►
From YouTube: IETF-CORE-20230607-1400
Description
CORE meeting session at IETF
2023/06/07 1400
https://datatracker.ietf.org/meeting//proceedings/
A
B
This
is
so
stupid.
You
cannot
unmute.
Why
would
you
have
a
model?
Dialogue
I
see
them
in
the
data
tracker
meeting
materials
yeah.
So
if
I
import
them,
they
are
in
the
decks
ready
to
be
shared.
No,
they
are
yeah.
You
actually
have
to
click
them
from
the
data
tracker
meeting
materials
to
the
decks
ready
to
be
shared.
B
A
I
was
about
to
drag
and
drop
the
PDF
on
the
upload
tab,
but.
B
Okay,
so
can
you
do
a
screenshot
of
the
slide
manager,
so
we
can
send
them
to,
of
course,.
A
A
C
B
A
And
hi
everyone
welcome
everyone
to
the
interim
meeting
of
the
co-working
group,
I'm
Martha
taylorman.
A
And,
as
usual,
a
reminder-
this
is
an
officiality
of
meetings,
so
not
well
applies,
get
familiar
with
that.
If
you're
not
already,
it's
not
just
about
APR,
it's
also
an
especially
about
our
code
of
conduct.
So
please
be
nice
and
professional.
We
want
another.
The
link
to
the
notes
is
in
the
chat.
I'll
try
to
take
notes.
Any
help
is
appreciated.
Thanks
very
much
Christian
and
there's
I.
Guess
a
request
for
agenda
bashing
that
we
were
also
discussing
before
starting
Uranus
to
leave
at
a
half
past.
A
A
Thank
you
that
say,
then
it's
Richard
Stern,
yes,.
E
Thank
you,
hello,
everyone
so
I'd
like
to
present
some
recent
updates
to
this
draft
I
was
called
capable
proxies
and
let's
take
it
away
yeah.
So
he
has
to
recap
what
this
is
about.
It's
about
the
fact
that
you
can
have
a
core
proxy
between
a
client
and
server,
which
sounds
straightforward.
However,
you
may
want
a
security
association
between
the
client
and
proxy,
for
instance,
for
identifying
the
client
and
knowing
that
it's
authorized
to
use
this
proxy
and
a
good
use
case.
E
There
can
be
to
utilize
oscore
between
the
client
and
proxy,
and
this
can
be
used
also
like.
Basically,
you
can
have
end-to-end
or
score
between
the
client
and
server,
and
in
addition
to
that,
you
can
have
o
score
between
the
client
and
proxy
or
you
can
simplable
score
between
the
client
and
proxy
and
maybe
displaying
code
between
the
client
and
server.
E
But
the
problem
is
that
having
using
old
score
to
water
proxy
is
not
defined
and
admitted
in
all
score,
because
you
know
score
in
the
RFC.
Only
C
and
S
are
considered
to
be
the
OS
core
endpoints
and,
in
addition
to
this,
it's
also
forbidden
to
double
protect
a
message.
E
So
if
you
would
like
to
have
Oscar
between
client
and
server
and
client
and
proxy
meaning,
two
layers
of
optical
protection
between
the
client
and
proxy,
that
is
simply
not
allowed
in
the
Oscar
rxc
and
the
work
in
this
draft
actually
started
as
an
appendix
in
the
Groupon
proxy
document.
And
it
was
agreed
during
the
itf-110
meeting
and
also
during
the
core
interim
that
took
place
in
June
2021,
that
it
makes
sense
to
split
the
work
from
the
appendix
where
it
was
into
this
new
separate
Standalone
draft.
E
E
So
basically,
you
have
a
core
group
and
you're
communicating
there
to
a
proxy,
and
what
can
be
important
is
that
the
proxy
will
want
to
identify
the
client
using
a
secure
Association.
So,
as
the
unicast
request
comes
in
from
the
client
that-
or
it
can
be
also
protected.
E
Meanwhile,
the
entire
exchange
end-to-end
from
client
to
servers
is
predicted
with
Grupo
score.
Another
example
is
from
the
multicast
notifications
draft,
where
you
may
want
to
have
a
group
score
different
security,
and
then
you
use
the
client
provides
the
proximities
ticket
request,
which
is
it
has
obtained
from
the
server
and
this
provisioning,
and
you
may
want
to
protect
using
oscore
to
other
use
cases.
E
E
The
idea
is
that
the
client
can
interact
using
all
score
with
the
electric
term
server,
but
it
may
also
want
to
connect
to
an
external
application
server
using
the
proxy
and
also
in
this
case,
it's
good
to
have
always
score
both
end
term
between
client
and
server
and
between
the
client
and
the
lightweight
MTN
server
and
such
because
then
the
lightweight
content
server
can
identify
the
client
and
it's
also
normal
procedure
within
light
to
10.
If
you're
using
all
score
that
decline,
then
the
lighter
term
server
will
have
on
those
score
security
Association.
E
The
last
use
case
is
one
that
came
from
David
Navarro,
where
the
it's
also
based
on
lightweight
M2M,
where
you
use
the
you,
have
the
slide
to
attempt
them
Gateway
and
practically
in
this
case,
the
right
to
attempting
Gateway
is
acting
as
a
reverse
proxy
and
again.
