Re: [rohc] [Technical Errata Reported] RFC5225 (2703)

Lars Eggert <lars.eggert@nokia.com> Thu, 03 February 2011 13:07 UTC

Return-Path: <lars.eggert@nokia.com>
X-Original-To: rohc@core3.amsl.com
Delivered-To: rohc@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 81F443A68FD for <rohc@core3.amsl.com>; Thu, 3 Feb 2011 05:07:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.196
X-Spam-Level:
X-Spam-Status: No, score=-103.196 tagged_above=-999 required=5 tests=[AWL=-0.597, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8zAZKQzZ8tS5 for <rohc@core3.amsl.com>; Thu, 3 Feb 2011 05:07:29 -0800 (PST)
Received: from mgw-da02.nokia.com (smtp.nokia.com [147.243.128.26]) by core3.amsl.com (Postfix) with ESMTP id 53CA43A68F8 for <rohc@ietf.org>; Thu, 3 Feb 2011 05:07:29 -0800 (PST)
Received: from mail.fit.nokia.com (esdhcp030222.research.nokia.com [172.21.30.222]) by mgw-da02.nokia.com (Switch-3.4.3/Switch-3.4.3) with ESMTP id p13DA8fT013220 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 3 Feb 2011 15:10:09 +0200
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.96.5 at fit.nokia.com
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/signed; boundary="Apple-Mail-47-602751659"; protocol="application/pkcs7-signature"; micalg="sha1"
From: Lars Eggert <lars.eggert@nokia.com>
In-Reply-To: <20110203122200.A4749E06B4@rfc-editor.org>
Date: Thu, 03 Feb 2011 14:52:11 +0200
Message-Id: <DF9B84C1-2794-49B6-BF7E-9C871E5673F2@nokia.com>
References: <20110203122200.A4749E06B4@rfc-editor.org>
To: rohc@ietf.org
X-Mailer: Apple Mail (2.1082)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.6 (mail.fit.nokia.com); Thu, 03 Feb 2011 14:52:16 +0200 (EET)
X-Nokia-AV: Clean
Cc: kristofer.sandlund@ericsson.com, David Harrington <ietfdbh@comcast.net>, ghyslain.pelletier@ericsson.com
Subject: Re: [rohc] [Technical Errata Reported] RFC5225 (2703)
X-BeenThere: rohc@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Robust Header Compression <rohc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rohc>, <mailto:rohc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rohc>
List-Post: <mailto:rohc@ietf.org>
List-Help: <mailto:rohc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rohc>, <mailto:rohc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Feb 2011 13:07:30 -0000

Based on the ongoing discussion, I assume the community consensus is to approve this?

On 2011-2-3, at 14:22, RFC Errata System wrote:

> 
> The following errata report has been submitted for RFC5225,
> "RObust Header Compression Version 2 (ROHCv2): Profiles for RTP, UDP, IP, ESP and UDP-Lite".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=5225&eid=2703
> 
> --------------------------------------
> Type: Technical
> Reported by: Carl Knutsson <carl.knutsson@effnet.com>
> 
> Section: 6.6.11
> 
> Original Text
> -------------
> o  ip_id_behavior, one octet for each IP header in the compressible
> 
>   header chain starting from the outermost header.  Each octet
> 
>   consists of 2 bits padded with 6 MSBs of zeroes.
> 
> Corrected Text
> --------------
> o  ip_id_behavior_outer, one octet for each IPv4 header except the
> 
>   innermost in the compressible header chain starting from the outermost 
> 
>   header. Each octet consists of 2 bits padded with 6 MSBs of zeroes.
> 
> 
> 
> o  ip_id_behavior_innermost, one octet if the innermost header is an 
> 
>   IPv4 header. The octet consists of 2 bits padded with 6 MSBs of zeroes.
> 
> Notes
> -----
> There is no control field called ip_ip_behavior in the document. There are two control fields related to IP-ID behavior, ip_id_behavior_innermost and ip_id_behavior_outer. For IPv6, only the ip_id_behavior_innermost field exists and its value is always IP_ID_BEHAVIOR_RANDOM according to the FN. This makes it impossible to include ip_id_behavior_outer when calculating the crc for IPv6 headers. Furthermore, since the ip_id_behavior_innermost is constant it makes no sense to include it in the crc calculation.
> 
> Instructions:
> -------------
> This errata is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC5225 (draft-ietf-rohc-rfc3095bis-rohcv2-profiles-06)
> --------------------------------------
> Title               : RObust Header Compression Version 2 (ROHCv2): Profiles for RTP, UDP, IP, ESP and UDP-Lite
> Publication Date    : April 2008
> Author(s)           : G. Pelletier, K. Sandlund
> Category            : PROPOSED STANDARD
> Source              : Robust Header Compression
> Area                : Transport
> Stream              : IETF
> Verifying Party     : IESG