►
Description
Evolvability, Deployability, & Maintainability (EDM) Program Meeting, 2021-08-04
https://datatracker.ietf.org/group/edm/meetings/
C
So
first,
I
think
we
just
want
to
go
through
what
we
have
open
on
user
lose
it.
So
I
was
just
going
to
share
the
github.
Is
that
okay,
martin.
D
C
Yeah
all
right:
where
do
we
want
to
start
issues
or
prs.
D
D
Let's
do
the
first
one,
because
I've
actually
got
something
to
ask
on
that.
One.
D
We
may
disagree
on
the
first
point,
but
I
do
agree
on
the
second
point,
and
so
I've
cut
that
down
quite
a
lot
in
the
pull
request
that
I've
got
there.
One
of
the
things
that
sort
of
came
out
of
the
discussion
would
tell
us
about
this.
One
was
that
this
is
probably
just
a
distraction
from
the
from
the
central
theme.
D
I
think,
there's
an
important
point
to
make,
which
is
to
recognize
that
middle
boxes
are
participants
in
the
protocols,
even
if
you
don't
want
them
to
be-
and
you
have
to
engage
with
that.
That
fact,
but
that's
the
only
point
that
we
really
really
need
to
make.
E
Yeah,
I'm
not
sure
if
you
actually
need
the
term
middle
boxes
all
so
there
are
problems
which
have
multiplies
more
than
two
at
least,
and
there
are
also
some
parties
which
are
just
by
just
participating
unintendedly.
So
that's
what
we
need
to
say.
I
think.
D
Yeah
and
and
that's
what
the
the
pull
request
essentially
does
is
it
takes
the
one
little
snippet
that
that
says
that
and
leaves
only
that
in
the
in
the
text
and
then
cuts
down
the
remainder
of
the
actually
cuts
out
the
cryptography
section
entirely.
F
A
C
Mind
yeah,
I
I
see
well,
but
it
means
is
that
not
kind
of
the
point
being
brought
brought
up
by
the
fact
that
simple
protocols
can
involve
more
actors
than
is
immediately
a
parent
or.
D
Any
anyway,
let's,
let's
work
on
the
on
david's
text
there
and
for
the
question
that
I
have
is.
Is
this
the
general
direction
worth
taking.
D
D
E
You
from
unintended
participation
you,
you
should
use
encryption
where
possible.
C
Is
what
is
what
is
the
rationale
for
in
this
pr?
Removing
that?
Do
you
see
that?
Did
you
see
that,
as
mainly
something
to
do
with
middle
boxes,
then.
E
For
me,
it's
quite
central,
because
that's
that's
only
if
you,
if
you
can
protect
the
in
the
variant
parts
of
your
protocol,
which
is
either
by
doing
encryption
or
using
or
whatever.
Actually
it
makes
sense
to
talk
about
inverters.
If
you,
if
you
don't
have
any
encryption,
then
there's
like
you
know,
nothing
can
do
against
justification.
D
It
also
recognizes
that,
most
of
the
time,
the
problems
that
you
encounter
are
the
the
things
you
want
to
talk
to
anyway,
and
that's
really
what
I
wanted
to
to
focus
on,
so
it
the
first
sentence
there
from
the
security
consideration
sex
is
controversy,
can't
might
be
used
now.
I
can
change
that
to
a
can,
or
some
other
word,
if
you
think,
that's
more
appropriate.
E
C
C
D
Yeah,
I
think
the
the
the
point
of
invariance
is
is
probably
and
elliot
helpful,
hopefully
pointed
this
out
going
back
to
rsc
5704.
D
They
talked
about
invariants
there
and
one
of
their
examples
was
the
iptl
and
what
it
means
you
decrement
the
ttl.
Every
time
you
forward
a
packet
and
that's
something
that
a
lot
of
other
capabilities
in
the
protocol
depend
on
and
if,
if
that
does,
if
that
invariant
is
not
maintained,
it's
no
longer
called
ip
and
that's
kind
of
central
to
the
to
the
whole
thing,
and
that
was
actually
central
to
the
debate
that
was
had
at
the
time
of
5704
in
it
and
mphl
mptls
mpls,
yeah
yeah.
