4.2-2">
                This document specifies a change in the Transit Information option to
                contain the "Invalidate previous route" (I) flag. This 'I' flag signals
                the common ancestor node to generate a DCO on behalf of the
                target node with a RPL Status of 195, indicating that the address
                has moved. The 'I' flag is carried in the Transit Information
                option, which augments the reachability information for a given
                set of one or more RPL Targets. A Transit Information option with the 'I' flag
                set should be carried in the DAO message when route
                invalidation is sought for the corresponding target or targets.
        </t>
        <t indent="0" pn="section-4.2-3">
                Value 195 represents the 'U' and 'A' bits in RPL Status, to be set as
                per Figure 6 of <xref target="RFC9010" format="default" sectionFormat="of" derivedContent="RFC9010"/>,
                with the lower 6 bits set to the 6LoWPAN Neighbor Discovery (ND)
                Extended Address Registration Option (EARO) Status value of 3
                indicating 'Moved' as per Table 1 of <xref target="RFC8505" format="default" sectionFormat="of" derivedContent="RFC8505"/>.
        </t>
        <figure anchor="transit_info_with_i" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-updated-transit-information">Updated Transit Information Option (New 'I' Flag Added)</name>
          <artwork align="center" name="" type="" alt="" pn="section-4.2-4.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Type = 0x06 | Option Length |E|I|  Flags    | Path Control  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Path Sequence | Path Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
        </figure>
        <dl indent="3" newline="false" spacing="normal" pn="section-4.2-5">
          <dt pn="section-4.2-5.1">I (Invalidate previous route) flag:</dt>
          <dd pn="section-4.2-5.2">The 'I' flag is set by the
                target node to indicate to the common ancestor node that it
                wishes to invalidate any previous route between the two paths.
              </dd>
        </dl>
        <t indent="0" pn="section-4.2-6">
                <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> allows the parent address to be sent in
                the Transit Information option, depending on the MOP.
                In the case of the Storing MOP, the field is
                usually not needed. In the case of a DCO, the Parent Address field
                <bcp14>MUST NOT</bcp14> be included.
        </t>
        <t indent="0" pn="section-4.2-7">
                Upon receiving a DAO message with a Transit Information option that has the 'I' flag set,
                and as a delayed response removing a routing adjacency to the target indicated in the Transit Information option,
                the common ancestor node <bcp14>SHOULD</bcp14> generate a DCO message
                to the next hop associated to that adjacency. The 'I' flag is
                intended to give the target node control over its own route
                invalidation, serving as a signal to request DCO generation.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-destination-cleanup-object-">Destination Cleanup Object (DCO)</name>
        <t indent="0" pn="section-4.3-1">
                A new ICMPv6 RPL control message code is defined by this
                specification and is referred to as the "Destination Cleanup Object"
                (DCO), which is used for proactive cleanup of state and routing
                information held on behalf of the target node by 6LRs. The DCO
                message always traverses downstream and cleans up route
                information and other state information associated with the
                given target.  The format of the DCO message is shown in
                <xref target="dco_obj" format="default" sectionFormat="of" derivedContent="Figure 3"/>.
        </t>
        <figure anchor="dco_obj" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-dco-base-object">DCO Base Object</name>
          <artwork align="center" name="" type="" alt="" pn="section-4.3-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RPLInstanceID |K|D|   Flags   |   RPL Status  | DCOSequence   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                      DODAGID (optional)                       +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|   Option(s)...
+-+-+-+-+-+-+-+-+</artwork>
        </figure>
        <dl indent="3" newline="false" spacing="normal" pn="section-4.3-3">
          <dt pn="section-4.3-3.1"> RPLInstanceID:</dt>
          <dd pn="section-4.3-3.2">8-bit field indicating the topology instance
                associated with the DODAG, as learned from the DIO.
        </dd>
          <dt pn="section-4.3-3.3">
                K:</dt>
          <dd pn="section-4.3-3.4">The 'K' flag indicates that the recipient of a DCO message is
                expected to send a DCO-ACK back. If the DCO-ACK is not received
                even after setting the 'K' flag, an implementation may retry
                the DCO at a later time. The number of retries is
                implementation and deployment dependent and is expected to be
                kept similar to the number of DAO retries <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>. <xref target="dco_retry" format="default" sectionFormat="of" derivedContent="Section 4.6.3"/> specifies
                the considerations for DCO retries. A node receiving a DCO
                message without the 'K' flag set <bcp14>MAY</bcp14> respond with a DCO-ACK,
                especially to report an error condition. An example error
                condition could be that the node sending the DCO-ACK does not
                find the routing entry for the indicated target. When the
                sender does not set the 'K' flag, it is an indication that the
                sender does not expect a response, and the sender <bcp14>SHOULD NOT</bcp14>
                retry the DCO.
        </dd>
          <dt pn="section-4.3-3.5">
                D:</dt>
          <dd pn="section-4.3-3.6">The 'D' flag indicates that the DODAGID field is present.
                This flag <bcp14>MUST</bcp14> be set when a local RPLInstanceID is used.
        </dd>
          <dt pn="section-4.3-3.7">
                Flags:</dt>
          <dd pn="section-4.3-3.8">The 6 bits remaining unused in the Flags field are
                reserved for future use. These bits <bcp14>MUST</bcp14> be initialized to zero by
                the sender and <bcp14>MUST</bcp14> be ignored by the receiver.
        </dd>
          <dt pn="section-4.3-3.9">
                RPL Status:</dt>
          <dd pn="section-4.3-3.10">As defined in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> and updated
                in <xref target="RFC9010" format="default" sectionFormat="of" derivedContent="RFC9010"/>. The root or
                common parent that generates a DCO is authoritative for setting
                the status information, and the information is unchanged as
                propagated down the DODAG. This document does not specify a
                differentiated action based on the RPL Status.
        </dd>
          <dt pn="section-4.3-3.11">
                DCOSequence:</dt>
          <dd pn="section-4.3-3.12">8-bit field incremented at each unique DCO message
                from a node and echoed in the DCO-ACK message. The initial
                DCOSequence can be chosen randomly by the node. <xref target="base_rules" format="default" sectionFormat="of" derivedContent="Section 4.4"/> explains the handling of the
                DCOSequence.
