Tony Przygienda <[email protected]> writes:

Aijun, simply check the amount of RFCs and vendor knobs on proxy
purge origination ID, security signatures, spec implementation
deviations  etc. which will give you an indication lots of bad things
happened with it to good and bad people running large networks alike
;'-)  AFAIR lots of discussions were on the IGP lists in last 20
years when "interesting" stuff with proxy purges happened in the
field, last I dealt with was about 3-4 years ago only ;-)

Here's a couple:

 https://www.rfc-editor.org/rfc/rfc3719.html#section-7
 https://www.rfc-editor.org/rfc/rfc3719.html#section-8

Thanks,
Chris.


Beside the usual "oh, yeah, implementation bugs here galore" it all
goes back to the SPOT architectural principle which, when deviated
from, always ends up in cache synchronization problems which can be
solved but are highly complex, expose lots of attack vectors and
ultimately lead to a less available solution along the lines of CAP
paradigm I mentioned earlier.

-- tony

On Mon, Jul 15, 2024 at 4:28 PM Aijun Wang <[email protected]
wrote:

    Hi, Tony:

    Would you like to provide some detail explanations to support
    your asserts?

    Aijun Wang
    China Telecom


        On Jul 15, 2024, at 20:23, Tony Przygienda <
        [email protected]> wrote:


        proxy purges was one of the worst ideas in IGP operationally
        speaking for people dealing with this stuff in real networks
        for last 20+ years and still is. Let's not go there

        -- tony

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Lsr mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to