So.
H
You
know,
I
don't
think
I
don't
think
crypto
fits
in
there.
Yeah
it's
meaningful
stuff
means
invariants,
even
if
there's
no
crypt,
so
it's
not
feasible
to
stop
someone
messing
with
them.
If
there's
no
crypto.
E
Right
no,
but
I
mean
the
whole
point
about
so
invariants
are,
are
easy
because
that's
the
part
that
cannot
define
one
exhaustive
fight
or
whatever,
but
to
protect
the
part
that
is
variable.
You
need
something
else
and
that's
like
you
know.
If
you
cannot
encrypt
it,
then
it's
greasing
or
use
it.
If
you
can
encrypt
it,
then
that's
another
way
to
protect
some
of
that.
C
Maybe
maybe
I'm
wondering
if
there's
another
way
to
put
it
that
doesn't
make
cryptography
like
the
key
thing
that
you
should
do,
but
could
we
instead
say
limit
limit
participants
as
a
way
to
improve
this?
Cryptography
is
one
way
to
do
it,
but
another
way
to
achieve
something
that
can
be
extended
is
limiting
participants
by
having
it
be
in.
You
know,
like
only
for
these,
this
particular
protocol
within
your
limited
domain.
C
That's
a
very
popular
thing
these
days
right,
that's
another
way
to
get
the
same
effect
like
if
you're
not
putting
it
out
on
the
open
internet
on
open
routers.
H
E
Yeah
yeah
and
just
to
go
away
from
this
middlebox
team.
So
it's
not
about
limiting
participation,
but
it's
controlling
who
really
has
success
and
is
an
active
party
here.
B
D
Yeah
actually
looking
at
the
section
here-
I
I
think
it
would
probably
just
put
it
back
and
leave
it
at
that.
I
know
someone's
got
some
suggestions.
B
D
So,
from
my
perspective,
having
gone
through
the
issues
relatively
recently,
a
lot
of
the
rest
of
these
are
in
the
too
hard
basket
for
me.
So
yeah,
let's,
let's
go
through
some
of
them
and
see
if
we
can
work
out
what
to
do
with
them.
Yeah
all
right.
So
this
one.
D
Should
be
done
here
if
anything,
I'm
still
trying
to
work
out
what
elliot's
concern
is.
I
haven't
read
his
response:
okay,
but.
E
C
C
D
I
I
think
so
I
think
that
probably
that's
too,
to
assertive
a
statement
to
make.
F
C
B
Issues
without
pr's,
you
should
close
this.
If
there's
no
pr.
C
G
E
Yeah,
it
was
many
broader
samples
examples
and
then
also
I
thought,
there's
a
little
bit
more
redundancy,
but
I
didn't
look
at
the
latest
version.
If
there
were
more
changes,
the
vr
was
so
defined.
C
C
D
E
No,
this
is
definitely
a
big
improvement.
I
don't
think
I
think
the
document
is
fine,
it's
just
like
the
the
shorter
and
crisp
it
is.
I
think
the
better
it
is
so
yeah.
Maybe
just
and
final
review
pass
at
the
end
will
help.
So
I
don't
know.
D
Yeah
I
found
the
the
expansion
of
the
the
text
on
tcp
to
be
pretty
good
as
well.
E
F
F
C
C
I'm
okay
with
this-
I
I
think
there
you
know
just
for
just
for
open
discussion
for
this
group.
I
think
there's
it'll
be
interesting
to
see
how
things
work
out
with
quick
having
grease
from
the
beginning
versus
adding
stuff
later,
but
I
don't
think
there's
going
to
be
anything
we
can
comment
here
in
the
document,
especially
now
how
we
rephrase
things
to
say
you
know
it's
just
falsifying
and
use
yes.