        </dd>
          <dt pn="section-4.3-3.13">
                DODAGID (optional):</dt>
          <dd pn="section-4.3-3.14">128-bit unsigned integer set by a DODAG
                root that uniquely identifies a DODAG. This field <bcp14>MUST</bcp14> be
                present when the 'D' flag is set and <bcp14>MUST NOT</bcp14> be present if the 'D'
                flag is not set. The DODAGID is used when a local RPLInstanceID is
                in use, in order to identify the DODAGID that is associated
                with the RPLInstanceID.
              </dd>
        </dl>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.1">
          <name slugifiedName="name-secure-dco">Secure DCO</name>
          <t indent="0" pn="section-4.3.1-1">
          A Secure DCO message follows the format shown in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>, Figure 7, where the base message
          format is the DCO message shown in <xref target="dco_obj" format="default" sectionFormat="of" derivedContent="Figure 3"/>
          of this document.
          </t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.2">
          <name slugifiedName="name-dco-options">DCO Options</name>
          <t indent="0" pn="section-4.3.2-1">
          The DCO message <bcp14>MUST</bcp14> carry at least one RPL Target and the
          Transit Information option and <bcp14>MAY</bcp14> carry other valid
          options. This specification allows for the DCO message to
          carry the following options:
          </t>
          <dl newline="false" spacing="compact" indent="3" pn="section-4.3.2-2">
            <dt pn="section-4.3.2-2.1">0x00</dt>
            <dd pn="section-4.3.2-2.2">Pad1</dd>
            <dt pn="section-4.3.2-2.3">0x01</dt>
            <dd pn="section-4.3.2-2.4">PadN</dd>
            <dt pn="section-4.3.2-2.5">0x05</dt>
            <dd pn="section-4.3.2-2.6">RPL Target</dd>
            <dt pn="section-4.3.2-2.7">0x06</dt>
            <dd pn="section-4.3.2-2.8">Transit Information</dd>
            <dt pn="section-4.3.2-2.9">0x09</dt>
            <dd pn="section-4.3.2-2.10">RPL Target Descriptor</dd>
          </dl>
          <t indent="0" pn="section-4.3.2-3">
          <xref target="RFC6550" section="6.7" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-6.7" derivedContent="RFC6550"/> defines all the
          above-mentioned options. The DCO carries a RPL Target
          option and an associated Transit Information option with a
          lifetime of 0x00000000 to indicate a loss of reachability
          to that target.
          </t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.3">
          <name slugifiedName="name-path-sequence-in-the-dco">Path Sequence in the DCO</name>
          <t indent="0" pn="section-4.3.3-1">
          A DCO message includes a Transit Information option for each invalidated path.
          The value of the Path Sequence counter in the Transit Information option allows identification of the freshness of the DCO
          message versus the newest known to the 6LRs along the path being removed.
          If the DCO is generated by a common parent in response to a DAO message, then the Transit Information option in
          the DCO <bcp14>MUST</bcp14> use the value of the Path Sequence as found
          in the newest Transit Information option that was received for that target by the common parent.
          If a 6LR down the path receives a DCO with a Path Sequence that is not newer than
          the Path Sequence as known from a Transit Information option in a DAO message, then the 6LR
          <bcp14>MUST NOT</bcp14> remove its current routing state, and it <bcp14>MUST NOT</bcp14> forward the DCO
          down a path where it is not newer. If the DCO is newer, the 6LR may
          retain a temporary state to ensure that a DAO that is received later
          with a Transit Information option with an older sequence number is ignored. A Transit Information option in a DAO message
          that is as new as or newer than that in a DCO wins, meaning that the path indicated in the DAO is installed and the DAO is propagated. When the DCO is propagated upon a
          DCO from an upstream parent, the Path Sequence <bcp14>MUST</bcp14> be copied
          from the received DCO.
          </t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.4">
          <name slugifiedName="name-destination-cleanup-option-">Destination Cleanup Option Acknowledgment (DCO-ACK)</name>
          <t indent="0" pn="section-4.3.4-1">
          The DCO-ACK message <bcp14>SHOULD</bcp14> be sent as a unicast packet by a
          DCO recipient in response to a unicast DCO message with the 'K'
          flag set. If the 'K' flag is not set, then the receiver of the
          DCO message <bcp14>MAY</bcp14> send a DCO-ACK, especially to report an error
          condition. The format of the DCO-ACK message is shown in
          <xref target="dco_ack" format="default" sectionFormat="of" derivedContent="Figure 4"/>.
          </t>
          <figure anchor="dco_ack" align="left" suppress-title="false" pn="figure-4">
            <name slugifiedName="name-dco-ack-base-object">DCO-ACK Base Object</name>
            <artwork align="center" name="" type="" alt="" pn="section-4.3.4-2.1">
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RPLInstanceID |D|   Flags     |  DCOSequence  | DCO-ACK Status|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+                                                               +
|                                                               |
+                      DODAGID (optional)                       +
|                                                               |
+                                                               +
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
          </figure>
          <dl indent="3" newline="false" spacing="normal" pn="section-4.3.4-3">
            <dt pn="section-4.3.4-3.1">
          RPLInstanceID:</dt>
            <dd pn="section-4.3.4-3.2">8-bit field indicating the topology instance
          associated with the DODAG, as learned from the DIO.
          </dd>
            <dt pn="section-4.3.4-3.3">
          D:</dt>
            <dd pn="section-4.3.4-3.4">The 'D' flag indicates that the DODAGID field is present.
          This flag <bcp14>MUST</bcp14> be set when a local RPLInstanceID is used.
          </dd>
            <dt pn="section-4.3.4-3.5">
          Flags:</dt>
            <dd pn="section-4.3.4-3.6">7-bit unused field. The field <bcp14>MUST</bcp14> be initialized to
          zero by the sender and <bcp14>MUST</bcp14> be ignored by the receiver.
          </dd>
            <dt pn="section-4.3.4-3.7">
          DCOSequence:</dt>
            <dd pn="section-4.3.4-3.8">8-bit field. The DCOSequence in the DCO-ACK is
          copied from the DCOSequence received in the DCO message.
