About two years ago, I was at a workshop where someone claimed that the Vendor Identifiers that are exchanged in IKE are very useful for dealing with bugs. The claim was that following the report of a bug, others could adjust their behaviors to avoid the circumstances that enable the bug. In the worst case, they could refuse to talk to the badly broken version, but accept connections to later versions where the bug has been repaired.
Does anyone have operation experience doing this kind of thing? I want to know if is real experience or speculation about what could be done. Thanks in advance, Russ _______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
