►
From YouTube: IETF108-INTAREA-20200727-1300
Description
INTAREA meeting session at IETF108
2020/07/27 1300
https://datatracker.ietf.org/meeting/108/proceedings/
A
Oh
great,
thank
you
sorry
about
that.
So
welcome
to
the
ietf.
I
don't
know
virtual
meeting
and
my
name
is
my
co-chair-
will
be
your
hosts
tonight
for
the
morning.
A
So
the
virtual
meeting
tips,
of
course
this
is
a
new
for
us,
but
still
a
few
common
things
if
your
difficulty
joining
just
try
the
calling
option,
but
I
guess,
if
you
are
hearing
me,
then
you're
fine
by
now,
I'm
going
to
ask
you
to
mute
your
mics.
If
you're,
not
on
the
on
the
cube
I
by
now
you
should
be
familiar
with
wordx
and
you
can
join
the
queue
you
can
remove
yourself
from
the
queue
you
can
participate.
A
So
as
a
reminder
for
atf,
this
is
an
etf
official
meeting,
so
you
are
aware
of
the
ietf
processes
and
policies
and
that
any
ietf
contribution
or
participation
in
this
meeting
is
covered
by
those
policies.
If
you
ever
have
any
any
questions
or
you
want
to
see
more
details,
there
are
some
links
here
on
this
page.
A
As
a
reminder
we
are
taking
minutes,
the
meeting
is
being
recorded.
Your
presence
is
locked
if
you
want
to
contribute
to
the
online
minutes.
Please
do
so
through
the
etherpath
that
you
can
find
the
link
either
here
or
in
the
meeting
materials.
A
The
recordings
and
minutes
will
be
public
and
make
sure
you
you
well
again,
the
same
blues,
the
blue
blue
sheets
are
already
taken
care
of
we're
going
to
be
taking
notes
in
wasim
is
going
to
help
with
the
jabber
scribe,
but
my
understanding
is
that
actually,
you
can
also
do
so
directly
through
mitsuko,
so
our
agenda
today
we're
going
to
start
by
giving
a
quick
update
on
the
group
work
group
items.
A
Then
we
are
going
to
move
to
the
sox
protocol
with
blood
the
internet
protocol
encapsulation
with
ian
ax25
and
an
intro
to
the
chic
lp1
protocol.
They
recently
published
rfc,
8724
and
pascal
is
going
to
talk
to
us
about
how
we
can
use
this
chic
protocol
over
ppp.
So
is
there
any
bashing
for
the.
A
A
Okay,
I'm
seeing
a
comment
there
from
dave
that
there's
an
issue
with
the
note
I
previously
clicked
and
I
had
the
same
issue.
I
don't
know
if
that's
normal,
so
as
a
backup,
we
might
be
taking
offline
minutes
and
uploading
them
later
on.
A
All
right
so
hearing
no
comments
about
the
agenda.
We
can
move
to
the
working
group
status,
update
where
we
have
the
discovering
provisioning
domain
names
and
data
that
has
not
been
finalized,
but
it's
already
not
48,
so
it
should
take
no
time
before
it
becomes
an
rfc.
A
Then
ip
fragmentation
consider
fragile,
with,
with
already
in
the
rfc
editor
queue
and
the
generic
udp
encapsulation.
The
gui
draft
has
been
submitted
to
isg
for
publication
and
it's
in
ad
evaluation.
So
I
don't
know
if
eric
you
want
to
give
us
a
quick
update
about.
A
With
no
other
points,
maybe
we
can
move
now
to
plot
presentation
on
the
sox
protocol
version
six
vlad.
Are
you
connected.
B
And
by
the
way,
jc,
who
is
the
note
taker
right
now.
B
D
A
E
All
right,
I
can't
see
my
slides
on
the
screen.
E
Okay:
okay,
okay,
just
give
me
a
second,
it's
actually
on
the
display
icon,
sure
I
just
have
to
bring
up
my.