          </dd>
            <dt pn="section-4.3.4-3.9">
          DCO-ACK Status:</dt>
            <dd pn="section-4.3.4-3.10">Indicates completion status. The DCO-ACK Status field is defined based on Figure 6 of <xref target="RFC9010" format="default" sectionFormat="of" derivedContent="RFC9010"/> defining the RPL Status Format. A StatusValue of 0 along with the 'U' bit set to 0 indicates Success / Unqualified acceptance as per Figure 6 of <xref target="RFC9010" format="default" sectionFormat="of" derivedContent="RFC9010"/>. A StatusValue of 1 with the 'U' bit set to 1 indicates 'No routing entry' as defined in <xref target="rpl_reject_status" format="default" sectionFormat="of" derivedContent="Section 5.3"/> of this document.
          </dd>
            <dt pn="section-4.3.4-3.11">
          DODAGID (optional):</dt>
            <dd pn="section-4.3.4-3.12">128-bit unsigned integer set by a DODAG
          root that uniquely identifies a DODAG. This field <bcp14>MUST</bcp14> be
          present when the 'D' flag is set and <bcp14>MUST NOT</bcp14> be present
          when the 'D' flag is not set. The DODAGID is used when a local
          RPLInstanceID is in use, in order to identify the DODAGID
          that is associated with the RPLInstanceID.
                  </dd>
          </dl>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.3.5">
          <name slugifiedName="name-secure-dco-ack">Secure DCO-ACK</name>
          <t indent="0" pn="section-4.3.5-1">
          A Secure DCO-ACK message follows the format shown in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>, Figure 7, where the base message
          format is the DCO-ACK message shown in <xref target="dco_ack" format="default" sectionFormat="of" derivedContent="Figure 4"/> of this document.
          </t>
        </section>
      </section>
      <section anchor="base_rules" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-dco-base-rules">DCO Base Rules</name>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4.4-1"><li pn="section-4.4-1.1" derivedCounter="1.">
              If a node sends a DCO message with newer or different
              information than the prior DCO message transmission, it
              <bcp14>MUST</bcp14> increment the DCOSequence field by at least one.
              A DCO message transmission that is identical to the
              prior DCO message transmission <bcp14>MAY</bcp14> increment the
              DCOSequence field. The DCOSequence counter follows the
              sequence counter operation as defined in
              <xref target="RFC6550" section="7.2" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-7.2" derivedContent="RFC6550"/>.
          </li>
          <li pn="section-4.4-1.2" derivedCounter="2.">
              The RPLInstanceID and DODAGID fields of a DCO message
              <bcp14>MUST</bcp14> have the same values as those contained in the DAO message in
              response to which the DCO is generated on the common
              ancestor node.
          </li>
          <li pn="section-4.4-1.3" derivedCounter="3.">
              A node <bcp14>MAY</bcp14> set the 'K' flag in a unicast DCO message to
              solicit a unicast DCO-ACK in response, in order to
              confirm the attempt.
          </li>
          <li pn="section-4.4-1.4" derivedCounter="4.">
              A node receiving a unicast DCO message with the 'K'
              flag set <bcp14>SHOULD</bcp14> respond with a DCO-ACK. A node
              receiving a DCO message without the 'K' flag set <bcp14>MAY</bcp14>
              respond with a DCO-ACK, especially to report an error
              condition.
          </li>
          <li pn="section-4.4-1.5" derivedCounter="5.">
              A node receiving a unicast DCO message <bcp14>MUST</bcp14> verify the
              stored Path Sequence in context to the given target. If
              the stored Path Sequence is as new as or newer than
              the Path Sequence received in the DCO, then the DCO
              <bcp14>MUST</bcp14> be dropped.
          </li>
          <li pn="section-4.4-1.6" derivedCounter="6.">
              A node that sets the 'K' flag in a unicast DCO message
              but does not receive a DCO-ACK in response <bcp14>MAY</bcp14> reschedule
              the DCO message transmission for another attempt, up
              until an implementation-specific number of retries.
          </li>
          <li pn="section-4.4-1.7" derivedCounter="7.">
              A node receiving a unicast DCO message with its own
              address in the RPL Target option <bcp14>MUST</bcp14> strip off that
              Target option. If this Target option is the only one in
              the DCO message, then the DCO message <bcp14>MUST</bcp14> be dropped.
          </li>
        </ol>
        <t indent="0" pn="section-4.4-2">
                The scope of DCOSequence values is unique to the node that
                generates them.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-unsolicited-dco">Unsolicited DCO</name>
        <t indent="0" pn="section-4.5-1">
                A 6LR may generate an unsolicited DCO to unilaterally clean up
                the path on behalf of the target entry. The 6LR has all the
                state information, namely, the Target Address and the Path
                Sequence, required for generating a DCO in its routing table.
                The conditions under which a 6LR may generate an unsolicited DCO are
                beyond the scope of this document, but possible reasons
                could be as follows:
        </t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4.5-2"><li pn="section-4.5-2.1" derivedCounter="1.">
              On route expiry of an entry, a 6LR may decide to
              graciously clean up the entry by initiating a DCO.
          </li>
          <li pn="section-4.5-2.2" derivedCounter="2.">
              A 6LR needs to entertain higher-priority entries in case
              the routing table is full, thus resulting in eviction
              of an existing routing entry. In this case, the eviction
              can be handled graciously by using a DCO.
          </li>
        </ol>
        <t indent="0" pn="section-4.5-3">
          A DCO that is generated asynchronously to a DAO message and is meant to
          discard all state along the path regardless of the Path Sequence <bcp14>MUST</bcp14>
          use a Path Sequence value of 240 (see <xref target="RFC6550" section="7.2" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-7.2" derivedContent="RFC6550"/>).
          This value allows the DCO to win against any established DAO path but
          to lose against a DAO path that is being installed.
          Note that if an ancestor initiates a unilateral path cleanup on an
          established path using a DCO with a Path Sequence value of 240, the
          DCO will eventually reach the target node, which will thus be informed
          of the path invalidation.
        </t>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-4.6">
        <name slugifiedName="name-other-considerations">Other Considerations</name>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.6.1">
          <name slugifiedName="name-invalidation-of-dependent-n">Invalidation of Dependent Nodes</name>
          <t indent="0" pn="section-4.6.1-1">
          The RPL specification <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> does not provide a
          mechanism for route invalidation for dependent nodes. This
          document allows the invalidation of dependent nodes. Dependent
          nodes will generate their respective DAOs to update their
          paths, and the previous route invalidation for those nodes
          should work in a manner similar to what is described for a switching
          node. The dependent node may set the 'I' flag in the Transit
          Information option as part of a regular DAO so as to
          request invalidation of the previous route from the common
          ancestor node.