E
And
I
think
from
this
document
has
already
changed
a
little
bit
that
beginning
at
the
beginning,
it
was
very
focused
on
greasing,
and
now
it's
more
focused
on
active
use,
which
I
think
is
the
right
thing
to
do
and
what
we
say
in
the
document
is
that
reasoning
has
proven
to
be
useful
for
the
dls
ttls
case,
where
it
was
added
later
on,
but
everything
else
still
has
to
be
proven.
So
I
think,
like
that
direction
already
changing.
This
is
addressed
to
some
extent.
C
Yeah,
I'm
just
gonna
for
my
own
tracking,
I'm
going
to
open
an
issue
over
in
the
edm
program
side
to
just
say,
like
hey,
look
at
this
and
think
about
in
the
future,
but
I'm
going
to
close
this
for
now.
H
A
I
I
think
there
are
some
lessons
from
the
initial
quick
deployment,
because
we,
like
literally
when
we
added
we
added
greasing
to
we
crashed
one
of
the
implementations
and
that
got
fixed
before
we
it
shipped.
So
that's
that's
an
example.
We
could
mention,
because
that
got
fixed
before
anything
in
production.
C
H
E
H
C
Right,
I
think
that's
a
great
thing
to
do,
and
I
just
capture
and
I'm
typing
in
those
notes
into
the
issue
on
kind
of
our
program
side.
I'm
just
I'm
worried
about
bloat
on
this
one
and
I
think,
there's
there's
a
lot
of
work.
We
can
still
do
talking
about.
You
know
how
do
we
do
the
deployment
of
a
protocol
within
a
group.
C
D
C
D
Yeah,
I
think,
we've
we've
tried
a
couple
of
things
that
work
this
way
and
it's
actually
a
pretty
cool
design
technique,
particularly
once
you
have
crypto
in
in
the
mix-
and
this
is
one
of
those
things
that
we
sort
of
did
in
quick
to
some
extent,
with
the
way
that
we
did
address
validation
for
the
handshake.
There's
no
additional
overhead,
you
just
encrypt
the
packets
and
if
they
don't
decrypt,
then
it
wasn't
legitimate
and
that
just
sort
of
falls
out
by
virtue
of
tying
into
other
things.
But
it's
a
design
technique.
D
It's
not
really
it's
not
really
central
to
this,
and
so
I
think
that
I
don't
think
we
need
to
mention
it.
E
D
C
Right,
I
guess
the
way
I
would
first
is:
do
we
think
there's
anything
in
this
section
on
dependency
that
is
lacking,
and
I
I
feel
like
this
ends
up
just
being
an
example
of
one
way
to
achieve
dependency.
But
you
know,
given
that
we
are
moving
more
and
more
of
the
examples
out
of
the
text
and
just
saying:
hey,
here's
just
here's
the
principle.
E
What
I
was
thinking
was
more
not
talking
about
pls,
specifically,
but
more
generally,
having
another
note
saying
that
cryptography
can
also
help
by
keeping
those
documents
those
protocols
viable,
because
if
you
change
keys
or
whatever,
then
you
can
detect
things
quickly.
A
C
E
D
So
number
26
I've
actually
found
through
elliot,
pointing
at
5704
the
kind
of
an
original
definition
of
invariance
and
so
david's
reviewed.
The
pull
request
number
63
talks
about
that.
I'm
thinking
that
maybe
that
might
might
close
the
loop
on
this
one
so
interesting.
D
I
didn't
intend
for
that
to
happen,
but
the
mpls
example
is
happy
accidents.
C
A
C
F
F
C
Okay
yeah.
I
I
think
this
is
a
fine
change
going
back
to
the
issue.
C
D
A
I
I
need
to
drop,
unfortunately,
for
the
second
half
of
a
conflict
that
sprung
up
last
minute
with
important
people
that
I
couldn't
decide
to
skip
so
I'm
gonna
drop.
Luckily
eric
can
get
people
to
to
admit
people
in
and
handle
the
recording
if
it
drops
so
see,
y'all
soon,.
C
Okay
and
then
martin
did
you
just
merge
that
other
guy.