E
E
Okay,
can
you
see
my
screen
now,
I'm
accepting
it
now,
so
it
should.
A
E
So
these
last
few
revisions
have
focused
on
the
udp
relay.
We
have
added
all
kinds
of
features
in
order
to
bring
it
up
to
parity
with
turn
and
in
fact
the
current
functionality
supersedes
that
of
turn.
We
have
more
features
and
I
hope
we
haven't
omitted
anything
if
we
haven't,
then
socks
should
be
more
feature-reached
in
turn,
and
it
should
also
be
somewhat
easier
to
use
and
we've
also
added
support
for
icmp
errors,
we'll
see
more
more
on
that
later,
so,
first
up,
we've
refactored
the
messages
used
by
the
udp
relay.
E
So
the
old
message
is
the
association
initialization.
The
association
confirmation
and
the
datagram
messages
still
have
the
same
semantics:
we've
just
refactored
them,
and
they
all
share
the
same
header
that
you
can
see
on
the
left
side.
Now,
not
really,
we've
added
a
message
length
to
all
of
these
relay
messages,
and
this
this
is
somewhat
useless
when
sending
these
messages
over
udp.
But
it's
crucial
once
if
you
want
to
send
them
over
tcp,
so
now,
clients
that
don't
have
access
to
udp
or
dtls
can
send
the
messages
over
tcp.
E
E
So,
let's
talk
a
little
bit
about
supporting
icmp.
So
fundamentally,
icmp
is
a
protocol
that
offers
diagnostics
for
layer.
Three,
the
sox
protocol
abstracts
everything
from
layer
three
below,
so
there
is
no
straightforward
way
of
of
supporting
icmp
with
a
simple
mechanism
that
fits
all
icmp
messages.
So
in
particular,
there
are
two
kinds
of
icmp
messages:
we've
got
echo
and
echo
reply
which
are
not
supported
in
the
current
version.
They
are,
they
have
our
arbitrary
payloads
and
are
very
similar
to
udp.
E
The
the
icmp
messages
that
we
handle
now
are
icmp
errors.
This
is,
they
are
partially
supported
and
this
is
an
optional
feature.
The
reason
why
it's
optional
is
because
of
implementation
and
deployment
concerns.
So,
in
order
to
catch
icmp
messages,
you
need
to
use
raw
sockets
on
linux
or
other
unix-like
systems,
and
the
proxy
also
needs
to
run
as
root.
Obviously
that
can
cause
that
can
cause
problems
for
some
people.
E
So
it's
not
a
core
feature
now
in
particulars
that
we
particularly
support
our
network
unreachable
and
host
unreachable,
ttl
expired
or
pack
it
too
big,
which
is
a
new
feature
in
icmp
v6,
the
other,
the
other
icmp
errors
don't
really
make.
It
doesn't
make
any
sense
to
support
the
other
icmp
error
messages
and
some
some
of
them
are
outright
none
of
the
client's
business.
E
Also,
I've
noticed
that
the
pro
the
client
cannot
instruct
the
proxy
to
issue
any
kind
of
icmp
messages,
so
it
makes
no
sense
to
for
the
client
to
go
like
hey.
Please
hey,
mr
proxy.
Please
tell
the
remote
host
that
I
am
actually
unreachable
that
that
also
that
makes
no
sense
whatsoever.
E
So
icmp
errors
are
only
relayed
from
the
proxy
to
the
client
and
not
the
other
way
around.
E
So
translating
icmp
errors
is
rather
straightforward.
So
on
the
left,
we've
got
the
sucks
error,
message,
format
and
on
the
right
we
have
an
icmp
error
message,
so
we'll
discuss
we'll
discuss
the
fields
in
the
stocks
error
message
shortly.
So
the
icmp
error
is
exactly
what
you'd
expect.
You
have
one.