          </t>
          <t indent="0" pn="section-4.6.1-2">
          Dependent nodes do not have any indication regarding whether any
          of their parents have in turn decided to switch their
          parent. Thus, for route invalidation, the dependent nodes may
          choose to always set the 'I' flag in all their DAO messages'
          Transit Information options. Note that setting the 'I' flag is
          not counterproductive even if there is no previous
          route to be invalidated.
          </t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.6.2">
          <name slugifiedName="name-npdao-and-dco-in-the-same-n">NPDAO and DCO in the Same Network</name>
          <t indent="0" pn="section-4.6.2-1">
          The NPDAO mechanism provided in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> can
          still be used in the same network where a DCO is used.
          NPDAO messaging can be used, for example, on route lifetime
          expiry of the target or when the node simply decides to
          gracefully terminate the RPL session on graceful node
          shutdown. Moreover, a deployment can have a mix of nodes
          supporting the DCO and the existing NPDAO mechanism. It is
          also possible that the same node supports both NPDAO
          and DCO signaling for route invalidation.
          </t>
          <t indent="0" pn="section-4.6.2-2">
          <xref target="RFC6550" section="9.8" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-9.8" derivedContent="RFC6550"/> states, "When a
          node removes a node from its DAO parent set, it <bcp14>SHOULD</bcp14>
          send a No-Path DAO message (Section 6.4.3) to that removed DAO parent to
          invalidate the existing route." This document introduces
          an alternative and more optimized way to perform route invalidation,
          but it also allows existing NPDAO messaging to work. Thus,
          an implementation has two choices to make when a route
          invalidation is to be initiated:
          </t>
          <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-4.6.2-3"><li pn="section-4.6.2-3.1" derivedCounter="1.">
                  Use an NPDAO to invalidate the previous route, and
                  send a regular DAO on the new path.
              </li>
            <li pn="section-4.6.2-3.2" derivedCounter="2.">
                  Send a regular DAO on the new path with the 'I'
                  flag set in the Transit Information option such
                  that the common ancestor node initiates the DCO
                  message downstream to invalidate the previous
                  route.
              </li>
          </ol>
          <t indent="0" pn="section-4.6.2-4">
          This document recommends using option 2, for the reasons
          specified in <xref target="requirements" format="default" sectionFormat="of" derivedContent="Section 3"/>
          of this document.
          </t>
          <t indent="0" pn="section-4.6.2-5">
          This document assumes that all the 6LRs in the network
          support this specification. If there are 6LR nodes that do not support this document that are in the path of the DCO message transmission, then the
          route invalidation for the corresponding targets (targets that are in the DCO message) may not work
          or may work partially. Alternatively, a node
          could generate an NPDAO if it does not receive a DCO with
          itself as the target within a specified time limit. The specified
          time limit is deployment specific and depends upon the
          maximum depth of the network and per-hop average latency.
          Note that sending an NPDAO and a DCO for the same operation
          would not result in unwanted side effects because the
          acceptability of an NPDAO or a DCO depends upon the Path
          Sequence freshness.
          </t>
        </section>
        <section anchor="dco_retry" numbered="true" toc="include" removeInRFC="false" pn="section-4.6.3">
          <name slugifiedName="name-considerations-for-dco-retr">Considerations for DCO Retries</name>
          <t indent="0" pn="section-4.6.3-1">
          A DCO message could be retried by a sender if it sets the
          'K' flag and does not receive a DCO-ACK. The DCO retry time
          could be dependent on the maximum depth of the network and
          average per-hop latency. This could range from 2 seconds to
          120 seconds, depending on the deployment. If the
          latency limits are not known, an implementation <bcp14>MUST NOT</bcp14>
          retry more than once in 3 seconds and <bcp14>MUST NOT</bcp14> retry more
          than three times.
          </t>
          <t indent="0" pn="section-4.6.3-2">
          The number of retries could also be set depending on how
          critical the route invalidation could be for the deployment
          and the link-layer retry configuration. For networks
          supporting only Multi-Point to Point (MP2P) and Point-to-Multipoint (P2MP) flows, such as in Advanced Metering Infrastructure (AMI) and
          telemetry applications, the 6LRs may not be very keen to
          invalidate routes, unless they are highly
          memory constrained. For home and building automation
          networks that may have substantial P2P traffic, the 6LRs
          might be keen to invalidate efficiently because it may
          additionally impact forwarding efficiency.
          </t>
        </section>
        <section numbered="true" toc="include" removeInRFC="false" pn="section-4.6.4">
          <name slugifiedName="name-dco-with-multiple-preferred">DCO with Multiple Preferred Parents</name>
          <t indent="0" pn="section-4.6.4-1">
          <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> allows a node to select multiple
          preferred parents for route establishment.
          <xref target="RFC6550" section="9.2.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-9.2.1" derivedContent="RFC6550"/> specifies, "All DAOs generated
          at the same time for the same target <bcp14>MUST</bcp14> be sent with the
          same Path Sequence in the Transit Information."
          Subsequently, when route invalidation has to be initiated,
          an NPDAO, which can be initiated with an
          updated Path Sequence to all the parent nodes through which
          the route is to be invalidated, can be used; see <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>.
          </t>
          <t indent="0" pn="section-4.6.4-2">
          With a DCO, the target node itself does not initiate the
          route invalidation; this is left to the common ancestor
          node. A common ancestor node when it discovers an updated
          DAO from a new next hop, it initiates a DCO. It is recommended
          that an implementation initiate a DCO after a time period (DelayDCO) such that
          the common ancestor node may receive updated DAOs from all
          possible next hops. This will help to reduce DCO control
          overhead, i.e., the common ancestor can wait for updated
          DAOs from all possible directions before initiating a DCO
          for route invalidation. After timeout, the DCO needs to be
          generated for all the next hops for which the route
          invalidation needs to be done.
          </t>
          <t indent="0" pn="section-4.6.4-3">
          This document recommends using a DelayDCO timer value of
          1 second. This value is inspired by the default DelayDAO timer value
          of 1 second <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>. Here, the hypothesis is
          that the DAOs from all possible parent sets would be
          received on the common ancestor within this time period.
