On Mar 21, 2012, at 3:00 PM, Christopher Morrow wrote:
> On Wed, Mar 21, 2012 at 3:40 PM, Eric Osterweil <[email protected]> 
> wrote:
>> My input is that the current work that does not address the real route leak 
>> threat, and it is therefore insufficient.
> 
> and many, many times ... 'how would you do this, really, show me the
> math' has been asked.

Answer: Evaluate policy.

-shane


> the closest so far is Brian's set of 3 id's
> which are being chattered about in IDR and some in SIDR as well.
> 
> btw, Is 'the real route leak threat' different in some way than other
> (what other?) route-leak-threats? and is it the only thing you care
> about? (I think there are others, is this the only uncovered hole in
> the pasture? or are you worried about breaking your leg on something
> else as well?)
> 
> -chris
> _______________________________________________
> sidr mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to