Re: [Roll] Rtgdir last call review of draft-ietf-roll-turnon-rfc8138-10

"Pascal Thubert (pthubert)" <pthubert@cisco.com> Tue, 18 August 2020 13:32 UTC

Return-Path: <pthubert@cisco.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2D5F3A0A04; Tue, 18 Aug 2020 06:32:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=V6CiO4K+; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=p2AunY34
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H6HK8ipvg70w; Tue, 18 Aug 2020 06:32:33 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85A3B3A0A07; Tue, 18 Aug 2020 06:32:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=77192; q=dns/txt; s=iport; t=1597757553; x=1598967153; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=pjm+a8Kz9l12tDODxF5S1/D3SyfoDR88Db8U1yzUOWM=; b=V6CiO4K+h1ghPyJhzB2MaeuIOZomAtpF91r2zm3z9OWkbOtYSWWmeNm0 d4ZhQbPdUxPCr+Qf2aWaKmz7/kb9AAusldXp6PJteYviGfEpwWWHVcxHa yk3teS/Bs0a+lUFWCYWYfvIrIC9Z1zGqkljAUhdFFmEljf8U+O2kK6los Y=;
IronPort-PHdr: 9a23:bFO9HxYjjTy3DDx/keOXC97/LSx94ef9IxIV55w7irlHbqWk+dH4MVfC4el21QaVD4re4vNAzeHRtvOoVW8B5MOHt3YPONxJWgQegMob1wonHIaeCEL9IfKrCk5yHMlLWFJ/uX3uN09TFZXxYlTTpju56jtBUhn6PBB+c+LyHIOahs+r1ue0rpvUZQgAhDe0bb5oahusqgCEvcgNiowkIaE0mRY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AaCAAc1ztf/5xdJa1fHQEBAQEJARIBBQUBggqBIy8jLgdwWC8shDeDRgONWoECl2eBQoERA1ULAQEBDAEBJQgCBAEBgTUBIIJ2AheCCAIkOBMCAwEBCwEBBQEBAQIBBgRthVwMhXEBAQEDARIICQQGEwEBNwEECwIBCDgBCQICAjAlAgQBDQ0TB4MFgX5NAw4gAQ6lXwKBOYhhdn8zgwEBAQWBMwEDAoN3GIIOAwaBOIJxglRLQ0qBeoE9gksbgUE/gRFDUYFHNT6CXAEBA4FCAQoRFRaCajOCLYtAhFmCaoZhm0+BAAqCYohki1WGCYMAiVyOD4U4kjuKRJBVgSODBAIEAgQFAg4BAQWBaiOBV3AVgyRQFwINjh8HBReDToUUhUJ0CywCBgoBAQMJfI1TAiYEgTpgAQE
X-IronPort-AV: E=Sophos;i="5.76,327,1592870400"; d="scan'208,217";a="794434204"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Aug 2020 13:32:31 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 07IDWVDU010281 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 18 Aug 2020 13:32:31 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Aug 2020 08:32:30 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Aug 2020 08:32:29 -0500
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 18 Aug 2020 09:32:29 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kFhOT6YrTH5fSMhnv3M97VgHFUqAD9SGPhYy4AEdoUchePEJfKXO1axPrzCA2AbnRe23iQw9ExQ+EiqDt2HGYD+WpgvEr98RrVnwRnz6mPVeam8LyIkDP1uzQZM5cr8oqiyPDwLisUydPwTQdoEZS/ekCRB09TeqBdk8Ith0PQQjsp0JPTT87Iuk6PilqML4lk/3C2UTG7AJTj8VKKl9ztZJ/PursPl5emRNXFC7P04e7+U6O/xkSvvjeE/Xg4uQDpW8g23sNMIAf/N2pdn62LR7wQ+gOoGnPic4fyC01067u+ZZG3AvAAIaEJPTjOCmQZD6rfrILB4rb36IALoW6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pjm+a8Kz9l12tDODxF5S1/D3SyfoDR88Db8U1yzUOWM=; b=SLsRtFI1qc8lLwtwOh33WaN97hLr9zKoHcN7zFNp0jW+jm6xSQtLeE/SNZmaYRxGECOahOW/cCHtOE6c22tt9sr80u9QGo2deJOiiwV+HSLd7PBYCJC1xlclzErS8Lzntsz1Q44TqslswmLkmBfzJ0J2UbXTfEl0rVIxyxBsGn0BKNWDMNGkqn+XYGj08LjOQQ2RZ5LbkEZtfcu8bOMUWgIatMdnTybxUjH6JdyU/0OnC54XVOTOuNxtnOhtkT/mXbFcP4HLNKZUSGZFldGgNL4hc7Sfg7GIZ29kSdG51oyxGXTbO8Mc84Urlo801P21ZcyB9MOCrAmQrmmqcINWzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pjm+a8Kz9l12tDODxF5S1/D3SyfoDR88Db8U1yzUOWM=; b=p2AunY34zkOeBMU4W75BsGi1pVolGxKP0lyyZEWlpqo1WvsSoIiWrWkczPKgbwh0x7e+ZKlyxwrX4Lxwyd8+bzY2Cc2/d+LDN50RX+n05Zlm/2ZP1o8mgCPk1FnGPHpV+ZfNbz2kiUgvkqNR9P3Vz6gBl0fbd+XPjKdMrS1FfvI=