D
D
D
E
I
D
Yeah,
I
think,
given
the
amount
of
work,
that's
happened
here.
I
think
we
can
probably
just
say
yes.
D
C
Yeah
so,
and
that's
one
of
the
things
that
came
up
during
the
iab
open
discussion
right
of
people,
saying,
like
the
applicability
of
this
to
other
layers
right.
C
H
H
C
I
mean-
and
I
do
think
the
time
scale
for
what
it
means
to
evolve
and
deploy
something
new
is
definitely
different
at
different
layers.
Right,
like
your
time
scale
for
doing
a
new
ip
feature
in
routers
is
definitely
very
very
different
than
adding
a
new
header
in
http
or
something
else,
but
I
I
just
don't
know
if
it's
it
really
changes
what
we
say.
E
I
I
believe
the
general
principle
applies
that
you,
you
have
to
use
accenture
mechanisms
actively
to
actually
keep
them
viable,
but
the
focus
the
document
is
very
focused
on
higher
layers
and
that's
also
very
clear,
stated
in
the
document.
I
think
that's
fine.
H
F
C
H
There's
probably
examples
on
the
ipv6
helped
by
hop
headers
and
so
on,
for
the
lower
less.
D
There
is
a
mention
of
that
in
the
document,
but
already
yeah,
one
of
the
one
of
the
things
that
we've
learned
from
that
is
that
we
don't
know
the
answer
yet
and
that's
really
all
we
can
say.
C
The
text
it
doesn't
have
does
it
doesn't
have
a
conflict,
oh,
but
you
oh,
but
it
will
when
we
merge
the
other
one
is
what
we're
saying
yeah.
D
Okay,
let's,
I
think
we
probably
dropped
the
second
edition,
what
what's
yeah?
What's
your
what's
your
argument
for
that.
G
B
About
how
you
would
change
the
order,
potentially,
rather
than
just
stating
that
the
order
does
matter
above
it's
fine
to
drop.
D
D
F
D
E
E
E
It
and,
of
course
the
iab
will
see
that
this
document
is
on
some
agenda
at
some
point,
so
everybody
has
a
chance
to
look
at
it.
My
question
is,
rather,
do
we
want
to
pick
or
do
we
want
to
find
like
one
or
two
more
people
who
actually
ensure
that
they
will
do
another
in-depth
review
of
the
document,
or
are
we
fine
with
with
the
amount
of
people
we
had
so
far.
C
I
think
we've
got
a
number
of
good
eyes
on
it.
Some
people,
particularly
in
this
last
kind
of
call
to
list-
I
I'm
very
happy
with
the
attention
we've
got
on
it
in
the
reviews,
so
I
think
just
kind
of
kicking
it
through
the
normal
process
would
be
okay.
From
my
perspective,
I
don't
know
if
anyone
is
curious.
E
D
You
could
you
could
always
ask
the
ib
members
to
make
a
commitment
to
review
during
the
comment
period
exactly
exactly.
E
C
C
All
right:
okay,
wow
everything
is
just
merging
away:
beautiful,
okay,
okay,
we
can
move
on
from
this.
C
The
other
thing
that
was
brought
forward-
and
we
can
talk
about
this
more
later
to
it
another
venue,
but
I
just
wanted
to
bring
it
up-
did
people
see
what
charles
had
proposed
here.
D
Yeah
this
is
this
is
one
of
those
interesting
things
that
sort
of
falls
into
the
cracks
often-
and
I
think
charles
is
suggesting
a
formalism
that
maybe
isn't
necessary,
but
at
the
same
time,
there's
there's
a
bunch
of
things
that
we
might
want
to
talk
about
in
this
space.
D
I
wouldn't
publish
this
document
right,
but
for
starting
a
conversation,
it's
kind
of
great
and
we
should
probably
have
charles
on
a
call
for
one
of
these
things.
C
Yeah
yeah
no
and
we'll
schedule
another
one,
but
let's
just
just
start
and
with
the
people
we
have
here.
C
I
don't
know
how:
how
do
you?
What
do
you
think
practically
could
be
done
here?
