> How about this: "We need a way to show how to know that the leak is a
> leak and not another backup path coming to light for other reasons in
> the system" (that might sound familiar :-).

yes it does.  what is not familiar is any actual proposed engineering
approach to solve it beyond brian dickson's drafts.  and i was hoping
those would be updated and discussed.

what i see instead is a bunch of noise about process and "it need not be
in X."  i simply do not have the spare time for that.  i would deeply
love to hear actual proposed solution(s).

randy
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to