You
have
an
ip
header
layered
over,
that
you
have
an
icmp
header
and
the
icmp
payload
contains
the
packet
that
supposedly
was
a
troublemaker,
so
you've
got
you've
also
got
an
ip
header
and
a
udp
header
inside.
E
So,
first
up
the
packet
that
supposedly
caused
the
error
was
issued
by
the
client.
So
if
we
look
at
the
inner
packet
source,
ip
and
udp
source,
we
can
tell
what
we
can
tell
what
association
and
id
was
corresponding
to
that
source
to
that
source.
E
E
It
is
so
that
ip
and
the
ic,
the
icmp
type
and
code
are
encoded
in
the
sox
message.
The
error
codes,
of
course,
are
separate
from
the
icmp
error
codes,
but
there
are
error
codes
for
each
of
the
supported,
icmp
errors,
so
that
was
rather
straightforward.
E
We've
also
added
some
other
stack
options
for
udp
related
use
cases,
so
you
can
now
fiddle
with
the
with
ttl
that
that
allows
you
to
to
implement
some
kind
of
trace
route
utility
over
socks.
We.
This
was
a
bit
of
a
an
oversight,
but
we
we
we
didn't,
have
we
didn't?
Have
the
functionality
to
set
the
ip
down
fragment
bit?
You
can
now
set
the
df
bit
and
there's
also
some
option
that
enables
you
to
control
the
port
parity.
E
The
rtp
somewhat
some
rtp
implementations
are
rather
picky
about
what
ports
they
run
on
if
they
would
like
would
like
to
run
on
two
consecutive
ports
and
I've
added
an
option.
Two
socks,
that
kind
of
handles
that
I
won't
go
into
details,
but
you
can
look
at
the
draft
if
you
wanna
see
more
about
that
port
parity
option.
E
E
We've
tried
to
handle
all
of
the
new
use,
cases
that
have
cropped
up
and
that
have
led
to
to
the
creation
of
non-standard
proxies,
so
in
particular,
tor
uses.
Some
non-standard
extensions
and
shadow
socks
also
is
non-standard,
in
that
it
makes
liberal
use
of
mptcp
and
tfo
where
it
might
be
problematic,
sometimes,
and
the
rp
relay
has
been
revamped
so
that
it's
much
more
usable
and
that's
about
it
for
me.
So
would
you
like
to
work
on
sucks
v6
in
the
interior
work
group.
A
A
A
Okay,
okay,
so
we
got
a
forte
for
for
that.
Thank
you
very
much.
So
it
seems
like
we
have
support
for
for
adoption.
We
will
compare
many
way
on
the
on
the
list.
B
A
A
A
A
A
So
we're
going
to
move
on
now
to
jane's
learn
month.
A
A
Okay,
we
can
see
a
weird
mirror
effect
that
I
can.
We
can
see
your
screen
in
order
to
speak,
you
need
to
click
on
the
mic
with
the
little
play
button
on
the
left,
top
left.
A
A
F
A
F
Okay
hi,
so
I'm
going
to
talk
about
something
which,
which
might
be
quite
foreign
to
many
people,
and
it's
it's
a
very
niche
sort
of
protocol
that
exists
within
amateur
radio.
F
It
was
defined
a
a
while
ago.
The
latest
revision
was
around
1998
and
it's
something
that's
that's
stayed
alive
within
amateur
radio
and
and
I'm
working
on
at
the
moment.
So
so
for
those
of
you
that
might
be
unsure
as
to
what
amateur
radio
is.
F
It
is
a
very,
very
broad
topic
that
mostly
it's
it's
a
radio
service,
that's
run
by
amateurs
and
the
main
difference
between
amateur
radio,
licensing
and
the
licensing
of
say
your
mobile
phone
is
your
mobile
phone
is
a
device
that
has
a
license
to
transmit
on
a
set
of
frequencies,
but
with
radio
amateur
radio.
It's
the
operator
that
is
licensed
and
they're
judged
to
be
competent
to
operate
radios
in
various
various
ways.