You
know,
I
think
yeah
you
could
formalize.
Oh
here's
the
way
to
hook
up
your
github
code.
How
do
we
think
that
would
actually
play
out,
though
I
mean
essentially,
how
do
we
replicate
some
of
the
good
stuff
we
see
with
quick
of
saying,
hey?
There
are
a
lot
of
interoperable
implementations
that
are
working
on
this
and
get
that
benefit.
D
D
In
terms
of
you
know
the
high
energy
event,
and
during
that
event,
people
were
very
proactive
and
contributing
and
the
run
I
was
working
and
people
were
actively
relying
on
it,
and
then
people
are
shipping
now
and
that
that
thing
broke
and
no
one
commented
for
weeks,
and
so
a
lot
of
these
things
require
a
lot
of
maintenance
and
I'm
not
really
sure
that
we
can
sort
of
rely
on
all
the
communities.
D
B
E
This
point
that
so
the
implementation
section
is
supposed
to
be
removed
before
publication
as
rfc,
because
what
you
said
it's
like
they
outdate
very
quickly,
but
on
the
other
hand,
if
you
read
an
rfc,
it
would
be
still
very
useful,
even
just
to
have
a
report
with
outdated
code
like
to
have
like
any
kind
of
pointer.
So
how
do
we
get
that.
F
H
G
H
Sure
any
of
those
implementations
are
still
used
these
days,
and
I
I
I
still
worry
that
we'll
be
pointing
to
code.
That's
just
not
that's
actively
misleading
rather
than
just
not
useful,
and
I
I
also
worry
slightly
that,
if
we're
not
careful,
we'll
we'll
run
into
antitrust
issues
and
that
sort
of
thing,
if
we're
pointing
at
particular
implementations
rather
than
indirecting
it
through
some
third
party,
that
says
you
know,
there's
a
community
maintained
list
over
here.
D
Yeah
quick
ended
up
with
that
that
sort
of
indirection,
and
I
think
it's
worked
out
reasonably
well.
If
you
look
at
the
the
the
wikis
that
are
maintained
on
quick
or
tls
that
it's
just
people
make
their
own
contributions
to
the
thing
and
it
turns
out
to
be
useful,
I
think
that's
all
charles
is
really
asking
for
here
as
well.
It's
just
that
there's
a
little
more
formalism
around
the
the
way
that
it's
set
up
so
that
there's
standard
places
you
can
go
to
look
for
these
things.
E
Yeah,
I
mean
what
has
changed
since
publication
of
7942
is
github.
Basically,
that
didn't
exist
in
at
least
that
broadly
there
used
to
be
and
like
today,
you
can
find
a
lot
of
things
on
github
and
getting
a
connection
here
since
the
question.
C
Yeah
one
of
the
interesting
things
you
know,
obviously
charles
comes
from
the
background
of
hackathon
here
and
also
you
know,
martin.
What
you're
pointing
to
is
that
you?
We
have
these
high
energy
moments
where
people
are
engaged
and
that's
when
this
works
well
and
then,
eventually,
you
know
people
ship
out,
and
you
know
they
have
other
priorities
and
not
going
to
keep
updating
these
things.
C
I
wonder
if
you
know
to
some
degree,
would
it
make
sense
to
have
these
pointers
really
be
too
like
snapshots
that
are
like
how
you
have
in
data
tracking
like
here
was
a
meeting
and
then
like
that
was
the
meeting
that
happened
on
this
day
and
it's
kind
of
expired
now
and
like
here
was
this
interop
event,
and
here
are
the
here's,
the
things
that
were
tested
here?
You
can
go
look
at
that
snapshot,
but
it
maybe
it's
not
as
misleading
michael.
You
have
your
hand
up.
G
Yeah,
so
I
have
two
things
to
say
about
that:
one
is
that
that
forgetting
getting
the
the
what
what
happened
at
the
hackathon
out
and
kind
of
clear
is
I
actually
actually
a
lot.
