From: Eric C Rosen [mailto:[email protected]]
> the "day 1" bugs do exist


Do we really have implementation not setting the S bit on the sending side??
I don't see how this could be per design, as I fail to see a reason:
- sending with S=1 or S=0 has the same cost from an implementation perspective, 
so this is not a "simplification" issue
- sending with S=0 is a clear violation of RFC 3107 and will trigger a BGP 
session shutdown from a peer compliant with 3107, so this does not seem like a 
desirable goal from an implementation standpoint.

Now, that could be a bug, but that bug would be detected with the first 
interoperability test with a compliant RFC 3107 implementation...

So, how have we got into this situation? How can we be there 15 years after the 
publication of RFC 3107?

Thanks
-- Bruno





_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

_______________________________________________
BESS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/bess

Reply via email to