F
F
So
this
is
a
a
typical
amateur
radio
and
here
there's
a
microphone
attached
and
you
might
be
familiar
with
maybe
depictions
in
tv
or
movies,
and
you
see
someone
talking
on
the
radio
we're
going
to
take
the
microphone
off
of
that.
F
Because
I'm
talking
about
packet,
radio
and
what
I
have
here
is
a
packet
controller
and
you,
you
might
have
memories
of
dial-up
modems,
and
this
is
sort
of
the
same
thing.
It's
going
to
connect
into
the
radio,
take
audio
out
of
the
radio,
put
audio
into
the
radio
and
essentially
play
modem
tones
over
it.
F
F
The
amateur
radio
transmissions
are
clearly
identified
so
by
embedding
the
call
sign
into
the
header
of
every
packet.
You
get
to
meet
this
this
requirement,
and
it
also
has
seen
implementation
for
decades
now
so
there's
a
network
effect
to
using
it
compared
to
going
off
and
doing
your
own
thing.
F
So
the
the
packet
controller
I
showed
there
uses
bell
202
tones
and
works
over
an
fm
radio
and
there
there's
an
abundance
of
fm
mobile
radios
that
have
been
discarded
from
taxis
or
other
other
vehicles.
F
So
it's
a
cheap
way
to
put
together
a
packet
radio
station
on
for
marine
applications,
particularly,
but
also,
if
you're
away
from
infrastructure.
There's
also
people
will
use
bell
103
tones
over
the
high
frequency
bands
and
there's
been
other
other
experiments
with
different
different
modulations.
F
But
what
I'm
talking
about
today
is
none
of
these
physical
layers.
Nothing,
that's
actually
touching
the
radio
I'm
talking
about
running
ax25
over
ip
as
an
overlay
network,
to
link
together
amateur
radio
sites
as
a
number
of
applications
that
you
might
run
over
x25
bulletin
board
systems,
mailboxes
keyboard
to
keyboard,
where
you
just
have
a
chat
between
two
stations,
and
you
are
typing
messages
to
each
other
kind
of
an
instant
messaging.
F
There's
standards
for
running
ipv4
over
x25
there's
been
recent
experiments
with
delay,
tolerant
networking
when
you're
running
at
1200
board
the
time
it
takes
to
get
the
packet
out
of
the
interface
is
a
considerable
part
of
the
the
round
trip
time
and
there's
also
systems
like
the
automatic
packet
reporting
system,
which
are
built
on
top
of
x25
to
create
something.
That's
sort
of
like
a
a
real-time
tactical
data
link
and
analogues
would
be
link,
16,
link,
22,
adsb
or
ais
in
the
marine
environment,
and
you
you
have
now
special
purpose
built.
F
F
So
there's
wide
support
this
equipment's
still
being
manufactured
and
and
it's
in
use
around
the
world,
what
I'm?
What
I'm
talking
about
in
this
presentation
is
an
update
to
rfc
1226,
which
very
simply
described
how
to
encapsulate
these
frames
within
internet
protocol.
F
This
assigned
a
protocol
number
to
it,
but
didn't
really
give
any
recommendations
as
to
how
you
would
deploy
this,
and
so
the
the
draft
that
I've
put
together
adds
considerations
for
quality
of
service
and
also
security
considerations,
which,
at
the
time
that
this
draft
was
written,
I
think
security
considerations
were
very
low
on
the
priorities
for
quality
of
service.
F
I've
looked
at
the
deployments
of
of
these
links
that
exist
in
the
internet
at
the
moment
and
you're,
mostly
looking
at
linking
between
two
sites
that
have
rf,
and
then
you
have
an
internet
back
call
between
them
and
in
some
cases
the
internet
black
hole
may
maybe
again
an
amateur
radio
link
using
2.3
gigahertz
modified
wi-fi
equipment.
F
Instead
of
going
through
an
isp
backhoe.