J
G
And
I've
been
involved
in
quite
a
few
interop
events
and
hackathons,
and
sometimes
you
really
don't
have
any
idea
and
some
some
events
have
been
covered
by
interesting,
ndas
and
and
although
the
the
in
hindsight,
I
wish
I
had
known
about
what
chatham
house
rules,
because
that's
actually
really
what
you
really
really
want
right
and
but
I'll
say
this.
This
is
a.
I
don't
know
how
to.
G
I
don't
know
how
to
say
this
loud
enough
to
the
right
people,
because
none
of
them
are
in
the
room
right
that,
if
you
think,
if
your
company
thinks
that
you're
going
to
eventually
implement
protocol
foo,
but
only
after
it
becomes
rfc,
then
you're
going
to
miss
all
of
the
interop
events.
That
actually
will
make
you
clueful
enough
to
actually
implement
it
properly.
G
And
I
don't
know
how
to
say
that
loud
enough
to
people,
you
don't
have
to
ship
a
product.
But
you
know
that
was
the
case
for
ike
v2
15
years
ago
right.
The
people
who
were
that
in
that
room
in
toronto
are
the
people
that
have
trop
products
and
the
people
that
weren't
in
that
room
yeah.
They
still
have
like
v1,
right
and-
and
it
can't
be
said
loud
enough-
I
don't
know
how
to
to
do
that.
But
anyway
we
we
we
had
a.
G
I
think
that
that
I
think
that
the
ietf
layer,
2
vpn,
which
hasn't
really
worked
that
well
yet,
but
but
you
know
we
got
close
in
march
and
then
we
changed
the
hardware
and
now
it
I
haven't,
got
it
working
again
myself,
but
and
charles
has
heard
all
about
these
things,
but
we
we
actually
have
a
layer,
two
discovery
protocol
in
anima,
and
so
we
actually
really
wanted
to
use
it,
because
we
wanted
to
test
that.
G
So
we
couldn't
do
that,
but
being
able
to
run
that
on
a
ongoing
basis
is
actually
a
really
really
valuable
kind
of
thing
and
the
the
the
having
people
leave
their
systems
up
is
valuable
and
also
that
that
that
thing,
actually,
you
know,
essentially
punches
through
all
their
corporate
firewalls
into
the
lab
right
and
they
can
never
get
things
exposed.
Otherwise,
even
even
they
go
to
amazon
or
whatever,
they
still
can't
think
get
the
right
things
exposed
to
test
things.
Oh.
G
G
Well
and
you
know,
and
then
you
have
iot
devices
where
you
you
actually
physically
need
to
poke
them
yeah
with
a
with
a
screwdriver
to
get
them
to
reset
and
stuff
like
this.
So
I
think
that's
a
that's
a
huge,
valuable
thing,
and-
and
you
know
I
read
that
I
read
a
dot.
G
I
read
this
document
a
while
ago,
or
you
know
like
more
than
a
month
ago,
and
I
I
I
don't
remember
it
very
well,
but
I
I
think
that
that
what
I'm
trying
to
say
is
that,
as
you
said,
there's
this
huge,
you
know
amount
of
energy
and
the
trick
is
not
is
to
harness
that
and
somehow
to
to
get
it
to
persist
for
a
bit
longer
right
into
things
and
make
it
as
cheap
as
possible
for
people
to
persist.
G
That,
and
I
think
that
l2vpn
I
think,
is
underappreciated
at
this
point,
and
I
hope
that
that
is
something
we'll
think
about
as
a
not
just
because
we're
virtual,
but
because
we
we
need
to
do
this
on
ongoing
basis
right.
C
G
Well,
yeah,
so
so
that's
that's
part
of
it
and
and
the
thing
that
worked
for
us
two
weeks
ago
was
that
we
only
said
we're
going
to
be
together
for
an
hour
at
a
time
at
you
know
the
typical
10
a.m,
eastern,
and
so
that
was
a
minimum
amount
of
of
disruption
to
people's
time
and
we
got
together-
and
we
very
clearly
you
know
pulled
up
screen
shares
to
look
at
log
files
right
during
that
hackathon.
