… | |
… | |
512 | length. Only when the serial matches on both sides of a conenction will |
512 | length. Only when the serial matches on both sides of a conenction will |
513 | the connection succeed. This is I<not> a security mechanism and eay to |
513 | the connection succeed. This is I<not> a security mechanism and eay to |
514 | spoof, this mechanism exists to alert users that their config is outdated. |
514 | spoof, this mechanism exists to alert users that their config is outdated. |
515 | |
515 | |
516 | It's recommended to specify this is a date string such as C<2013-05-05> or |
516 | It's recommended to specify this is a date string such as C<2013-05-05> or |
517 | C<20121205084417). |
517 | C<20121205084417>. |
518 | |
518 | |
519 | The exact algorithm is as this: if a connection request is received form a |
519 | The exact algorithm is as this: if a connection request is received form a |
520 | node with an identical serial, then it succeeds normally. |
520 | node with an identical serial, then it succeeds normally. |
521 | |
521 | |
522 | If the remote serial is lower than the local serial, it is ignored. |
522 | If the remote serial is lower than the local serial, it is ignored. |