Skip to main content

Last Call Review of draft-ietf-6man-comp-rtg-hdr-05
review-ietf-6man-comp-rtg-hdr-05-opsdir-lc-hares-2024-04-30-00

Request Review of draft-ietf-6man-comp-rtg-hdr
Requested revision No specific revision (document currently at 10)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2024-04-29
Requested 2024-04-15
Authors Ron Bonica , Yuji Kamite , Andrew Alston , Daniam Henriques , Luay Jalil
I-D last updated 2024-04-30
Completed reviews Secdir Telechat review of -06 by Brian Weis (diff)
Genart Last Call review of -05 by Elwyn B. Davies (diff)
Secdir Last Call review of -05 by Brian Weis (diff)
Opsdir Last Call review of -05 by Susan Hares (diff)
Tsvart Last Call review of -05 by Gorry Fairhurst (diff)
Assignment Reviewer Susan Hares
State Completed
Request Last Call review on draft-ietf-6man-comp-rtg-hdr by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/TLSmr5Pak2_70zoaeqsJFY63P6Y
Reviewed revision 05 (document currently at 10)
Result Has nits
Completed 2024-04-30
review-ietf-6man-comp-rtg-hdr-05-opsdir-lc-hares-2024-04-30-00
This is an OPS-DIR Last Call review.

This review should be considered as one of the Last Call comments

Status: Ready with Nits

General Comment: I commend the authors for writing up the requirements for this
experiment with compressed routing headers. I look forward for reports on this
experiment.

NITs:
1.  Abstract:
Why: English Grammar - Clarity of sentence

Current text:/
   Another purpose is
   to demonstrate that the security considerations, described in this
   document, can be addressed with access control lists. /

Suggested alternate text:/
    Another purpose is to demonstrate that access control lists can address
    security considerations described in this
   document. /

#2. Section 1, paragraph 3.
Why: Grammar, Sentence punctuation and clarity

Old text:/
   This document describes an experiment whose purposes are:
   *  To demonstrate that the CRH can be implemented and deployed.
   *  To demonstrate that the security considerations, described in this
      document, can be addressed with access control lists.
   *  To encourage replication of the experiment./

New text:/
   This document describes an experiment whose purposes are:
   *  To demonstrate that the CRH can be implemented and deployed,
   *  to demonstrate that access control lists can address the
      security considerations described in this document, and
   *  To encourage replication of the experiment. /

#NIT 3: Section 10, Textual Representation

Description of problem: This section does not inform the reader why the textual
representation description is needed.

Possible text to be added to section 9 or 10:/
    PING and TRACEROUTE report 16-bit SIDS for CRH-16, and
    32-bit SIDS for CRH-32.  It is recommended that the
    experimental reports use the text representations
    described below./