We
didn't
try
to
do
anything
else.
G
That
was
you
know
more
business
or
you
know
whatever
we
didn't,
we
didn't
edit
ids.
We
didn't
do
anything
else.
We
just
we
just
we
just
it
was
just
a
a
standing,
a
meeting
and-
and
that
was
really
valuable,
but
no
one
other
than
me
had
tried
the
vpn
at
that
point.
So
I
hope
we'll
we'll
get
it
working
in
september.
D
Yeah,
I
shared
a
link
to
the
original
wiki
page
that
we
used
for
for
tracking
tls
implementations
and
chris
and
his
wisdom
has
turned
it
into
a
repo
which
is
not
such
a
terrible
thing.
But
it
also
raises
the
bar
to
come
to
contributions,
which
is
an
interesting
question
to
ask,
is:
is
the
wiki
with
its
ease
of
access
and
lowering
the
bar
as
michael
would
would
have
it?
Is
that
the
the
right
way
to
do
things,
or
you
know,
is
the
just
a
little
little
bit
extra
of
getting
it
into
a
repo.
D
No
because
of
the
way,
the
barriers
to
contributions,
so
one
of
them,
you
have
to
open
a
pull
request
and
the
other
one
you
just
have
to
edit
the
wiki
and
there's
no
permissions.
There's
no
there's
no
gatekeeper.
D
G
G
For
info
and
oh
yeah,
test
servers
at
the
bottom.
C
C
Yeah-
and
I
think
it's
also
important
to
note
that
you
know
there
are
examples
on
here
that
do
not
have
repos
behind
them
that
are
accessible,
but
it
is
still
tracking
who
has
done
what,
and
I
think
there
is.
You
know,
meta
value
for
a
working
group
and
knowing
who
has
what
implemented
of
what
status.
D
Yeah,
that's
that's
actually
that
information
there
is
is
variously
out
of
date.
As
you
will
see,
I
think
I
can
list
a
bunch
of
those
that
have
complete
full
standard
implementations
and
probably
a
lot
of
those
that
claim
to
have
draft
implementations
don't
anymore.
So
that's
the
classic
problem.
D
C
Yep,
that's
good
all
right,
so
yeah.
I
think
we'll
we'll
set
aside
some
time
at
a
future
call
we'll
schedule
in
september
or
october.
We
can
have
charles
here
and
talk
a
bit
more
about
this
type
of
stuff
and
then
hopefully,
at
that
point
we
will
also
have
gone
further
on
publishing,
use
it
or
lose
it,
and
we
can
talk
about.
I
guess:
do
we
want
to
talk
about
anything
for
protocol
maintenance?
Was
there
anything
that
needs
to
be
done
there
before,
like
a
shifter?
C
All
right,
I
think,
that's
it
from
what
I
wanted
to
cover
today.
Other
people
who
have
thoughts
eric
did
you
want
to
bring
up
some
of
the
stuff
you're
talking
about
earlier.
I
I
don't
know
it
might
it
might
play
into
the
I
didn't
see
an
ipv6
help
options
reference
in
it
in
in
the
document,
so
I
don't
know
what
that
was
about,
but
briefly
yeah.
You
know
I've
been
trying
to.
I
We
had
a
presentation
at
in
six
man
at
111
about
hey
what,
if
we
just
get
everybody
to
what
if
we
just
get
people
to
commit
to
parsing
the
first
128
bytes
of
the
of
a
packet,
and
we
will
do
our
ver
our
level
best
to
make
sure
that
the
l4
header
is
in
there
somewhere
and
with
the
updated
hop
by
hop,
feel
free
to
ignore
them
guidance.
I
If
we
actually
make
that
an
official
update
to
8200,
then
perhaps
we
can
actually
make
the
space
in
between
the
ip
header
and
the
l4
header
useful
and
like
put
in
the
mtu
option.
It's
just
basically
like
an
mss
rewriting
scratch
space
option.
