About two years ago, I was at a workshop where someone claimed that the Vendor 
Identifiers that are exchanged in IKE are very useful for dealing with bugs.  
The claim was that following the report of a bug, others could adjust their 
behaviors to avoid the circumstances that enable the bug.  In the worst case, 
they could refuse to talk to the badly broken version, but accept connections 
to later versions where the bug has been repaired.

Does anyone have operation experience doing this kind of thing?  I want to know 
if is real experience or speculation about what could be done.

Thanks in advance,
  Russ

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to