Re: [Tsv-art] Tsvart last call review of draft-ietf-roll-useofrplinfo-25

Colin Perkins <csp@csperkins.org> Wed, 05 June 2019 08:25 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37B74120627; Wed, 5 Jun 2019 01:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O_9yDLjBrJrL; Wed, 5 Jun 2019 01:25:52 -0700 (PDT)
Received: from balrog.mythic-beasts.com (balrog.mythic-beasts.com [IPv6:2a00:1098:0:82:1000:0:2:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EE6F12061F; Wed, 5 Jun 2019 01:25:52 -0700 (PDT)
Received: from [130.209.157.48] (port=50954 helo=glaroam2-132-123.wireless.gla.ac.uk) by balrog.mythic-beasts.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <csp@csperkins.org>) id 1hYREw-0002gn-Te; Wed, 05 Jun 2019 09:25:51 +0100
From: Colin Perkins <csp@csperkins.org>
Message-Id: <D50C44AF-E8C9-435B-AB0A-4C45CAF8D47D@csperkins.org>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6EC53BEF-8702-45E8-A425-5E8B499E7688"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 05 Jun 2019 09:25:40 +0100
In-Reply-To: <CAP+sJUd1-WqgD7MUAwEnpA7gxH+Fi7QMjv0N_LjdoCCA_H1OFA@mail.gmail.com>
Cc: tsv-art@ietf.org, roll <roll@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-roll-useofrplinfo.all@ietf.org
To: Ines Robles <mariainesrobles@googlemail.com>
References: <155497956717.12785.2838340405405604916@ietfa.amsl.com> <CAP+sJUd1-WqgD7MUAwEnpA7gxH+Fi7QMjv0N_LjdoCCA_H1OFA@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-BlackCat-Spam-Score: 14
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/w8GFXI3cq1MXgO8RkG1VDWLAp3A>
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-roll-useofrplinfo-25
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jun 2019 08:25:54 -0000

Thanks, that addresses my concern.
Colin


> On 17 May 2019, at 10:34, Ines Robles <mariainesrobles@googlemail.com> wrote:
> 
> Hi Colin,
> 
> Thank you for your review and comments. We have added a new paragraph which addresses your concern.
> 
> New Text: "Since some of the uses cases here described, use IPv6-in-IPv6 encapsulation. It MUST take in consideration, when encapsulation is applied, the RFC6040 [RFC6040], which defines how the explicit congestion notification (ECN) field of the IP header should be constructed on entry to and exit from any IPV6-in-IPV6 tunnel. Additionally, it is recommended the reading of [I-D.ietf-intarea-tunnels]."
> 
> Best,
> 
> Ines
> 
> On Thu, Apr 11, 2019 at 1:46 PM Colin Perkins via Datatracker <noreply@ietf.org <mailto:noreply@ietf.org>> wrote:
> Reviewer: Colin Perkins
> Review result: Ready with Nits
> 
> This document has been reviewed as part of the transport area review team's
> ongoing effort to review key IETF documents. These comments were written
> primarily for the transport area directors, but are copied to the document's
> authors and WG to allow them to address any issues raised and also to the IETF
> discussion list for information.
> 
> When done at the time of IETF Last Call, the authors should consider this
> review as part of the last-call comments they receive. Please always CC
> tsv-art@ietf.org <mailto:tsv-art@ietf.org> if you reply to or forward this review.
> 
> The draft updates RFC 6553 to use a different IPv6 hop-by-hop option type for
> RPL packets, to avoid some issues discovered through deployment experience.
> This looks to require a flag day cutover, and hence has some potential
> interoperability concerns, but introduces no transport concern. The draft also
> describes a number of clarifications around when to use the RPL hop-by-hop
> option header and when to use IP-in-IP tunnelling, described based on a set of
> use case examples.
> 
> There do not look to be any new transport-related concerns with this draft.
> 
> The draft does not mention ECN when using IPv6-in-IPv6 tunneling. It is perhaps
> implied, but a reference to RFC 6040 would be helpful to clarify how ECN bits
> are copied between inner and outer headers when encapsulating and decapsulating
> packets from an IPv6-in-IPv6 tunnel. ECN is seeing increasing use in transport
> protocols, so correctly propagating this information is important.
> 
> 



-- 
Colin Perkins
https://csperkins.org/