Maybe
people
could
use
the
connex
option
so
that
it's
not
just
you
know
one
and
a
half
bits
or
whatever
it
is
remaining
in
dscp,
and
I
mean
martin
is
stifling
a
laugh.
I
I
don't
know,
but,
like
you
know,
whatever
it
is,
and
and
maybe
you
know,
allow
them
to
be
to
be
sent
and
in
various
orders,
so
that
there's
some
some
level
of
like
they
aren't
always
in
the
same
format
or
in
the
same
order
thing.
Then
perhaps
we
could
we
could
get
to
a
place
where
well,
you
know
like
like
it
like
quick
did
where
you
know
it
had
it.
I
It
improved
its
ability
to
be
sent
across
the
internet
by
use,
since
I
think
where
we
are,
unless
we
want
to
deploy
another
version
of
ip
is
that
we
need
to
like
not
let
the
perfect
be
the
enemy
of
the
good
and
focus
on
deployment
of
things
that
are
slower
longer
and,
admittedly,
less
than
less
than
perfect,
but
still
largely
useful.
E
J
I
Yeah,
so
actually
I
haven't
read
that
in
in
detail,
but
that
that
very
point
did
come
up,
because
the
current
proposal
for
a
hopper
hop
option
treatment
says
that
reuters
should
only
process.
Routers
are
required
to
only
process.
The
first
topic
hop
option
in
the
chain
which
would
sort
of
like
nullify
any
sort
of
future
usefulness.
Unless
we
made
like
one
mega
hop
by
hop
option
that
had
a
bunch
of
other
and
all.
G
I
I
This
was,
this
is
what
you
I
was
mentioning
to
you.
Tommy
and
I've
been
talking
to
warren
about,
and
so
I
think,
like
some
of
these,
some
of
the
some
of
the
right
pieces
are
floating
around
and
I
don't
know
if
they
will.
They
will
gel
into
anything
useful
or
not,
but
I
I
feel
like
they
could.
I
C
D
I
One
of
the
other
things
that
that
might
be
required
for
this
to
be
of
interest,
but
it
could
be
sufficiently
interesting
to
make
it
useful-
and
I
think
yeah
two
minutes
is
that
it
might
be
necessary
to
do
a
a
fragmentation,
v2
header,
where
we
actually
have
in
the
fragment
header,
the
l4
header
or
some
some.
You
know,
per
per
transport
layer,
specifiable
chunk
of
of
bytes,
that
that
might
be
useful,
so
yeah,
obviously,
obviously
pretty
wacky
stuff.
D
Well,
the
crazy
thing
is
that
you
can
do
the
wackiest
and
most
insane
things,
but
if
everyone
agrees
it's
not
insane.
F
C
I
G
G
C
Right
yeah-
and
I
I
wonder
if
you
know
one
of
the
principles
here
is
like
quick's
original
breakage.
Wasn't
that
bad
like
it
didn't,
have
to
fall
back
to
tcp
like
what
it
was.
It
was
maybe
above
10,
initially
or
something,
but
it
was
not
the
majority
of
cases,
and
so
maybe
it's
different
to
say
all
right,
I'm
broken
20
of
the
time
but
80
of
time.
C
G
I
going
to
fix
bugs,
and
the
answer
is
well
the
part.
That's
80
right,
exactly
exactly
okay,
so
then
you're
going
to
rip
out
the
20
when
it's
buggy,
whichever
one
that
is
right,
okay,
that's
too
buggy!
Forget
it
the
other
one's
working
and
that's
where
I
think
we
run
into
problems
right
if
it's
you're
right
anyway,.
I
Cool
this
is
where
I
worry
about
the
the
perfect
being
any
really
good
kind
of
thing
there.
There
are
many
things
that
are
that
are
good
enough
for
lots
of
good
situations,
but
knowing
when
and
just
how
are
obviously
much
harder
questions.
C
All
right
well,
even
though
martin
you're,
meaning
to
get
moved,
I
think
we
will
wrap
up
this
session.
Thank
you
all
for
chatting
and
miri.
I
guess
we
will
just
kick
off.