In
this
case,
you
may
want
to
have
a
scoreboard
between
client
and
the
Gateway
acne
as
a
proxy
and.
E
Between
client
and
server,
so
what
is
the
contribution
of
this
document?
It's
a
twofold
update
to
the
oscore
RC
and
the
first
update
being
defining
the
use
of
all
score
in
a
communication
like
where
you
have
a
proxy,
and
these
can
be
both
between
An
Origin,
client
or
server
and
the
proxy,
and
also
between
two
proxies.
If
you
have
multiple
proxies
between
a
client
and
server,
and
basically
this
means
that
not
only
Origin,
client
and
servers
can
be
also
endpoints,
but
also
intermediate
devices.
E
The
second
update,
then,
is
to
explicitly
allow
this
nested
oscore
protection
with
return
all
screen
or
score.
So
essentially,
the
client
will
first
protect
using
all
score
end-to-end,
client
and
server,
and
then
it
will
again
protect
using
all
score
and
this
time
between
the
client
and
proxy
and
normally
you
would
have
at
most
dual
score
layers
and
one
end
to
end
and
one
between
each
hook
in
the
communication
chain.
However,
it's
possible
to
apply
multiple
more
than
two
layers
of
all
score,
and
this
is
also
something
we
explore
in
appendix
B.
E
So
what
have
we
done
recently?
We
presented
version
4
and
according
to
him
in
September
last
year,
and
we
also
submitted
version
five
and
six
around
itf116
another
one
update
we
did.
There
was
two
explicitly
mentioned
that
the
proxy
should
check
whether
forwarding
a
decrypted
request
is
okay,
which
also,
of
course,
the
intent,
because
the
intent
is
that
the
proxy
should
decrypt
the
oscore
request
and
then
use
that
to
identify
which
client
sent
it
and
then
understand.
E
If
this
is
acceptable,
the
forward
or
not,
it
was
yes,
not
explicitly
stated,
but
thanks
to
Christian
as
input.
We
have
now
clarified
that,
and
we've
also
clarified
one
corner
case
where
the
proxy
should
not
forward
a
valid
request,
which
can,
for
instance,
happen
if,
if
the
request
is
using
this
system
to
multicast
Notifications
option-
and
you
can
see
more
details
in
the
draft
I
regarding
that
so
now
we
have
this
figure
here.
So
this
is
basically
a
flow
shot
of
how?
E
Yes,
that's
a
high
level
overview
and
you
can
see
that
you
enter
in
this
blue
box
and
you
start
by
checking
if
there
are
any
proxy
related
options
and
you
may
end
up
there
in
the
bottom
left,
acting
as
a
reverse
proxy
and
you,
you
may
also
end
up
acting
as
a
forward
proxy
and
yeah
I.
Don't
think
I
need
to
go
into
like
tell
you
each
step
in
each
box.
But
one
thing
to
note
here
is
this
new
purple
arrow
and
that's
the
is
forwarding
this
requests
and
authorized
operation.
E
So
that's
the
explicit
check
we
added
based
on
the
feedback
from
Christian,
and
you
can
see
you
may
end
up
in
a
401
or
you
may
end
up
in
the
proxy,
consuming
the
proxy
related
options
and
forwarding.
E
You
may
also
end
up.
Even
if
there
are
no
proxy
related
options
at
all,
then
basically
it
can
either
have
an
Oscar
option,
in
which
case
you
decrypt
or
well.
If
it
doesn't
have
any
Oscar
option,
you
deliberate
the
application,
and
the
important
thing
is
that
this
is
like
an
iterative
process.
So
if
you
have
come
I
guess
you
can't
really
see
my
mouse,
unfortunately,
but
if
you
have
come
to
the
right
hand,
side
and
you
have
decrypted
a
request.
E
You
see
this
blue
line
going
back
to
the
beginning
again,
so
this
is
basically
like
for
each
old
score
layer.
You
go
through
these
steps
and
if
you
decrypt
one
layer
when
you
come
back
to
the
blue
box
again
and
start
over
and
eventually
you
will
end
up
either
giving
this
request
to
the
application
or
it's
some
kind
of
error
or
if
you're
approxy
you
forward.
It.
E
So
other
recent
updates
we
did,
we
did
some
clarifications
regarding
protection
of
Co-op
options
and
because
we
have
this
rule
set
in
the
document
describing
how
you
should
protect,
how
you
should
protect
options,
and
we
weren't
too
explicit
previously
about
class,
I
or
class,
especially
as
I
options.
E
Is
that
okay,
you
have
a
of
course,
if
toppings
Class
E,
yes,
you
should
protect
it,
but
what?
If
the
opinions
class
U
or
I?
Well,
then
we
have
this
defined
rule
set.
That
will
help
you
determine
if
you
should
protect
this
option
regardless,
if
it's
class,
U
or
I,
the
intent
is
to
protect
the
options
as
many
options
as
possible.
E
E
So,
yes,
we
basically
talked
about
a
number
of
options
and
and
went
through
the
rules
to
see
that
the
rules
are
consistent
with
our
intentions
and
the
current
rule
formulation,
you
can
see
in
section
three
one
covering
three
main
cases
and
we
have
multiple
examples
for
each
case
and
again,
the
rationale
is
to
encrypt
as
many
options
as
possible,
and
then
we
can
go
to
this
figure
that
actually
shows
the
rules
in
a
graphical
way
and
again
I.