It's
still
an
amateur
radio
link,
but
it's
now
high
speed
and
it's
it's
a
ip
link.
F
F
These
are
recommendations
because
they're
not
musts,
because,
depending
on
the
deployment
scenarios,
you
might
want
to
change
these
around
and
usually
these
these
are
not
inter-domain
deployments.
They.
They
are
negotiated
between
two
radio
operators
and
they
are
talking
to
each
other
so
that
they
can
change
these
things
if
they
want
the
security
consideration
section,
the
the
integrity
check
is
included
in
in
the
original
protocol.
F
There's
a
crc
check,
that's
included
at
the
end
of
the
x25
frame,
but
there's
no
authenticity
and
the
fcc
regulations,
as
well
as
the
regulations
in
the
uk
require
that
you
ensure
that
only
licensed
radio
amateurs
are
allowed
to
operate
a
station.
F
If
a
packet
comes
in
and
that's
transmitted
onto
rf,
you
need
to
have
a
some
way
of
validating
the
source
and
at
the
moment
those
guarantees
are
very
weak.
Also
you
possibly
unique
to
amateur
radio
encryption
is
forbidden
in
some
cases.
It's
a
crime,
so
using
encryption
is
not
a
way
of
satisfying
the
security
considerations,
so
the
recommendations
in
this
draft
are
to
use
ipsec
with
esp
and
use
null
encryption.
F
F
So
that's!
That's!
All
I've
got
really
on
the
on
the
draft.
It's
not
a
it's,
not
a
very
long
draft.
If
there's
any
questions
comments
feedback,
I
can
provide
some
answers.
A
So,
thank
you
very
much
presentations.
I
don't
know
if
you
were
transmitting
over
ax25,
but
you
were
a
little
choppy,
but
fortunately
you
know
the
it
was
very
graphical
in
very
descriptive.
So
if
we
have
any
single
question
because
we
are
short
on
time,
we
can
take
it
quickly.
Otherwise
I
would
encourage
people
to
send
feedback
on
the
list.
We've
already
seen
some
some
feedback,
and
I
mean
this
draft
has
been
going
around
for
a
couple
of
months
at
least
and
we've
had
some
some
interesting
discussions.
A
So
please
continue
the
discussion
on
the
list.
D
G
G
G
D
A
We
can
see
your
audio
sorry,
your
video,
fine,
your
audio,
is
a
little
choppy,
at
least
on
my
site,
although
I'm
not
sure
if
you,
if
there's
anything,
you
can
do
about
it,
it's
probably
a
codec
issue,
because
the
volume
is
fine.
It's
just
that
it
chops
from
time
to
time.
G
G
Okay,
maybe
I
was
too
close
to
the
mic
in
the
training
I'll
try
to
be
a
bit
further
away
from
the
mic.
Okay.
So
if
you
want,
if
you
want
to
read
rfc,
but
if
you
want
there
was
a
summary
of
the.
G
The
common
characteristics
is
the
very
low
date
rates
in
the
hundreds
of
bits
per
second
or
up
to
a
few
kilobits
per
second.
Some
of
them,
as
shown
here,
are
0.1
gigabits,
a
second
100
seconds
and
also
the
small
periods
that
are
allowed.
G
Typically,
a
few
thousands
of
bytes
compare
that
to
ieee
15.4
the
then
networks
which
have
payloads
more
in
the
hundreds
of
points,
also
a
very
high
impact
of
transmission
on
battery
lifetime,
for
these
are
primary
battery
operated
and
also
because
it's
some
of
these
systems
are
unlicensed
and
there
is
a
regulation
on
time,
layer,
duty
cycle,
and
so,
if
you're
trans,
if
you
have
too
much
transmission
going
on,
you
have
to
shut
up
for
a
while
until
your
one
percent
duty
cycle
is,
for
example,
lp
once.