Received: from MN2PR11MB3565.namprd11.prod.outlook.com (2603:10b6:208:ea::31) by MN2PR11MB3584.namprd11.prod.outlook.com (2603:10b6:208:ef::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3283.22; Tue, 18 Aug 2020 13:32:28 +0000
Received: from MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::40e1:2d7d:1a3:cf8a]) by MN2PR11MB3565.namprd11.prod.outlook.com ([fe80::40e1:2d7d:1a3:cf8a%3]) with mapi id 15.20.3283.028; Tue, 18 Aug 2020 13:32:28 +0000
From: "Pascal Thubert (pthubert)" <pthubert@cisco.com>
To: Stewart Bryant <stewart.bryant@gmail.com>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>
CC: "last-call@ietf.org" <last-call@ietf.org>, "draft-ietf-roll-turnon-rfc8138.all@ietf.org" <draft-ietf-roll-turnon-rfc8138.all@ietf.org>, "roll@ietf.org" <roll@ietf.org>
Thread-Topic: Rtgdir last call review of draft-ietf-roll-turnon-rfc8138-10
Thread-Index: AQHWcmyCGtMZO3KqVkKeiL/oP5PfUak747iw
Date: Tue, 18 Aug 2020 13:32:20 +0000
Deferred-Delivery: Tue, 18 Aug 2020 13:32:14 +0000
Message-ID: <MN2PR11MB3565D36B4FB2E9D40EFCD400D85C0@MN2PR11MB3565.namprd11.prod.outlook.com>
References: <159743131948.29404.7285894923089059952@ietfa.amsl.com>
In-Reply-To: <159743131948.29404.7285894923089059952@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2a01:cb1d:4ec:2200:68d5:2571:959e:6109]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f5645f03-63df-41df-a8f3-08d8437b271a
x-ms-traffictypediagnostic: MN2PR11MB3584:
x-microsoft-antispam-prvs: <MN2PR11MB358477472B2A3A6E25F51A41D85C0@MN2PR11MB3584.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: XxSXPd4O97ry728klw7RTyt5p2LCx634C6XZQI6BLo12d/PlnxX+4Sj+oMyqv9U7M3D0qSSy18L4oqxof6kHiC4DN8BJWVFzoQxibeGPpwpQj/ZWcbPEr/IUazN8QmiPgKMf6jIBgTdSnR6ah6gn7DUuncKhzoJy1MA+TBOzFLTrhaLTCG5kJpMx1G/0bsvyeRQYOSr63PjWnWBsVkk0Fwbqtu68njo04pDgHYvkGPXUawaO7P9StkqKaznxCS0f/7GRFuTjtZTDvtv/jTDv5JRY+3BgKZIDo6bOkbHEtReULXq4xukkPdx6A6mbHec2rxQ1F6kMcjvmW1EUyOCilRU3RJtH3aodrD4wHW5Iou7cRo+kyZsxZc5+fE8rdckLfD8LptGNAaGhEoEKF7CDbw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR11MB3565.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(396003)(39860400002)(376002)(136003)(366004)(55016002)(33656002)(30864003)(9686003)(66556008)(71200400001)(4326008)(2906002)(110136005)(66476007)(64756008)(76116006)(66446008)(66946007)(166002)(316002)(86362001)(6506007)(478600001)(8936002)(186003)(52536014)(83380400001)(7696005)(6666004)(66574015)(54906003)(5660300002)(8676002)(966005)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB3565D36B4FB2E9D40EFCD400D85C0MN2PR11MB3565namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR11MB3565.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f5645f03-63df-41df-a8f3-08d8437b271a
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Aug 2020 13:32:28.8422 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gMQpt2RVrpFm8PpKfwftYxksAJh/WRoueW/4aRiTBsToG5MbCiZRGQp4g5lO5JTfz2754ir8KQKoGhQMB4Nj6Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3584
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/m2kPvAIw0DQd3dlSWqCnCAowVxI>
Subject: Re: [Roll] Rtgdir last call review of draft-ietf-roll-turnon-rfc8138-10
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Aug 2020 13:32:37 -0000

Hello Stewart



Many thanks for your review! I will need your help and suggestion to progress on your major point below.





