Last Call Review of draft-ietf-6man-comp-rtg-hdr-05
review-ietf-6man-comp-rtg-hdr-05-opsdir-lc-hares-2024-04-30-00
Request | Review of | draft-ietf-6man-comp-rtg-hdr |
---|---|---|
Requested revision | No specific revision (document currently at 10) | |
Type | Last Call Review | |
Team | Ops Directorate (opsdir) | |
Deadline | 2024-04-29 | |
Requested | 2024-04-15 | |
Authors | Ron Bonica , Yuji Kamite , Andrew Alston , Daniam Henriques , Luay Jalil | |
I-D last updated | 2024-04-30 | |
Completed reviews |
Secdir Telechat review of -06
by Brian Weis
(diff)
Genart Last Call review of -05 by Elwyn B. Davies (diff) Secdir Last Call review of -05 by Brian Weis (diff) Opsdir Last Call review of -05 by Susan Hares (diff) Tsvart Last Call review of -05 by Gorry Fairhurst (diff) |
|
Assignment | Reviewer | Susan Hares |
State | Completed | |
Request | Last Call review on draft-ietf-6man-comp-rtg-hdr by Ops Directorate Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/ops-dir/TLSmr5Pak2_70zoaeqsJFY63P6Y | |
Reviewed revision | 05 (document currently at 10) | |
Result | Has nits | |
Completed | 2024-04-30 |
review-ietf-6man-comp-rtg-hdr-05-opsdir-lc-hares-2024-04-30-00
This is an OPS-DIR Last Call review. This review should be considered as one of the Last Call comments Status: Ready with Nits General Comment: I commend the authors for writing up the requirements for this experiment with compressed routing headers. I look forward for reports on this experiment. NITs: 1. Abstract: Why: English Grammar - Clarity of sentence Current text:/ Another purpose is to demonstrate that the security considerations, described in this document, can be addressed with access control lists. / Suggested alternate text:/ Another purpose is to demonstrate that access control lists can address security considerations described in this document. / #2. Section 1, paragraph 3. Why: Grammar, Sentence punctuation and clarity Old text:/ This document describes an experiment whose purposes are: * To demonstrate that the CRH can be implemented and deployed. * To demonstrate that the security considerations, described in this document, can be addressed with access control lists. * To encourage replication of the experiment./ New text:/ This document describes an experiment whose purposes are: * To demonstrate that the CRH can be implemented and deployed, * to demonstrate that access control lists can address the security considerations described in this document, and * To encourage replication of the experiment. / #NIT 3: Section 10, Textual Representation Description of problem: This section does not inform the reader why the textual representation description is needed. Possible text to be added to section 9 or 10:/ PING and TRACEROUTE report 16-bit SIDS for CRH-16, and 32-bit SIDS for CRH-32. It is recommended that the experimental reports use the text representations described below./