          </t>
          <t indent="0" pn="section-4.6.4-4">
          It is still possible that a DCO is generated before all the
          updated DAOs from all the paths are received. In this case,
          the ancestor node would start the invalidation procedure
          for paths from which the updated DAO is not received. The
          DCO generated in this case would start invalidating the
          segments along these paths on which the updated DAOs are
          not received. But once the DAO reaches these segments, the
          routing state would be updated along these segments; this
          should not lead to any inconsistent routing states.
          </t>
          <t indent="0" pn="section-4.6.4-5">
          Note that there is no requirement for synchronization
          between a DCO and DAOs. The DelayDCO timer simply ensures
          that DCO control overhead can be reduced and is only
          needed when the network contains nodes using multiple
          preferred parents.
          </t>
        </section>
      </section>
    </section>
    <section anchor="IANA" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-5-1">
      IANA has allocated codes for the DCO and DCO-ACK
      messages from the "RPL Control Codes" registry.
      </t>
      <table align="center" pn="table-1">
        <name slugifiedName="name-new-codes-for-dco-and-dco-a">New Codes for DCO and DCO-ACK Messages</name>
        <thead>
          <tr>
            <th align="center" colspan="1" rowspan="1">Code</th>
            <th align="center" colspan="1" rowspan="1">Description</th>
            <th align="center" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x07</td>
            <td align="center" colspan="1" rowspan="1">Destination Cleanup Object</td>
            <td align="center" colspan="1" rowspan="1">This document</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x08</td>
            <td align="center" colspan="1" rowspan="1">Destination Cleanup Object Acknowledgment</td>
            <td align="center" colspan="1" rowspan="1">This document</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x87</td>
            <td align="center" colspan="1" rowspan="1">Secure Destination Cleanup Object</td>
            <td align="center" colspan="1" rowspan="1">This document</td>
          </tr>
          <tr>
            <td align="center" colspan="1" rowspan="1">0x88</td>
            <td align="center" colspan="1" rowspan="1">Secure Destination Cleanup Object Acknowledgment</td>
            <td align="center" colspan="1" rowspan="1">This document</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-5-3">
            IANA has allocated bit 1 from the "Transit Information
            Option Flags" registry for the 'I' flag (Invalidate previous route; see <xref target="transit_opt_changes" format="default" sectionFormat="of" derivedContent="Section 4.2"/>).
      </t>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-new-registry-for-the-destin">New Registry for the Destination Cleanup Object (DCO) Flags</name>
        <t indent="0" pn="section-5.1-1">
                IANA has created a registry for the 8-bit Destination Cleanup
                Object (DCO) Flags field. The "Destination Cleanup Object
                (DCO) Flags" registry is located in the "Routing Protocol for
                Low Power and Lossy Networks (RPL)" registry.
        </t>
        <t indent="0" pn="section-5.1-2">
                New bit numbers may be allocated only by IETF Review
                <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>. Each
                bit is tracked with the following qualities:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.1-3">
          <li pn="section-5.1-3.1">Bit number (counting from bit 0 as the most significant bit)</li>
          <li pn="section-5.1-3.2">Capability description</li>
          <li pn="section-5.1-3.3">Defining RFC</li>
        </ul>
        <t indent="0" pn="section-5.1-4">
                The following bits are currently defined:
        </t>
        <table align="center" pn="table-2">
          <name slugifiedName="name-dco-base-flags">DCO Base Flags</name>
          <thead>
            <tr>
              <th align="center" colspan="1" rowspan="1">Bit number</th>
              <th align="center" colspan="1" rowspan="1">Description</th>
              <th align="center" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center" colspan="1" rowspan="1">0</td>
              <td align="center" colspan="1" rowspan="1">DCO-ACK request (K)</td>
              <td align="center" colspan="1" rowspan="1">This document</td>
            </tr>
            <tr>
              <td align="center" colspan="1" rowspan="1">1</td>
              <td align="center" colspan="1" rowspan="1">DODAGID field is present (D)</td>
              <td align="center" colspan="1" rowspan="1">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-new-registry-for-the-destina">New Registry for the Destination Cleanup Object (DCO) Acknowledgment Flags</name>
        <t indent="0" pn="section-5.2-1">
                IANA has created a registry for the 8-bit
                Destination Cleanup Object (DCO) Acknowledgment Flags field.
                The "Destination Cleanup Object (DCO) Acknowledgment Flags" registry
                is located in the
                "Routing Protocol for Low Power and Lossy Networks (RPL)" registry.
        </t>
        <t indent="0" pn="section-5.2-2">
                New bit numbers may be allocated only by IETF Review
                <xref target="RFC8126" format="default" sectionFormat="of" derivedContent="RFC8126"/>. Each
                bit is tracked with the following qualities:
        </t>
        <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-5.2-3">
          <li pn="section-5.2-3.1">Bit number (counting from bit 0 as the most significant bit)</li>
          <li pn="section-5.2-3.2">Capability description</li>
          <li pn="section-5.2-3.3">Defining RFC</li>
        </ul>
        <t indent="0" pn="section-5.2-4">
                The following bit is currently defined:
        </t>
        <table align="center" pn="table-3">
          <name slugifiedName="name-dco-ack-base-flag">DCO-ACK Base Flag</name>
          <thead>
            <tr>
              <th align="center" colspan="1" rowspan="1">Bit number</th>
              <th align="center" colspan="1" rowspan="1">Description</th>
              <th align="center" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center" colspan="1" rowspan="1">0</td>
              <td align="center" colspan="1" rowspan="1">DODAGID field is present (D)</td>
              <td align="center" colspan="1" rowspan="1">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpl_reject_status" numbered="true" toc="include" removeInRFC="false" pn="section-5.3">
        <name slugifiedName="name-rpl-rejection-status-values">RPL Rejection Status Values</name>
        <t indent="0" pn="section-5.3-1">
           This document adds a new status value to the "RPL Rejection Status" subregistry initially created per <xref target="RFC9010" sectionFormat="of" section="12.6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc9010#section-12.6" derivedContent="RFC9010"/>.
