Hi Ketan,

> On Jun 29, 2022, at 9:33 AM, Ketan Talaulikar <ketant.i...@gmail.com> wrote:
> 
> Hi Tony,
> 
> No. It does not work. Take the following text from Sec 4.
> 
>    If this is insufficient sub-TLV space, then the node MAY advertise
>    additional instances of the Extended IS Reachability TLV.  The key
>    information MUST be replicated identically and the additional sub-TLV
>    space may be populated with additional information.  The complete
>    information for a given key in such cases is the joined set of all
>    the carried information under the key in all the TLV instances.
> 
> There is a normative MUST there, but the "key information" is unspecified. 
> Without that information these rules would not be really useful for 
> implementation, would they?


They would if the implementors understood the intent and spirit. Perhaps that’s 
asking too much.


> 
> I agree with the challenge of trying to catalog "keys" and "rules" on a per 
> TLV/sub-TLV basis. Perhaps starting with the more widely used TLVs/sub-TLVs 
> that are likely to exceed limits would be better than not covering any of 
> them?


Duly noted.  We have had this comment before, we will definitely consider it.

Tony

_______________________________________________
Lsr mailing list
Lsr@ietf.org
https://www.ietf.org/mailman/listinfo/lsr

Reply via email to