E
For
instance,
if
it's
I
mean
if
it's
needed
to
actually
perform
the
decryption,
such
as
like
the
endoc
option
or
the
the
oscore
option
itself,
you
cannot
really
protect
that
for
the
for
the
origin
server,
although
I
mean
the
intermediate
proxies,
may
be
able
to
protect
anal
score
option.
That
is
actually
not
intended
for
them,
and
this
is
the
graphical
representation.
We
also
have
this
in
text
in
the
draft
and.
E
Continuing
on
some
other
recent
updates,
we
have
a
section
five
now
giving
guidelines
on
establishing
old
school
security
contexts,
so
I
mean
normally
this
procedure
or
what
we're
describing.
The
draft
is
agnostic
of
how
you
established
the
your
score
security
context
you're
using,
but
we
have
some
guidelines
still
in
this
section,
so,
for
instance,
if
we're
using
old
score,
you
may
want
to
run
edoc
and.
A
E
Advantage
of
edoc
and
first
execute
adequate,
the
proxy
and
then
with
origin
server.
So
you
can
actually
dynamically
build
your
own
score
context
to
use
with
the
proxy
and
server,
and
we
also
refer
to
the
optimize
workflow
and
that's
detailed
in
a
separate
draft
where
you
combine
Android
message:
3
and
the
first
oscore
protected
request
for
group
or
score
you're
expected
User,
Group
manager
and
and
that's
the
clients
and
servers
are
expected
to
already
have
the
score
security
context
present.
E
And
one
note
there
is
that
if
you
have
proxies
in
the
chain,
the
proxies
should
not
be
in
the
same
group
as
the
origin,
endpoints
for
security
reasons
and
further
updates,
and
we
will
write
some
of
the
notation,
because
when
we
have
this
nested
protection
and
multiple
layers
of
oscore,
it
can
be
a
bit
tricky
to
express
that
in
a
in
a
clear
and
good
way.
But
we
are
now
improved
that
so
it's
easy
to
see
what's
actually
encrypted
and
which,
of
course,
security
context
is
used.
E
We
also
have
a
an
example
now
with
the
message
flow
between
when
we're
actually
taking
advantage
of
the
adult,
plus
Oscar
request
to
optimize
request,
comparing
that
to
use
case,
you
can
see
this
in
appendix
A5
and
where
we're
using
adock
both
between
the
client
and
proxy
and
between
client
and
server,
of
course,
through
the
proxy,
and
so
we
wanted
to
compare
here.
How
many
messages
does
it
take
if
you
just
use
vanilla.
E
Many
messages
does
it
take
if
you
use
the
Ado
Plus
or
score
optimized
workflow
and
it's
actually
quite
a
large
Improvement
larger
than
you
may
expect.
So
without
optimization.
It
takes
16
messages
and
if
you
take
advantage
of
the
optimization,
you
come
down
to
only
10
messages
and
that's
because
you
can
efficiently
combine
a
documentary
and
the
first
Osco
request
and
you
also
get
kind
of
a
added
benefit.
B
E
So,
to
come
to
some
open
points,
this
open
Point
number
one.
We
currently
have
this
appendix
B
talking
about
those
score
protected
on
your
forwarding,
where
the
ordering
client
will
first
protect
the
request
for
the
audience
server,
and
then
you
protect
for
the
last
proxy
in
the
chain,
then
the
second
from
last
proxy
in
the
chain
Etc
until
you
come
to
the
first
proxy.
So
here
we
really,
you
can
really
Nest
a
number
of
layers
of
Oscar
protection
which
could
become
something
similar
to
Thor,
but
using
old
score.
E
So
in
a
high
level,
the
draft
itself
allows
for
this
use
case.
So
if
you
follow
these
rules
for
method
processing
and
the
rules
for
how
you
should
protect
options,
it
all
works
out.
Even
if
you
have
multiple
more
than
two
layers
of
Oscar
protection
Christian,
you
want
to
do
jumping
with
something.
C
From
my
point
of
view,
it
would
make
sense
to
remove
that
if
we
managed
to
put
it
into
another
document
that
might
be,
you
know,
an
informative
forward
reference
to
work
in
progress
that
could
use
it
otherwise
yeah
having
it.
There
just
encourages
that
it
would
be
implemented
based
on
that
without
being
properly
thought
through.
E
E
So
what
we
propose
is
then
to
Simply,
remove
appendix
B
from
the
current
draft
and
instead
use
that
content
for
a
separate
experimental
draft
building
on
the
current
one.
So
we
start
with
appendix
people.
We
have
to
expand
that
yes,
Kirsten.
E
B
So
I
think
that
that
I
mean
if
people
are
interested
in
running
an
experiment
based
on
appendix
B,
then
I
think
we
could
do
an
interesting
experimental
protocol
here
so
that
that
would
be
one
way
to
to
process
appendix
B.
But
of
course
that
requires
people
who
actually
want
to
participate
in
in
that
experiment.
But
I
think
it's
really
good
idea
to
work
a
little
bit
on
this
appendix
B
to
really
make
sure
that
we
are
not
missing
anything
in
the
main
document.