        </t>
        <table align="center" pn="table-4">
          <name slugifiedName="name-rejection-value-of-the-rpl-">Rejection Value of the RPL Status</name>
          <thead>
            <tr>
              <th align="center" colspan="1" rowspan="1">Value</th>
              <th align="center" colspan="1" rowspan="1">Meaning</th>
              <th align="center" colspan="1" rowspan="1">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center" colspan="1" rowspan="1">1</td>
              <td align="center" colspan="1" rowspan="1">No routing entry</td>
              <td align="center" colspan="1" rowspan="1">This document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="Security" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">
            This document introduces the ability for a common ancestor node to
            invalidate a route on behalf of the target node. The common
            ancestor node could be directed to do so by the target node, using
            the 'I' flag in a DCO's Transit Information option. However, the common
            ancestor node is in a position to unilaterally initiate the route
            invalidation, since it possesses all the required state information,
            namely, the Target Address and the corresponding Path Sequence.
            Thus, a rogue common ancestor node could initiate such an
            invalidation and impact the traffic to the target node.
      </t>
      <t indent="0" pn="section-6-2"> The DCO carries a RPL Status value, which is informative. New Status
            values may be created over time, and a node will ignore an unknown
            Status value. This enables the RPL Status field to be
            used as a cover channel. But the channel only works once, since the
            message destroys its own medium, i.e., the existing route that it
            is removing.
      </t>
      <t indent="0" pn="section-6-3">
            This document also introduces an 'I' flag, which is set by the target
            node and used by the ancestor node to initiate a DCO if the
            ancestor sees an update in the routing adjacency. However,
            this flag could be spoofed by a malicious 6LR in the path and can
            cause invalidation of an existing active path. Note that invalidation
            will work only if the Path Sequence condition is also met for the
            target for which the invalidation is attempted. Having said that, such a malicious 6LR may
            spoof a DAO on behalf of the (sub) child with the 'I' flag set and
            can cause route invalidation on behalf of the (sub) child node.
            Note that by using existing mechanisms offered by <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>, a malicious 6LR might also spoof a DAO with a
            lifetime of zero or otherwise cause denial of service by dropping
            traffic entirely, so the new mechanism described in this document
            does not present a substantially increased risk of disruption.
      </t>
      <t indent="0" pn="section-6-4">
            This document assumes that the security mechanisms as defined in
            <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/> are followed, which means that the common
            ancestor node and all the 6LRs are part of the RPL network because
            they have the required credentials. A non-secure RPL network needs
            to take into consideration the risks highlighted in this section as
            well as those highlighted in <xref target="RFC6550" format="default" sectionFormat="of" derivedContent="RFC6550"/>.
      </t>
      <t indent="0" pn="section-6-5">
            All RPL messages support a secure version of messages; this allows
            integrity protection using either a Message Authentication Code (MAC) or a signature. Optionally,
            secured RPL messages also have encryption protection for
            confidentiality.
      </t>
      <t indent="0" pn="section-6-6">
            This document adds new messages (DCO and DCO-ACK) that are
            syntactically similar to existing RPL messages such as DAO and
            DAO-ACK. Secure versions of DCO and DCO-ACK messages are added in a way that is similar to the technique used for other RPL messages (such as DAO and DAO-ACK).
      </t>
      <t indent="0" pn="section-6-7">
            RPL supports three security modes, as mentioned in
            <xref target="RFC6550" section="10.1" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6550#section-10.1" derivedContent="RFC6550"/>:
      </t>
      <dl newline="false" spacing="normal" indent="3" pn="section-6-8">
        <dt pn="section-6-8.1">Unsecured:</dt>
        <dd pn="section-6-8.2">In this mode, it is expected that the RPL control messages
          are secured by other security mechanisms, such as
          link-layer security. In this mode, the RPL control messages,
          including DCO and DCO-ACK messages, do not have Security sections.
          Also note that unsecured mode does not imply that all
          messages are sent without any protection.</dd>
        <dt pn="section-6-8.3">Preinstalled:</dt>
        <dd pn="section-6-8.4">In this mode, RPL uses secure messages. Thus,
          secure versions of DCO and DCO-ACK messages <bcp14>MUST</bcp14> be used in this mode.</dd>
        <dt pn="section-6-8.5">Authenticated:</dt>
        <dd pn="section-6-8.6">In this mode, RPL uses secure messages. Thus,
          secure versions of DCO and DCO-ACK messages <bcp14>MUST</bcp14> be used in this mode.</dd>
      </dl>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-normative-references">Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="S. Bradner">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="1997" month="March"/>
          <abstract>
            <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC6550" target="https://www.rfc-editor.org/info/rfc6550" quoteTitle="true" derivedAnchor="RFC6550">
        <front>
          <title>RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks</title>
          <author initials="T." surname="Winter" fullname="T. Winter" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Thubert" fullname="P. Thubert" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="A." surname="Brandt" fullname="A. Brandt">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="J." surname="Hui" fullname="J. Hui">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Kelsey" fullname="R. Kelsey">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="P." surname="Levis" fullname="P. Levis">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="K." surname="Pister" fullname="K. Pister">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Struik" fullname="R. Struik">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="JP." surname="Vasseur" fullname="JP. Vasseur">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="R." surname="Alexander" fullname="R. Alexander">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2012" month="March"/>
          <abstract>
            <t indent="0">Low-Power and Lossy Networks (LLNs) are a class of network in which both the routers and their interconnect are constrained.  LLN routers typically operate with constraints on processing power, memory, and energy (battery power).  Their interconnects are characterized by high loss rates, low data rates, and instability.  LLNs are comprised of anything from a few dozen to thousands of routers.  Supported traffic flows include point-to-point (between devices inside the LLN), point-to-multipoint (from a central control point to a subset of devices inside the LLN), and multipoint-to-point (from devices inside the LLN towards a central control point).  This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point-to-multipoint traffic from the central control point to the devices inside the LLN are supported.  Support for point-to-point traffic is also available.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6550"/>
        <seriesInfo name="DOI" value="10.17487/RFC6550"/>
      </reference>