G
G
G
H
G
H
H
So
I
don't
have
the
size
right
now,
so
so
we
we
develop
a
new
compression
mechanism
that
is
used
for
these
lp1
networks,
so
one
of
them
is
laura
one
network.
You
have
also
sick,
fox
and
also
ieee,
and
so
this
compression
mechanism
is
quite
original
and
different
from
the
previous
one,
but
of
course
take
also
some
content
from
six
lopan
or
rock
and
then
jacobson.
So
the
goal
is
yeah.
I'm
going
to.
H
That's
good,
so
the
compression
mechanism
is
called
chic
schc.
So
it's
a
static,
contextual
compression.
You
can
go
to
the
this
little
slide.
You
showed
was
good
this
one
yes,
so
it
has
just.
It
has
recently
been
issued
as
an
rfc
and
it's
called
stateless.
It
means
that
you,
you
may
be
the
next
line.
Can
you
show
it
next?
H
Okay,
how
the
computer
com
now
the
previous
work?
How
does
it
works?
It's
we
have
a
library
with
a
lot
of
their
packet
description,
that
we
call
rules
or
card
in
in
this
example
on
when
the
packet
arrived
to
the
compressor.
H
What
we
do
is
to
check
among
all
this
card,
to
see
the
one
that
produce
the
best
compression
and
when
we
have
found
it,
we
send
the
card
number
some
compression
residue
on
the
rest
of
the
package,
the
data
and
it
arrive
at
the
other
side,
which
must
have
the
same
list
of
cards
of
words
and
from
the
list
of
rules
it
can
reconstruct
the
packet
so
next
line.
Please
so
here
is
an
example
of
rule
that
is
taken
from
the
rfc.
So
the
rule
in
fact,
is
a
list
of
fields.
H
So
we
compare
the
target
value
with
the
field
value
using
the
matching
operator
and
if
all
the
fields
of
the
rule
match
all
the
fields
of
the
packet,
then
we
can
apply
a
compression
and
the
compression
is
described
by
a
compression
decompression
action
and
the
compression
action
can
be
send
the
things,
send
the
field
internally
and
integrate
in
completely
or
send
just
some
bits,
or
we
have
an
index
with
a
list
of
value
and
we
just
send
the
index
on
on
the
opposite
side.
We
do
the
opposite
using
this
this
one.
H
So
next
slide
please.
So
here
we
have
an
example
of
the
compression
rule
that
is
defined
for
ipv
ipv6
on
udp,
and
you
have
on
the
right
left
right.
Most
side,
the
number
of
bits
that
is
sent
for
ipv6
on
udp,
using
this
word.
H
H
It
means
that
we,
if
I
for
example
in
lp1
network
you
you
have
a
downlink
that
is,
that
is
very
limited,
so
we
use
bitmap
to
have
feedback
on
this.
Bitmap
tells
you
which
packets
are
well
received
and
which
one
has
not
well
been
received,
and
we
have
a
very
efficient
mechanism
that
is
called
account.
H
Error
and
icon
error
can
reduce
the
feedback
to
one
message:
if
you
have
no
errors
and,
of
course,
the
number
of
feedback
increase
when
the
number
of
error
increased
too
and
we
have
no
hack,
which
is
very
simple-
we
have
no
feedback,
but
when
the
packet
is
received,
we
are
sure
that
it's
correct
or
not
so
next
slide.
Please.
H
So
here
it's
what
I
said
before
is
that
chic
is
a
very
generic
mechanism
that
describes
a
generic
compression
mechanism,
a
generic
fragmentation
mechanism,
and
then
we
have
to
apply
it
to
some
environment.
So
the
first
rfc
describe
how
we
do
udp
and
ipv6.
We
have
described
how
to
do
co-op
compression.
H
A
If
you
have
any
questions,
as
you
can
see,
this
is
a
generic
document
that
has
been
already
approved
and
published
in
the
lp-1,
and
the
idea
is
to
present
here
the
concept,
because
pascal
will
now
talk
about
how
to
apply
the
same
principles
to
a
non-lp1
technology,
and
that's
why
we
need
to
understand
at
least
the
principles
before
understanding.