>    In particular it is not the

>    intention to undo the setting of the "T" flag.  Though it is possible

>    to roll back (see Section 5.3), adding nodes that do not support

>    [RFC8138] after a roll back may be problematic if the roll back did

>    not fully complete.



> SB> I see this as quite problematic. There are a number of reasons why

> SB> you might need to roll back: network merging, legacy nodes, bugs in the

> implementation. I would think that you needed to be able to go backwards

> and forwards, without difficulty and yet you give the impression that it really

> is a one-way trip. I think that could be operationally problematic.



We have to look at where we come form and where we're going.



1) RPL is used in very large networks, e.g., smart grid with (tens of) thousands of nodes. RFC 8138 was concerned with the technology not the deployment. As written it requires a flag day. Now, this is really, really operationally problematic in the above networks.

=> We're looking for a feasible improvement to enable RFC 8138 in a brown field.



2) RFC 8138 will me a mandated function in RPLv2, MOP >= 7, and the flag will be implicitly on at that time. RPLv2 will have capability exchanges. The work has started (draft-ietf-roll-capabilities). But it is complex, not something we can retrofit in RPLv1 like this flag. Think about doing something like the diffusion algorithm but on unreliable links, and with possibly a number of nodes that are dead or unreachable for a while. As it goes, we will not need a capability for RFC 8138 since it is an implicit part of being RPLv2.

=> we are looking for a simple and short term solution for RPLv1, not a toggle that will be used repeatedly, not a capability that will remain exposed forever.



Now, we all know of short term solutions that kept existing for many years, so I agree with the desire to be cautious and do whatever to allow roll back. Any suggestion from your part will be appreciated, let's see below



> ========

>

> A node

>    that cannot do so may remain connected to the network as a RUL, but

>    how the node is modified to turn into a RUL is out of scope.

> SB> That is quite worrying in practical deployments that this is not specified.



Well it is elsewhere, suggestion to turn this into:



"A node that cannot do so may remain connected to the network as a RUL

as described in [draft-ietf-roll-unaware-leaves]."





> =======

>

>    To ensure that a packet is forwarded across the RPL DODAG in the form

>    in which it was generated, it is required that all the RPL nodes

>    support [RFC8138] at the time of the switch.

> SB> I am not sure if it is possible to implement the feature, but a safe

> implementation would have them report that they support it and use that to

> inhibit the setting of the T bit.



Absolutely. We initially considered the upcoming capabilities work for that, but that's too complicated for a retrofit.

So we defer to network management. A managed deployment needs to manage the level of software of the devices I the network, and upgrade them.

So we came up with this text:

"

     The idea is to use the flag to maintain the compression inactive during

      the migration phase. When the migration is complete (e.g., as known by

      network management and/or inventory), the flag is set and the compression

      is globally activated in the whole DODAG.

"

Should we add something?





> ========

>    When turning [RFC8138] compression off in the network, the Network

>    Administrator MUST wait until all nodes have converged to the "T"

>    flag reset before allowing nodes that do not support the compression

>    in the network.

> SB> How does it know that this has happened?



Then again we rely on network management.

Proposal to add the last sentence in the following paragraph in section

5.3.  Rolling Back

"

   When turning [RFC8138] compression off in the network, the Network

   Administrator MUST wait until all nodes have converged to the "T"

   flag reset before allowing nodes that do not support the compression

   in the network.  To that effect, whether the compression is active in

   a node SHOULD be exposed the node's management interface.

"





>

> =========

>

> 7.  Security Considerations

>

>    First of all, it is worth noting that with [RFC6550], every node in

>    the LLN that is RPL-aware can inject any RPL-based attack in the

>    network.  A trust model has to be put in place in an effort to

>    exclude rogue nodes from participating to the RPL and the 6LoWPAN

>    signaling, as well as from the data packet exchange.  This trust

>    model could be at a minimum based on a Layer-2 Secure joining and the

>    Link-Layer security.  This is a generic RPL and 6LoWPAN requirement,

>    see Req5.1 in Appendix of [RFC8505].

> SB> I am surprised there is not a MUST in the above considering the

> vulnerability.

True, changing to

"

A trust model is REQUIRED in an effort to exclude rogue nodes...

"



>

> ======

>

>    An attacker in the middle of the network may reset the "T" flag to

>    cause extra energy spending in its subDAG.  Conversely it may set the

>    "T" flag, so that nodes located downstream would compress when that

>    it is not desired, potentially resulting in the loss of packets.  In

>    a tree structure, the attacker would be in position to drop the

>    packets from and to the attacked nodes.  So the attacks above would

>    be more complex and more visible than simply dropping selected

>    packets.  The downstream node may have other parents and see both

>    settings, which could raise attention.