      <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" quoteTitle="true" derivedAnchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author initials="M." surname="Cotton" fullname="M. Cotton">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="B." surname="Leiba" fullname="B. Leiba">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="T." surname="Narten" fullname="T. Narten">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="June"/>
          <abstract>
            <t indent="0">Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t indent="0">To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t indent="0">This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author initials="B." surname="Leiba" fullname="B. Leiba">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2017" month="May"/>
          <abstract>
            <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8505" target="https://www.rfc-editor.org/info/rfc8505" quoteTitle="true" derivedAnchor="RFC8505">
        <front>
          <title>Registration Extensions for IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery</title>
          <author initials="P." surname="Thubert" fullname="P. Thubert" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="E." surname="Nordmark" fullname="E. Nordmark">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="S." surname="Chakrabarti" fullname="S. Chakrabarti">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="C." surname="Perkins" fullname="C. Perkins">
            <organization showOnFrontPage="true"/>
          </author>
          <date year="2018" month="November"/>
          <abstract>
            <t indent="0">This specification updates RFC 6775 -- the Low-Power Wireless Personal Area Network (6LoWPAN) Neighbor Discovery specification -- to clarify the role of the protocol as a registration technique and simplify the registration operation in 6LoWPAN routers, as well as to provide enhancements to the registration capabilities and mobility detection for different network topologies, including the Routing Registrars performing routing for host routes and/or proxy Neighbor Discovery in a low-power network.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8505"/>
        <seriesInfo name="DOI" value="10.17487/RFC8505"/>
      </reference>
      <reference anchor="RFC9010" target="https://www.rfc-editor.org/info/rfc9010" quoteTitle="true" derivedAnchor="RFC9010">
        <front>
          <title>Routing for RPL (Routing Protocol for Low-Power and Lossy Networks) Leaves</title>
          <author initials="P" surname="Thubert" fullname="Pascal Thubert" role="editor">
            <organization showOnFrontPage="true"/>
          </author>
          <author initials="M" surname="Richardson" fullname="Michael Richardson">
            <organization showOnFrontPage="true"/>
          </author>
          <date month="April" year="2021"/>
        </front>
        <seriesInfo name="RFC" value="9010"/>
        <seriesInfo name="DOI" value="10.17487/RFC9010"/>
      </reference>
    </references>
    <section anchor="app-additional" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-example-messaging">Example Messaging</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-a.1">
        <name slugifiedName="name-example-dco-messaging">Example DCO Messaging</name>
        <t indent="0" pn="section-a.1-1">
            In this example, Node D (<xref target="sample_top" format="default" sectionFormat="of" derivedContent="Figure 1"/>)
            switches its parent from
            B to C. This example assumes that Node D has already
            established its own route via Node B-G-A-6LBR using pathseq=x. The
            example uses DAO and DCO messaging conventions and specifies only
            the required parameters to explain the example, namely, the
            parameter 'tgt', which stands for "Target option"; the value of this
            parameter specifies the address of the target node. The parameter
            'pathseq' specifies the Path Sequence value carried in the
            Transit Information option, and the parameter 'I_flag' specifies the
            'I' flag in the Transit Information option. The
            sequence of actions is as follows:
        </t>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-a.1-2"><li pn="section-a.1-2.1" derivedCounter="1.">Node D switches its parent from Node B to Node C.</li>
          <li pn="section-a.1-2.2" derivedCounter="2.">D sends a regular DAO(tgt=D,pathseq=x+1,I_flag=1) in the
          updated path to C.</li>
          <li pn="section-a.1-2.3" derivedCounter="3.">C checks for a routing entry on behalf of D; since it cannot
          find an entry on behalf of D, it creates a new routing entry
          and forwards the reachability information of the target D
          to H in a DAO(tgt=D,pathseq=x+1,I_flag=1).</li>
          <li pn="section-a.1-2.4" derivedCounter="4.">Similar to C, Node H checks for a routing entry on behalf of
          D, cannot find an entry, and hence creates a new routing
          entry and forwards the reachability information of the
          target D to A in a DAO(tgt=D,pathseq=x+1,I_flag=1).</li>
          <li pn="section-a.1-2.5" derivedCounter="5.">
          Node A receives the DAO(tgt=D,pathseq=x+1,I_flag=1) and
          checks for a routing entry on behalf of D. It finds a
          routing entry but checks that the next hop for target D is
          different (i.e., Node G). Node A checks the I_flag and
          generates the DCO(tgt=D,pathseq=x+1) to the previous next hop for
          target D, which is G. Subsequently, Node A updates the
          routing entry and forwards the reachability information of
          target D upstream using the DAO(tgt=D,pathseq=x+1,I_flag=1).
                </li>
          <li pn="section-a.1-2.6" derivedCounter="6.">
          Node G receives the DCO(tgt=D,pathseq=x+1). It checks to see if
          the received Path Sequence is later than the stored Path
          Sequence. If it is later, Node G invalidates the routing entry
          of target D and forwards the (un)reachability information
          downstream to B in the DCO(tgt=D,pathseq=x+1).
                </li>
          <li pn="section-a.1-2.7" derivedCounter="7.">
          Similarly, B processes the DCO(tgt=D,pathseq=x+1) by
          invalidating the routing entry of target D and forwards the
          (un)reachability information downstream to D.
                </li>
          <li pn="section-a.1-2.8" derivedCounter="8.">
          D ignores the DCO(tgt=D,pathseq=x+1), since the target is
          itself.
                </li>
          <li pn="section-a.1-2.9" derivedCounter="9.">
          The propagation of the DCO will stop at any node where the
          node does not have routing information associated with
          the target. If cached routing information is present and
          the cached Path Sequence is higher than the value in the
          DCO, then the DCO is dropped.
                </li>
        </ol>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-a.2">
        <name slugifiedName="name-example-dco-messaging-with-">Example DCO Messaging with Multiple Preferred Parents</name>
        <t indent="0" pn="section-a.2-1">
                As shown in <xref target="sample_top_mpp" format="default" sectionFormat="of" derivedContent="Figure 5"/>, node (N41) selects multiple
                preferred parents (N32) and (N33).
                The sequence of actions is listed below the figure.
        </t>
        <figure anchor="sample_top_mpp" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-sample-topology-2">Sample Topology 2</name>
          <artwork align="center" name="" type="" alt="" pn="section-a.2-2.1">
       (6LBR)
         |
         |
         |
       (N11)
        / \
       /   \
      /     \
   (N21)   (N22)
     /      / \
    /      /   \
   /      /     \
(N31)  (N32)  (N33)
    :    |    /
     :   |   /
      :  |  /
       (N41)</artwork>
        </figure>
        <ol spacing="normal" type="1" indent="adaptive" start="1" pn="section-a.2-3"><li pn="section-a.2-3.1" derivedCounter="1.">
              (N41) sends a DAO(tgt=N41,PS=x,I_flag=1) to (N32) and (N33).