That
would
enable
that.
E
Yep
that
may
make
sense
when
we,
if
we
split
this
out
into
an
experimental
draft
of
course,
we
can
also
rethink
just
to
make
100
sure
that
nothing
in
the
main
document
is
lacking,
which
we
haven't
found
so
far
and,
like
you
said,
then
it
would
be
great
if
people
are
interested.
Of
course
we
ourselves
are
interested
in
and
implementing
and
testing
this.
But,
of
course
it's
interesting
if
we
have
more
people
involved.
E
Great
yeah
I
saw
some
comments
in
the
chat
also
there
from
my
schools,
yeah
Aquarion,
so
open
Point
number
two,
and
this
is
about.
E
E
And
actually,
if
you
check
those
score
of
C
in
section
4.1,
it
says
clearly
that
options
that
are
unknown
or
for
which
Oscar
processing
is
not
defined
shall
be
processed
as
Class
E,
meaning
that
the
Hope
limit
option,
since
it
doesn't
have
any
class
defined,
should
be
treated
as
Class
E
pioscore,
which
means
that
if
An
Origin
client
adds
such
an
option
to
request
yeah,
it
would
have
to
be
encrypted
as
things
or
today.
E
But
that
is
not
really
desirable,
because
then
none
of
the
intermediate
proxies
would
be
able
to
read
or
take
advantage
of
that
option,
and
you
may
actually
end
up
having
an
inner
and
outer
option,
because
the
the
inner
one
is
client
to
server
and
then
the
proxy
start.
Adding
outer
ones
yeah
Crystal.
C
Given
that
the
Hop
limit
is
exposing,
the
Hop
limit
would
have
previous
implications,
especially
because
the
proxy
would
otherwise
hide
the
clients.
I
think
it
does
make
sense
to
treat
it
as
Class
E,
because
it
will
be
Class.
E
like
it
will
be
Class
E
for
for
reverse
proxy.
So
for
whomever
this
message
is
encrypted
to
it
could
also
be
X,
so
it
could
also
be
added
on
the
outside,
but
that
would
probably
happen
by
by
proxies
that
are
adding
it.
So
I.
C
Setting
the
option
would
be
a
rather
rare
situation
like
if
they
want
to
trace
route
through
their
through
their
proxies.
Otherwise,
the
first
proxy
longer
path
will
add
that,
and
that
probably
makes
sense
on
the
when
the
proxy
does
this
on,
whichever
layer
it
can
so
on
like
most
protected
layer,
it
can
so
if
it's,
if
the
proxy
is
participating
in.
If,
if
there
is
Nest
at
all
score,
then
the
proxy
would
add
that
to
its
forward
proxy
and
if
the
proxy
is
unprotected,
then
it
adds
it
out
and
protected
anyway.
E
E
Think
what
you're
saying
you
need?
It
probably
would
be
a
rare
case
that
it's
a
client
adding
the
option.
It's
just
that
it's
a
bit
of
a
it
becomes
in
a
sense
not
useful,
because
it
will
only
be
yeah
between
client
and
server.
E
Yes,
let
me
continue
on
a
bit,
because
what
we
actually
want
to
the
situation
we
desire
here
is
that
if,
as
we
propose,
we
Define
this
as
class
the
Hope
limit
options
class
U
in
this
draft
I'm
talking
about,
then
what
would
actually
happen
is
for
the
protection
rules
that
workflow
was
showing
earlier.
It
would
end
up
such
that
the
option
is
unprotected
end-to-end,
but
it
will
be
protected
for
the
next
proxy.
E
So
even
if
it's
class
U,
if
you
apply
this
the
rule
set
for
how
to
hand
the
class
you
and
I
options,
you
would
actually
end
up
protecting
it
between
the
let's
say,
the
the
hopes
not
end-to-end,
but
between
each
individual,
so
I
think
that
would
actually
might
end
up
in
a
way
like
you
were
Desiring
it
to
end
up
pretty
soon.
E
A
E
Yeah
that
was
intent
right
and
and
if
you
don't
apply
the
the
rule
set
for
option
protection,
you
would
end
up
protecting
the
option
for
the
next
proxy
in
the
chain
and
the
proxies
can
protect
option
between
each
other.
But.
E
That
a
bit
more
and
also
produce
some
kind
of
examples
considering
the
situation
today.
C
E
Yeah
I
continue
the
next
slide.
So
summary
next
steps.
Just
to
summarize,
this
document
means
an
update
to
those
core
RFC
to
define
the
use
of
all
score
in
a
communication
like
including
a
proxy,
and
we
also
explicit
that
meet
nasty,
logical
protection,
Oscar
and
all
score,
which
is
explicitly
not
allowed
in
the
current
text
of
those
currency.
E
So
what
are
next
steps?
Well,
we
want
to
submit
version
7
before
the
cutoff.
We
want
to
add
some
of
the
newly
identified
use
cases,
including
the
escl
score,
and
this
Co-op
pm.
E
We
also
want
to
cover
a
bit
a
high
level
use
of
the
sheet
cat
decompression,
which
is
also
related
to
documents
RFC
8824
and
now
this
Chic
8824
update
document,
and
this
will
basically
describe
like
well
in
a
high
level.
How
should
you
apply
the
Chic
header
compression
if
you're
actually
doing
the
nestadoscope
protection?
E
E
C
I
hit
the
wrong
view
button
you
you
mentioned.
You
mentioned
that
there
is
an
added
should
when
it
comes
to
the
group,
the
proxy
being
part
of
the
group
communication,
yeah.
E
C
E
A
C
Maybe
along
the
lines
of
from
just
for
the
purpose
of
this
document,
there
is
no
reason
to
add
the
proxy
to
the
group.
A
E
Yeah
I
don't
see
the
these
comment,
you're
talking
about
I!
Guess
it's
in
the
minutes,
but
maybe
it's
too
strictly
as
to
say
that
the
proxy
must
not
be
in
the
same
group.
We
can
sign,
maybe
say
what
what
would
they?
Okay,
like
you,
said,
Christian
for
this
draft.
There's
no
we're
not
requiring
that,
and
maybe
we
can
mention
the
the
security
implications
of
if
the
proxy
is
a
member
of
the
assembly.
A
E
A
D
Okay,
are
you
sharing
the
slides
for
me
or
should
I
you.
D
D
Okay,
all
right,
so
this
is
the
fossil
real
transition,
timeout
and
contest
on
control,
which
has
currently
the
the
cro2
that
was
submitted
in
in
March
this
this
year
and
maybe
I
give
a
quick
recap
of
the
fossil,
because
it's
it's
been
a
long
time
before
this
has
been
discussed
in
the
in
the
core
working
group.
So
the
phosphorus
is
a
retransmission
timeout
and
consistent
control
mechanisms
for
for
Co-Op
and
it
tries
to
find
a
good
middle
crown
when
we
are
operating
in
an
environment
there.
D
D
It
is
optional
to
implement
in
Co-op
it
replaces
or
and
if
implemented,
and
then
it
replaces
the
default
retransmission
timeout
and
consistent
control
algorithms
specified
in
7252.
The
father
has
two
ways
to
calculate
RTO,
so
we
call
the
first
one
fast
RTO,
so
that
is
a
normal
RTO.
So
it's
basically
the
same
as
TCP
uses
so
what's
specified
in
RFC
6298.
D
D
So
it's
measured
as
a
Time
elapsed
from
the
original
transmission
all
the
way,
including
all
pre-transmissions
until
the
acknowledgment
arise.
So
the
picture
shows
that
the
original
retransmission,
if
we
don't
get
the
acknowledgment,
then
the
retransition
timeout
expires,
and
if
we
still
don't
have
the
acknowledgment,
then
the
RTO
is
packed
off.
So
there
is
a
binary
exponential
back
off,
Arthur
expires
again
and
we
retransmit
and
so
on.
Until
in
this
figure
we
retransmit
three
times
and
then
finally
acknowledgment
the
rise
and
the
app
we
measure
all
these,
this
time
from
the
original
transmission.
D
D
But
if
there
is
a
no
acknowledgment
arriving
and-
and
we
need
to
re-transmit
then
because
it's
just
like
the
TCP,
the
the
fast
RTO
and
and
re-transmit-
and
we
have
the
normal
binary
exponential
backup,
just
like
TCP
does
and
then
for
the
next
message.
We
move
on
then
to
the
fast
slow
state.
So
this
yellow
state,
because
there
was
free
transmission.
If
there
are
no
retransmissions,
then
we
stay
there
in
the
fast
state
and
in
this
far
slow
state.
D
We
in
order
to
make
the
artium
mechanism
mechanism
efficient
in
in
case
of
random
loss
or
Wireless
losses,
that
this
is
the
typical
environment.
We
first
apply
the
the
fast
RTO,
but
if
that's
not
successful,
then
we
apply
the
slow,
RT,
also
the
much
longer
RTO,
and
that
is
to
ensure
that
any
unnecessary
Transmissions
that
that
are
ongoing
there.
They
will
kind
of
go
away
and
then
we
continue,
if
still
not
successful,
with
this
fast
RTO.
D
So
if
we
enter
there,
the
next
V,
if
there
are,
if
the,
if
there
are
no
retransmissions
need,
let
me
go
back
to
the
first
state,
but
if
free
Transmissions
are
needed
there
in
the
fast
laws
there,
then
it's
quite
like
that
there
is
congestion,
and
then
we
move
on
to
the
slow
state
where
we
always
first
apply
this
slow,
RT,
Auto,
so
very
long
RTO
to
ensure
that
the
the
any
conscious,
Stone
and
unnecessary
Transmissions
have
time
enough
to
kind
of
up
to
leave
the
network
and
then,
after
that,
we
kind
of
follow
this
same
logic
as
the
DCP,
with
the
binary
the
the
art
was
calculated
in
TCP
and
and
with
the
binary
exponential
back
off
okay.
D
So
this
is
the
basic,
the
logic
that
that
how
it
operates
and
let's
move
on
then
do
the
the
currents
tattoos.
So
first
of
all,
the
the
the
Professor
was
first,
the
trot.
D
As
a
working
group
document,
it
was
happening
in
March,
2000.
and
20,
and
it
addressed
the
the
feedback
from
crystal
recording
the
retransmission
count
option
and
then
in
in
October
2020,
we
submitted
the
tr1.
It
clarified
further.
Some
of
the
issues,
including
the
retracement,
account
current
value
how
it
is
used.
D
E
D
Are
for
for
more
reviews,
including
from
the
transport
area,
and
we
got
a
Toro
review
by
calls
and
and
and
also
the
dsvr
early
review
by
Yoshi
and
but
then
the
document
went
to
dormant
for
a
long
period
of
time,
for
due
to
many
reasons,
kovit
being
the
one
one
of
those
there
are
no
cycles
for
the
the
photos
to
work
on
it,
but
we
revived
it
it.
This.
D
Spring
and
unsubmitted
in
in
March
the
version
zero
two
and
the
others
think
that
it
now
address
is
the
points
raised
by
the
the
reviews.
So
the
the
the
deposited
cars
race.
They
were
mainly
kind
of
asking
for
clarification
and
and
use
better
use
of
the
terminology
and
and
so
on,
and
the
dsvr
early
review
also
asked
us
to
clarify
some
points.
I
I
have
replied
to
to
Yoshi
and
I.
Think
yours
yeah.
D
We
agree
with
you
that
that
the
that
everything
that
he
commented
this
is
okay,
but
what
he
or
she
wanted
us
to
do
is
to
add
more
explanation
and
justification
for
the
the
virtual
backup,
serious
logic.
So
how?
D
What
is
the
the
kind
of
a
logic
behind
there
and
and
what
is
the
trusted
case
on
why
it
can
be
a
little
slightly
more
aggressive
than
the
TCP
RTO
mechanisms,
and
the
idea
is
that
we
we
will
submit
the
the
zero
three
I
kind
of
promise
when,
but
hopefully
by
the
next
ITF
meeting
and
we'll
we'll
add
this
what
what
Yoshi
asked.
D
But
at
the
same
time,
of
course,
we
would
like
to
have
even
more
reviews
and
and
feedback,
if
only
possible
and-
and
we
hope
that
the
that
once
we
are
have
submitted
the
the
next
version,
then
then
we
maybe
are
ready
for
the
working
group
last
call:
okay,
I
guess:
that's
all
I
have.
B
So
I
have
two
questions.
One
quick
question:
I:
try
to
understand
the
pseudocode
in
appendix
a
and
I
kind
of
failed,
because
this
is
not
a
notation
that
I'm
very
familiar
with.
Can
you
write
in
the
document
what
what
this
is
related
to
this
notation
that
you're
using
there.
D
Now,
I,
don't
recall:
I
should
yeah.
This
is
wrote
this
and
now
I'm.
Sorry,
I,
don't
have
the
answer.
Direct
answer
for
you:
okay,.
B
B
There
there
is
some
use
of
variables
which
suddenly
are
written
in
Brackets
and
so
on
that
I
really
couldn't
quite
get
from
this.
Maybe
if
I
haven't
spent
more
time,
I
would
have
got
this,
but
maybe
just
just
pointing
what
what
ecosystem,
what
what
role
models
were
used
for
writing
this
story
called,
alternatively,
maybe
making
it
a
little
bit
more
python-like
or
something
that
that
people
are
used
to
use,
might
really
help.
D
B
D
D
I,
don't
remember
what
was
the
what
was
the
the
for
this,
but
we.
B
B
Think
the
pseudocode
is
really
useful,
so
we
don't
get
the
same
kind
of
confusion
we
had
in
Cocoa
about
which
run
of
of
the
mechanism
is
something
going
into,
and
so
on
so
having
some
pseudocode
that
people
can
follow,
it
would
be
really
useful.
My
other
question
is
given
that
we
have
had
a
two
and
a
half
year
whole
year,
who
of
the
authors,
are
actually
still
active
on
this
draft.
D
B
And
I'm
just
wondering
who's
going
to
bring
the
energy
energy
to
to
follow
this
through
to
completion.
D
I
believe
it's
pretty
much
me
myself
and
and
you'll
pop
this
Pro,
hopefully
able
to
help
help
a
bit
so
so
the
so
we
do
I
expect
it
to
work.
B
On
it,
so
maybe
you
can
discuss
with
the
other
people
who
are
currently
listed
as
authors,
whether
they
want
to
be
listed
as
contributors.
B
D
Right
well
there.
There
are,
of
course,
the
all
the
orders
have
been
involved
in
in
the
work.
Yes
back
at
the
time
when,
when
when,
when
this
was
developed,
so
so
maybe
they
they
deserve
to
be,
as
as
the
authors,
even
though
they
probably
are
not
able
to
put
the
Cycles
to
to
finish
this
up,
but
the
unless
there
is
something
that
I'm
missing.
B
Yeah
we
have
this
this
tension
in
the
IHF,
between
the
concept
of,
and
also
that
we
economics
are
used
to
and
the
concept
of
an
author
that
that
is
used
in
the
working
group
organization
according
to
RFC
2418
and
I'm,
always
having
a
hard
time
to
position
myself
on
this
tension.
C
Yeah
I
have
a
question
that
is
not
directly
related
to
I,
don't
know
whether
it's
related
to
the
document,
so
this
is
changing
things
about
the
retransmission
as
I
understand
from
the
document.