What
pascal
will
want
to
share
with
us
soon.
A
Okay,
so
I
guess
because
we
are
running
out
of
time-
maybe
we
can
move
to
pascal.
A
Do
you
want
to
share
your
slides
or
you
want
me
to
share?
We
cannot
hear
you,
we
need
to
click
on
the
mic.
A
Now
you
have
to
click
on
the
little
screen
like
the
monitor
and
then
you
can
share
your
slides.
C
Okay,
yes,
don't
do
you
want
to
to
share
them,
or
do
you
want
me
to
share
them?
Okay,
I
can
share
them.
Let
me
show
them.
C
Actually,
I
have
added
one
slide,
just
as
a
helper,
so
I'll
go
quickly
through
it,
but
you
you
won't
find
it
in
the
in
the
powerpoint
that
I
uploaded
so
there
we
go
so
you've
seen
that
with
this
new
compression
scheme
check-
and
it
was
initially
designed
for
low
power
wide
area
networks.
But
as
you
know,
there
is
all
the
world
of
existing
legacy
links
like,
for
instance,
gpa
gprs,.
D
A
But
I'm
not
sure
I
have
the
latest
version.
Let's.
A
A
C
C
C
C
I'm
sorry
goes
on
goes
off
and
I
can't
say
why
okay,
so
so,
basically
we
have
enabled
shake
for
lp1,
but
there
is
a
huge
variety
of
links
for
which
it
is
not
enabled,
and
there
was
a
quick
and
easy
way
to
enable
shake
and
all
those
networks
is
to
enable
shakeover
ppp.
So
it's
it's
a
it's
a
good
idea
for
two
reasons.
C
The
first
one
is:
there
are
already
already
compression
schemes
defined
for
ppp,
so
there
is
all
the
mechanisms
in
ppp
to
say
which
compression
you're
using
the
second
thing
is
ppp
gives
us
all
the
legacy
radios
like
your
gprs
phone,
but
with
ppp
and
serial
links.
Obviously,
but
with
pppoe
you
can
get
anywhere,
I
mean
with
ethernet,
you
get
wi-fi,
you
get
pseudo
wires,
you
get
everything.
C
So
basically,
we
thought
that
the
shortcut
to
get
ppp
over
full
was
to
get
ppp
over
ppp
chic
of
rpp
and
then
do
ppp
overflow.
C
So
we
started
the
work
at
lp1
did
some
review
there,
but
at
some
point
we
we
talked
with
eric
and
the
the
decision
was
that
lp-1
was
not
chartered
to
work
on
ppp.
So
we
better
talk
at
interior,
and
that's
that's
why
we're
here
now
so
we
we
moved
the
draft
to
interior
and
proposed
it
there
and
eric,
maybe
at
the
end,
if
you
want
to,
I
have
a
discussion
if
you
want
to
say
more
words
about
this.
C
So
basically,
this
is.
This
is
like
zero
zero,
but
it's
not
really
because
there
were
two
instances
in
in
lp1
already,
so
the
changes
basically
are
that
I
provided
more
parameters
and
and
basically
chic
is
completely
stateful,
so
you
have
to
say
where
the
compression
state,
which
tells
you
which
bits
go
compressed
and
which
don't
this
must
be
stored
somewhere
and
available
to
both
parties,
the
compressor
and
the
decompressor.
C
This
is
the
the
slide
which
puts
things
in
in
perspective.
So,
as
you
see,
you
may
have
a
device
which
is
not
aware
of
shake,
in
which
case
it's
on
the
left.
It's
what
I
call
the
speaker,
in
which
case
the
router
will
be
doing
the
chic
compression,
but
the
two
devices
on
the
left
could
be
collapsed
in
one
single
device,
which
is
the
ppp
client
and
in
the
example
I'm
giving
it's
ppp
over
ethernet.
