[zeromq-dev] Is ZMTP3 backwards compatibility with ZMTP1.0 broken?

Merijn Verstraaten merijn at inconsistent.nl
Sun Aug 11 23:19:57 CEST 2013


Hi!

RFC23 states that a backward compatibility detecting handshake starts as follows:
"Send a 10-octet pseudo-signature consisting of "%xFF size %x7F" where 'size' is the number of octets in the sender's identity (0 or greater) plus 1. The size SHALL be 8 octets in network byte order and occupies the padding field."

However, RFC13 states that ZMTP1.0 long length messages follow the format "%xFF size flags", where bit 0 of flags specifies whether there are more messages to come, which is wrong for an identity frame. Do existing ZMTP1.0 implementations simply ignore this flag on identity frames?

Cheers,
Merijn
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <https://lists.zeromq.org/pipermail/zeromq-dev/attachments/20130811/f41db304/attachment.sig>


More information about the zeromq-dev mailing list