> How about this: "We need a way to show how to know that the leak is a > leak and not another backup path coming to light for other reasons in > the system" (that might sound familiar :-).
yes it does. what is not familiar is any actual proposed engineering approach to solve it beyond brian dickson's drafts. and i was hoping those would be updated and discussed. what i see instead is a bunch of noise about process and "it need not be in X." i simply do not have the spare time for that. i would deeply love to hear actual proposed solution(s). randy _______________________________________________ sidr mailing list [email protected] https://www.ietf.org/mailman/listinfo/sidr