C
C
So
if,
if
you
have
split
the
speaker
and
the
router,
then
the
router
needs
to
to
get
to
to
determine
what
the
speaker
is
and
get
the
compression
state
and
that's
what
the
first
arrow
tells
you.
Then
the
next
steps
that
you
can
see
are
classical
ppp
of
the
ethernet.
It's
just
that
when
we
will
be
doing
the
ipv6
cp
negotiation
we'll
have
to
place
this
configuration
well
request.
C
The
configuration
request
we'll
have
to
place
this
option
two,
which
is
the
ipv6
compression
protocol
description,
and
in
this
we
are
actually
adding
the
capability
to
to
say.
Oh,
the
compression
is
going
to
be
check
and
since
there
is
already
in
the
rfc
the
the
way
to
to
express
some
data
which
is
specific
to
this
compression,
the
data
that
we
propose
to
use
here
is
the
url
of
the
compression
state.
C
So
the
the
router
on
the
switch
that
access
the
gateway
will
go
and
fetch
the
rule.
If
it's
happy
with
the
rule
set
and
could
pass
it,
then
it
will
send
a
configuration
ack
which
will
begin
the
ipv6
traffic
over
this
particular
session.
C
So
the
discovery
which
is
part
of
the
step
defined
by
pppoe
in
pppoe,
it's
it's
a
sequence
of
four
pad
message
by
the
ipad
or
padarpadas
and
they
could
be
replaced
by
anything.
We
don't
necessarily
need
the
bad
message
from
pppoe
to
to
to
find
which
are
the
two
and
the
compressor
under
the
compressor,
but
it's
just
a
logical
option
when
you're
using
pppoi,
so
here
I'm
putting
the
resulting
packet-
and
this
is
an
ipv6
over
ppp
packet.
C
You
see
the
chic
rules
which,
in
the
profile
that
I
propose,
is
expressed
in
two
bytes
compression
residue
and
padding,
which
I
placed
there
to
simplify,
and
then
we
can
discuss
with
with
the
chic
people
if
it's
a
good
idea
or
not
and
then
whatever
uncompressed
original
payload
that
could
be
after
the
compression
residue,
but
that
can
that
can
also
be
uncompressed
payload
inside
the
compression
residue
right,
and
so
so
that's
basically
it
half
of
the
document
is
probably,
and
maybe
the
biggest
half
is
to
propose
a
profile
for
check
over
ppp.
C
C
Okay,
so
so,
let's,
let's
move
to
the
to
the
the
question.
Basically,
so
in
less
than
one
minute,
he
could
tell
us
whether
why
we
should
do
it
and
whether
we
should
adopt
it
there
and
then
the
next
question
will
be
for
the
mailing
list.
I
guess.
B
Yeah,
so
the
responsibility,
this
specific
work
was
impossible
to
take
into
account
in
ip1,
because
the
chart
of
lp1
is
only
for
6v1
and
basically
lp1
layer,
2
networks.
So
the
catch-all
working
group
is
really
interior
here
and
there's
a
reason
why,
with
the
chairs
of
lp1
pascal
and
the
chairs
of
inter
area
was
same
and
jc,
we
proposed
that
this
document
is
adopted.
B
A
We're
going
to
be
very
soon
so
please
send
your
comments
and
questions
to
the
list.
There
were
a
few
on
the
chat,
but
we
don't
have
time
to
go
through
them.
So
I
encourage
you
to
please
think
pascal
on
the
list
about
this
document
and
for
sure
we're
gonna
keep
talking
about
it
over
the
list
and
over
the
next
sessions
so
before
we
are
caught
up.
Thank
you.
A
Everyone,
sorry
about
the
little
hiccups,
but
thank
a
lot
for
attending
this
session,
and
I
wish
you
all
a
good
ietf
virtual
meeting.