It
doesn't
change,
anything
about
end
starts
or
the
number
of
requests
that
can
be
open
at
the
same
time.
C
D
D
C
A
Thanks
any
more
comments
or
questions,
yeah
I
have
a
question
suggestion
and
there's
a
recently
adopted
documenting
core
Co-op
DM.
A
It's
basically
defining
an
option
for
doing
performance
measurement,
including
measurement
of
router
time,
so
I
was
wondering
if
the
use
of
that
method
can
complement
yours
to
have
a
more
accurate
run
through
time
estimation,
in
addition
to
what
you're
doing
already
or
if,
in
your
case
it
hasn't,
add
anything
but
still
I'd
like
to
understand
better
and
to
document,
possibly
even
how
you
can
benefit
of
that,
how
it
relates
to
phasor.
D
A
Yeah
and
I
don't
know
the
answer
myself
just
saying
it's
something
clearly
related
so
I
think
you
should
say
if
well,
that
option
is
not
really
helping
you,
because
you
have
your
own
way
and
it's
fine
and
stable
for
what
you
want
to
do
or
if
it
helps
you
as
a
compliment
and
then
and
then
well
how
you
can
integrate
it
into
your
your
big
machine,
yeah.
D
A
Don't
know
how
well
it
fits
is
useful
for
you,
but
I
think
we
should
understand
what
the
case
is
here.
B
Yeah
I
think
that
that's
a
good
point
and
it
may
be
interesting
to
look
at
the
the
specific
configurations
and
traffic
profiles
and
so
on,
where
this
PM
document
actually
adds
something
to
your
mechanisms
and-
and
there
may
be
other
configurations
like
like
very
infrequent
traffic
where,
where
maybe
it
doesn't
add,
very
much.
So
it's
maybe
useful
to
think
about
the
the
main
area
of
application
of
of
that
document.
D
A
D
B
Can
I
quickly
ask
Mark
you,
you
said
there
will
be
a
dash
03
and
that
maybe
will
not
be
next
week.
But
but
what's
your
timeline,
you
have
in
mind
for
that.
D
F
Yeah,
actually
I
don't
have
any
slides
there.
I
did
put
up
a
link
to
the
mail
question
that
came
in
basically
so
I
thought
it
was
an
interesting
question
to
discuss
in
a
meeting
to
see
if
we
can
do
anything.
F
F
Yeah
for
me,
first
of
all,
it's
maybe
not
that
clear.
Maybe
the
question
could
be
okay.
Why
would
it
need
to
be
an
official
IDF
standard
if
it's
informational,
you
can
actually
use
it
also
in
other
standards.
F
So
what
what
would
be
the
benefits
yeah
of
making
it
standards
track
documents,
for
example,
versus
an
informational
document
and
the
other
part
well
Suppose?
There
is
a
benefit
in
that
then.
Maybe
the
question
is
how
how
would
something
like
that
happen
so
yeah
if
it
needs
to
be
kind
of
re
resubmitted
and
re-reviewed
to
make
it
standards
track,
then
there
is
a
chance
that
even
the
the
standard
document
itself
might
change
because
of
review
Etc,
and
that
also
serves
no
purpose
to
NF,
at
least
for
a
standard.
That's
already
using
it.
A
B
Yeah,
so
we
have
been
delivering
backwards
and
forwards
on
this.
For
a
while
and
I
think
that
in
the
end
we
said,
we
don't
necessarily
need
it
as
a
standard
strike
document.
B
We
are
just
documenting
one
way
of
doing
things
so
for
for
us,
as
the
governing
robots
good
enough
to
have
this
as
an
informational
document,
but
I
think
the
the
feedback
we
get
from
from
Oma
here
is
that
they
are
considering
this
as
as
a
normative
reference
and
for
them
it
would
be
easier
to
do
that
if
we
process
this
as
a
standard
strike
document.
So
the
main
difference
is
that
we
are
getting
much
more
detailed
and
and
all
right
so
tedious
review
by
the
isg.
C
B
That
real
user,
we
go
for
information
if
we
think
it's
centers,
that's
Justified
and
yeah
with
the
Oma
request.
I
think
it
is
my
view
would
be
that
we
can
go
for
standards
track
here.
But
of
course
that's
something
that
the
working
group
should
should
decide
to
do.
F
Yeah,
okay,
that's
clear!
Yeah!
If
you
look
at
the
documents,
it
could
certainly
be
a
standards
track
document,
so
it
can
just
Reserve
these
particular
attributes
that
he
used
for
the
conditional
expressions
and
there's
also
lots
of
requirements
written
there
like
must
and
shoot
and
may
Etc,
so
it
could
be
suitable
for
that
stands.
Tracks
yeah.
If
the
office
of
course
are
willing
to
put
up
with
this
extra
review.
A
So
we
started
to
open
for
this
at
IDF
116.
Also
following
a
comment
from
the
iotd
review.
I
was
wondering:
why
isn't
this
Thunderstruck
and
the
authors
put
themselves
in
a
position
such
that
they
are
agnostic
of
that
they
just
want
to
know
what
to
do,
and
there
was
someone
in
the
in
the
room,
I
think
Matthias
for
sure
they
were
saying
already
it'd
be
better
if
this
is
Thunderstruck,
but
let's
check,
if
there's
more
support
and
and
more
support
game,
for
example
from
MoMA.