> SB> I am worried that there are no real mitigations to this. The attack

> SB> may be a bug.



True enough. Setting the bits in a mixed network is what hurts most since otherwise all we are getting is uncompressed packets when they could be compressed. I'm trying to figure a mitigation but do not see one without a lot of additional complexity. But as you say that's a bug that needs to be found and fixed.

For in path attacks, the attacker that passed the link layer security can do that and a lot more.





>

> =========

>

> Minor Issues

>

>    The suggested bit position of the "T" flag is indicated in Section 6.

> SB> I know that you need to go through the IANA process, but future

> SB> readers will find the text a lot easier to follow if the bit is

> SB> included in Fig 1 above.



True. There are other specs competing for flags, see https://tools.ietf.org/html/draft-ietf-roll-useofrplinfo-40 so I wanted to make sure IANA would grant the proposed bit. Just got confirm from IANA and modified as follows (sorry if renders inadequately with your font:



0                   1                   2                   3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

|   Type = 0x04 |Opt Length = 14| | |T| |A|       ...           |

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                     +

|                               <- Flags ->       ...           |





> SB> Presumably the base spec sends with the T bit clear and thus the

> SB> feature is disabled. It might not hurt to remind the reader of this

> SB> as it is what gives you the backwards compatibility.



Yes. Proposed change (now that IANA conformed position 2 for us):

"

   This specification defines a new flag "Enable RFC8138 Compression"

   (T).  The "T" flag is set to turn-on the use of the compression of

   RPL artifacts with [RFC8138] within the DODAG.  The new "T" flag is

   encoded in position 2 of the reserved Flags field in the RPL DODAG

   Configuration Option, and set to 0 in legacy implementations as

   specified in Section 6.7.6 of [RFC6550].

"



> ========

>

>    A router MUST uncompress a packet that is to be forwarded to an

>    external target.

> SB> Is there not a config option to retain compression to a consenting

> SB> external party?



We had one that we removed very recently to simplify the code.

Point is, RFC 8138 is very specific to compress RPL artifacts, so it makes sense within a RPL domain but not that much outside. For instance, the compression requires a knowledge of the RPL Root as a compression reference of the prefix.



> ========

>

> 6.  IANA Considerations

>

> It would be clearer if there were an IANA/Editor request to also edit Fig 1



Since I made the edition, I added commented text indicating that if the flag position is changed then fig 1 and the text below are impacted.

>

> ========

>

> Nits/Editorials

>

> Otherwise, a non-capable node acting as leaf-only would fail to

> SB> would be clearer as non-RPL-capable



Actually the referred capability was the compression. Reworded the section as

"

   The packet compression technique defined in [RFC8138] can only be

   activated in a RPL [RFC6550] network when all the nodes support it.

   Otherwise, if acting as a leaf, a node that does not support the

   compression would fail to communicate; if acting as a router it would

   drop the compressed packets and black-hole a portion of the network.

"





> ========

>

>    communicate, and acting as a router it would drop the compressed

> SB> Perhaps:  and if acting



Incorporated in the above change.



> ========

>

>    The idea is to use the flag to maintain the compression inactive

> SB> Perhaps : The flag is cleared to maintain the compression inactive

> SB> state

Done



> =========

>

>    A node SHOULD source packets in the compressed form using [RFC8138]

> SB> source or send?



What about generate? We mean, as opposed to forward, afraid that send could be confusing.







> ==========

>

>    The decision of using [RFC8138] is made by the originator of the

> SB> the decision to use

Done



> ==========

>

> A router that encapsulates a packet is the

>    originator of the resulting packet and is responsible to compress the

SB> for compressing



Done



> ==========

>

> In most cases, packets from and to an external target are

> SB> "to and from" is more conventional English



Done



> ==========

>

> Enabling the [RFC8138] compression

>    without a turn-on signaling requires a "flag day"; all nodes must be

>    upgraded, and then the network can be rebooted with the [RFC8138]

>    compression turned on.

>

> SB> I am not sure my English is any better below, but the text could use

> SB> a

> little polish



My Polish is even worse than my English...



>

> Enabling the [RFC8138] compression without a turn-on signaling method

> requires a "flag day"; by which time all nodes must be upgraded, and at which

> point the network can be rebooted with the [RFC8138] compression turned on.

>



I picked your formulation, many thanks : )



The temporary changes for the proposed modifications are visible here:

https://github.com/roll-wg/roll-turnon-rfc8138/commit/2be6077441ecb3cdb3fba33303413c57fc9a78a8



Please let me know if we need more work here.



Again, many thanks Stewart!



Keep safe,



Pascal