On Tue, 18 Sep 2007 09:27:32 PDT, Bora Akyol said: > > It is not dependent on time. You'd like a protocol to be self sufficient if > at all possible. > > Moving the vulnerability of one protocol to another is not highly desirable > in general.
The interesting failure mode is, of course, what happens when you're not in time sync, so the routing protocol falls over - and due to the lack of routing table entries, you become unable to reach your timesource.
pgppeBiIHshT8.pgp
Description: PGP signature