We like to see interoperability reports contain information about features of a
protocol that are used vs. unused, so that if and when the protocol seeks
advancement along the standards track, we can decide whether we want to keep it
in the revision.
Should we consider a protocol feature only used by abusive actors to be one
that deserves to be kept, or is only legitimate use worth considering?
-MSK
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf