Tony Przygienda <[email protected]> writes:
Aijun, simply check the amount of RFCs and vendor knobs on proxy purge origination ID, security signatures, spec implementation deviations etc. which will give you an indication lots of bad things happened with it to good and bad people running large networks alike ;'-) AFAIR lots of discussions were on the IGP lists in last 20 years when "interesting" stuff with proxy purges happened in the field, last I dealt with was about 3-4 years ago only ;-)
Here's a couple: https://www.rfc-editor.org/rfc/rfc3719.html#section-7 https://www.rfc-editor.org/rfc/rfc3719.html#section-8 Thanks, Chris.
Beside the usual "oh, yeah, implementation bugs here galore" it all goes back to the SPOT architectural principle which, when deviated from, always ends up in cache synchronization problems which can be solved but are highly complex, expose lots of attack vectors and ultimately lead to a less available solution along the lines of CAP paradigm I mentioned earlier. -- tony On Mon, Jul 15, 2024 at 4:28 PM Aijun Wang <[email protected]wrote:Hi, Tony: Would you like to provide some detail explanations to support your asserts? Aijun Wang China Telecom On Jul 15, 2024, at 20:23, Tony Przygienda < [email protected]> wrote: proxy purges was one of the worst ideas in IGP operationally speaking for people dealing with this stuff in real networks for last 20+ years and still is. Let's not go there -- tony
signature.asc
Description: PGP signature
_______________________________________________ Lsr mailing list -- [email protected] To unsubscribe send an email to [email protected]