A
So
it
it's
consistent
and
it
makes
sense,
and
the
authors
are
fine
with
that
by
the
way
they
just
wanted
to
have
a
clear,
Direction.
Okay,
so
we
can
reconfirm
at
the
next
meeting
but
seems
to
me
we
won't
do
it.
A
C
F
Actually
somebody
shoots
somebody
from
the
chairs
and
provide
an
answer
to
this
email
or
or
something
it
could
be
very
short
like
okay,
we
will
consider
it
or
or
a
summary
of
what
we
have
just
discussed
I
don't
mind,
but
it
would
be
good
to
get
at
least
one
response
to
it.
A
A
B
A
B
F
Yep
yep,
that's
also
one
that
I
added
there
so
and
it
was
this-
was
only
group
comb
base
drafts
so
now
has
been
waiting
for
a
while.
So
just
wondering:
okay,
what
is
now
the
next
step?
What
what
do
we
need
to
do,
or
do
we
have
an
an
idea
of
when
this
is
going
to
move
forward?.
F
Or
maybe
something
should
be
updated
first
and
because
some
some
time
already
passed,
so
you
can
also
apply
updates
where
needed,
but
but
so
far
I
didn't
hear
anything.
A
B
Yeah
yeah,
so
this
is
something
that
the
shepherd
who
happens
to
be
me
needs
to
do,
and-
and
thank
you
for
nagging
the
school.
This
is
where
he's
after
me
and
it
needs
to
go
forward.
A
An
additional
related
thing
I
can
point
to
in
his
recent
follow-up
comments
to
a
group
of
score.
Christian
pointed
out
that
the
the
sort
of
non-traditional
responses
that
we
are
specifically
using
in
group
score
in
a
sense
can
can
be
seen
and
they
are
as
an
example
of
the
non-traditional
responses
defined
in
the
core
responses
document
and
it's
good
to
give
a
reference
to
that.
A
B
Yeah,
that's
an
interesting
question.
So
I
I
wrote
this
non-traditional
responses
document
just
to
make
sure
that
we
have
a
place
where
we
collect
what
we
have
discussed
about
non-traditional
responses.
Now.
Is
this
useful
as
a
document
on
its
own,
or
is
it
just
something
that
that
served
its
purpose
by
by
getting
in
traditional
responses
into
various
documents?
So
if
it's
the
former
yeah,
let's,
let's
finish
it.
A
A
My
point
about
this
was
just
Christians,
suggesting
to
to
give
a
pointer
to
the
documenting
group
of
score
yeah.
We
just
talked
that
pointer
is
more
useful
to
be
included
in
Groupon,
because
that's
where
that
incarnation
of
non-traditional
responses
is
defined
yeah.
So
that
may
be
one
little
thing
we
may
want
to
add.
F
Okay,
yeah
that
sounds
useful
to
reference
that
as
well
then.
A
C
Yeah
so
I'm
I'm,
I'm,
I'm
I'm
at
this,
so
I
I
made
the
suggestion
talking
to
this,
but
at
the
same
time
the
the
core
responses
probably
needs
a
bit
work
and
might
also
still
get
changes
in
the
terminology.
So
it's
a
bit
hard
to
use
from
from
documents
like
this
at
the
moment.
C
C
A
A
Well,
group
on
this
was
mostly
for
the
authors,
for
you,
Carson
I
think
it
was
mostly
following
up
on
the
revision
that
addressed
your
working
group
plus
called
comments.
B
Yeah,
that
was
a
pretty
extensive
set
of
comments.
So
it's
a.
A
B
C
Non-Traditional
responses
is
doing
a
bit
of
two
things
at
the
same
time,
it's
both
introducing
ways
of,
or
it's
describing
ways
of
doing
them,
but
it's
also
describing
the
the
concept
in
general,
I
think
I'm,
so
I'm
I'm
not
completely
sure
we
have
a
rough
working
group
consensus
yet
on
this
concept
being
really
the
same
thing,
whether
it's
group,
whether
it's
observation
responses,
whether
it's
multicast
response,
Etc
I,
would
very
much
like
to
to
get
gather
a
bit
more
feedback
from
the
working
group,
whether
that's
really
the
direction
to
go
to
do
this
unification
I'm
very
much
convinced
that
it
is
the
right
way,
but
I'm
I'm
a
bit
in
the
void
here.
B
B
Course
was
to
to
Simply
point
out
that
there
is
a
similarity
here
and,
of
course
we
can.
Our
perceptions
can
differ
about
the
degree
of
that
similarity.
So
maybe
this
document
doesn't
have
to
to
present
the
conclusion
that
they
are
similar
but
just
needs
to
contain
the
the
tonology
and
discussion
I.
C
Think
that
the
tricky
part
is
that
of
core
processing
of
non-traditional
responses
will
not
be
will
will
cannot
work
from
just
description
of
similarities,
because
then
we
wind
up
in
the
situation
where
we
still
have
to
normatively
specify
the
handling
each
time,
but
also
the
first
time
the
Osco
processing
of
some
non-traditional
response
that
is
not
observed
is
described.