Re: [icnrg] icnrg Digest, Vol 120, Issue 13

Ken Calvert <calvert@netlab.uky.edu> Tue, 29 March 2022 21:01 UTC

Return-Path: <calvert@netlab.uky.edu>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F071E3A0C4B for <icnrg@ietfa.amsl.com>; Tue, 29 Mar 2022 14:01:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level:
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=netlab.uky.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 21DGkQFWl8xK for <icnrg@ietfa.amsl.com>; Tue, 29 Mar 2022 14:00:56 -0700 (PDT)
Received: from mail.netlab.uky.edu (mail.netlab.uky.edu [128.163.140.42]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC61A3A0BFC for <icnrg@irtf.org>; Tue, 29 Mar 2022 14:00:55 -0700 (PDT)
Received: from smtpclient.apple (calvert1.netlab.uky.edu [10.33.128.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netlab.uky.edu (Postfix) with ESMTPSA id BB05018053 for <icnrg@irtf.org>; Tue, 29 Mar 2022 17:00:52 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netlab.uky.edu; s=default; t=1648587652; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pNmFSEd47kCBizPR0Iq5s05/mTocRLHp6ckHaawJo7Y=; b=gZOnaJmjHLNTeDFQ6TLTfandpj6wUYdO1Ln7yMIz8Esgko1GhI2yEEP8YmBu5t3Yj1EV0H GLFNrlZvEQNek6mAybXp/xJBaGpV2jdKzfi666mihWGb/+E9v9KPzqmjPWF5y1rBxlQfup dgFXJK5+D/Qruh2cApfYxNwsmEbPfVkdBOPVK1htu1Jez7AU8SunM0Svekt+WUyJ7tk7Sy OROjGygkhN5zkUOcr3dMiV90HR1pRiBNsI43i2VVgMDFhv/GpbtX5LAxGiKr6j4bZXIfNQ 2oYBMLPk9cfxJHc48pXdfkOHVc1RpHLy5A3nVKR577UaI+H0NdQ4RSc9kTXziQ==
From: Ken Calvert <calvert@netlab.uky.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Tue, 29 Mar 2022 17:00:52 -0400
References: <mailman.114.1648580550.29398.icnrg@irtf.org>
To: icnrg@irtf.org
In-Reply-To: <mailman.114.1648580550.29398.icnrg@irtf.org>
Message-Id: <20B85BB3-12AA-45BD-AE0E-35E3356FA100@netlab.uky.edu>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
ARC-Authentication-Results: i=1; mail.netlab.uky.edu; auth=pass smtp.auth=calvert@netlab.uky.edu smtp.mailfrom=calvert@netlab.uky.edu
ARC-Seal: i=1; s=default; d=netlab.uky.edu; t=1648587652; a=rsa-sha256; cv=none; b=abrdZNGIw8Q+ZqZjava3PihBjtf0szw41OOSe6m4cUB2/zswcbIzQpiALcamLzlZVosbO+ tf+ipWm2zFAmQKUeFvZwbdF/9ci8NHrOMRPzNLHS1RFo5qU3V6im/EPWwYVzQq7FjZ8tAB YqvUL2fXUPYtFOzuVoHxsyFp4ZLMCzUbI2pCVk2SL6Nrnrelza1uXcDz25STXxLERvfK7L kdzXKxHvk4PqDjdI+rpMG/1g+1g/akuEpgDzglku/Jx9OEiK/PnMxpK41n/dZLIQ5wmXd9 n+MvUFFna/E29k9UVYPgBg4CzqGnZFb6ZpmU0aRJqGNjlphOaQgoP/xPjIoFZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=netlab.uky.edu; s=default; t=1648587652; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pNmFSEd47kCBizPR0Iq5s05/mTocRLHp6ckHaawJo7Y=; b=pldHoxZI171yowGgm326AphTqY6DpvT7q9khzzqEmObQEOnqRWuKIF5eixfVOpA82KfgMV xuVddywJdv5AFyEEXFMXDv/xNMmCD4e82F823UWfsbqrNQ2LLgD/krlrR/+QF/qZgjLDxF mJB+tVtdS57TBcPUHojdhQ4XGoGaFHIKtq3R9BWKk5L5UXK/YKZ8X6pQOM/veYrkSbmlGp ktO/u65JkQ/WwCPezLCI/slbN68wQ009sbygFUj88vNluH7vrwwJIBryqMPEy73TnyBQGW LL805BV3KqwWXw5NWYZTswRRiCUgYJYJx7ps5s6QzXI4boOcHWp32O10WsV4RQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/BHCFWBi2ZecHpiYhfd-XbQffuu0>
Subject: Re: [icnrg] icnrg Digest, Vol 120, Issue 13
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2022 21:01:01 -0000

Re: ccnx-timetlv:  I read the draft, and I saw Cenk's presentation.
Adopting this seems fine.

A couple of minor questions/comments:

Motivation: If I understand correctly, this will reduce the size of TLVs where it is used from 12 to 5 total bytes, is that correct?

5. Protocol Integration - I believe RFC 8609 specifies how an unknown type field should be handled (ignored/skipped over).  Does it also specify how an unexpected length field should be handled?  In the comparison of the alternative approaches, it might be good to describe what should happen when a packet using the compact encoding arrives at a legacy forwarder for each approach.  If RFC 8609 does not specify what to do if a length is different than expected, perhaps that should be included with the changes.  One wonders if the parser might decide it has lost sync and throw the whole packet away...

Ken