              Here, 'I_flag' refers to the Invalidation flag, and 'PS' refers to
              the Path Sequence in the Transit Information option.
          </li>
          <li pn="section-a.2-3.2" derivedCounter="2.">
              (N32) sends the DAO(tgt=N41,PS=x,I_flag=1) to (N22). (N33) also
              sends the DAO(tgt=N41,PS=x,I_flag=1) to (N22). (N22) learns
              multiple routes for the same destination (N41) through
              multiple next hops. (N22) may receive the DAOs from
              (N32) and (N33) in any order with the I_flag set. The
              implementation should use the DelayDCO timer to wait to
              initiate the DCO. If (N22) receives an updated DAO from
              all the paths, then the DCO need not be initiated in
              this case. Thus, the routing table at N22 should contain
              (Dst,NextHop,PS): { (N41,N32,x), (N41,N33,x) }.
          </li>
          <li pn="section-a.2-3.3" derivedCounter="3.">
              (N22) sends the DAO(tgt=N41,PS=x,I_flag=1) to (N11).
          </li>
          <li pn="section-a.2-3.4" derivedCounter="4.">
              (N11) sends the DAO(tgt=N41,PS=x,I_flag=1) to (6LBR). Thus, the
              complete path is established.
          </li>
          <li pn="section-a.2-3.5" derivedCounter="5.">
              (N41) decides to change the preferred parent set from
              { N32, N33 } to { N31, N32 }.
          </li>
          <li pn="section-a.2-3.6" derivedCounter="6.">
              (N41) sends the DAO(tgt=N41,PS=x+1,I_flag=1) to (N32). (N41)
              sends the DAO(tgt=N41,PS=x+1,I_flag=1) to (N31).
          </li>
          <li pn="section-a.2-3.7" derivedCounter="7.">
              (N32) sends the DAO(tgt=N41,PS=x+1,I_flag=1) to (N22).
              (N22) has multiple routes to destination (N41). It sees
              that a new Path Sequence for Target=N41 is received and
              thus waits for a predetermined time period (the DelayDCO
              time period) to invalidate another route
              { (N41),(N33),x }.  After the time period, (N22) sends the
              DCO(tgt=N41,PS=x+1) to (N33). Also (N22) sends the
              regular DAO(tgt=N41,PS=x+1,I_flag=1) to (N11).
          </li>
          <li pn="section-a.2-3.8" derivedCounter="8.">
              (N33) receives the DCO(tgt=N41,PS=x+1). The received Path
              Sequence is the latest and thus invalidates the entry
              associated with the target (N41). (N33) then sends the
              DCO(tgt=N41,PS=x+1) to (N41). (N41) sees itself as the
              target and drops the DCO.
          </li>
          <li pn="section-a.2-3.9" derivedCounter="9.">
              From Step 6 above, (N31) receives the
              DAO(tgt=N41,PS=x+1,I_flag=1). It creates a routing
              entry and sends the DAO(tgt=N41,PS=x+1,I_flag=1) to
              (N21). Similarly, (N21) receives the DAO and
              subsequently sends the DAO(tgt=N41,PS=x+1,I_flag=1) to
              (N11).
          </li>
          <li pn="section-a.2-3.10" derivedCounter="10.">
              (N11) receives the DAO(tgt=N41,PS=x+1,I_flag=1) from (N21).
              It waits for the DelayDCO timer, since it has multiple
              routes to (N41). (N41) will receive the
              DAO(tgt=N41,PS=x+1,I_flag=1) from (N22) from Step 7
              above. Thus, (N11) has received the regular
              DAO(tgt=N41,PS=x+1,I_flag=1) from all paths and thus
              does not initiate the DCO.
          </li>
          <li pn="section-a.2-3.11" derivedCounter="11.">
              (N11) forwards the DAO(tgt=N41,PS=x+1,I_flag=1) to (6LBR),
              and the full path is established.
          </li>
        </ol>
      </section>
    </section>
    <section anchor="Acknowledgments" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t indent="0" pn="section-appendix.b-1">
      Many thanks to <contact fullname="Alvaro Retana"/>, <contact fullname="Cenk Gundogan"/>, <contact fullname="Simon Duquennoy"/>, <contact fullname="Georgios Papadopoulos"/>, and <contact fullname="Peter van der Stok"/> for their review and comments.
            <contact fullname="Alvaro Retana"/> helped shape this document's final version with
            critical review comments.
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Rahul Arvind Jadhav" initials="R.A." role="editor" surname="Jadhav">
        <organization showOnFrontPage="true">Huawei</organization>
        <address>
          <postal>
            <street>Kundalahalli Village</street>
            <extaddr>Whitefield</extaddr>
            <city>Bangalore</city>
            <region>Karnataka</region>
            <code>560037</code>
            <country>India</country>
          </postal>
          <phone>+91-080-49160700</phone>
          <email>rahul.ietf@gmail.com</email>
        </address>
      </author>
      <author initials="P" surname="Thubert" fullname="Pascal Thubert">
        <organization abbrev="Cisco" showOnFrontPage="true">Cisco Systems, Inc.</organization>
        <address>
          <postal>
            <extaddr>Building D</extaddr>
            <street>45 Allee des Ormes - BP1200</street>
            <city>MOUGINS - Sophia Antipolis</city>
            <code>06254</code>
            <country>France</country>
          </postal>
          <phone>+33-497-23-26-34</phone>
          <email>pthubert@cisco.com</email>
        </address>
      </author>
      <author fullname="Rabi Narayan Sahoo" initials="R.N." surname="Sahoo">
        <organization showOnFrontPage="true">Huawei</organization>
        <address>
          <postal>
            <extaddr>Whitefield</extaddr>
            <street>Kundalahalli Village</street>
            <city>Bangalore</city>
            <region>Karnataka</region>
            <code>560037</code>
            <country>India</country>
          </postal>
          <phone>+91-080-49160700</phone>
          <email>rabinarayans0828@gmail.com</email>
        </address>
      </author>
      <author initials="Z" surname="Cao" fullname="Zhen Cao">
        <organization showOnFrontPage="true">Huawei</organization>
        <address>
          <postal>
            <street>W Chang'an Ave</street>
            <city>Beijing</city>
            <country>China</country>
          </postal>
          <email>zhencao.ietf@gmail.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
