On Tue, 18 Sep 2007 09:27:32 PDT, Bora Akyol said:
> 
> It is not dependent on time. You'd like a protocol to be self sufficient if
> at all possible.
> 
> Moving the vulnerability of one protocol to another is not highly desirable
> in general.

The interesting failure mode is, of course, what happens when you're not
in time sync, so the routing protocol falls over - and due to the lack of
routing table entries, you become unable to reach your timesource.

Attachment: pgppeBiIHshT8.pgp
Description: PGP signature

Reply via email to