You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Per RFC 8182, FORT relies on simple checks on the RRDP session and serial to detect session desynchronization. Subtler session desynchronization could be pinpointed by keeping track of the hashes of the recently applied deltas.
This is a protection against incorrectly implemented RRDP servers, not malicious ones. As far as I can tell, the problem is unlikely.
Per RFC 8182, FORT relies on simple checks on the RRDP session and serial to detect session desynchronization. Subtler session desynchronization could be pinpointed by keeping track of the hashes of the recently applied deltas.
This is a protection against incorrectly implemented RRDP servers, not malicious ones. As far as I can tell, the problem is unlikely.
See draft-ietf-sidrops-rrdp-desynchronization for more details.
Currently in development in the draft-spaghetti-sidrops-rrdp-desynchronization branch.
The text was updated successfully, but these errors were encountered: