[zeromq-dev] Is ZMTP3 backwards compatibility with ZMTP1.0 broken?
Merijn Verstraaten
merijn at inconsistent.nl
Sun Aug 11 23:19:57 CEST 2013
Hi!
RFC23 states that a backward compatibility detecting handshake starts as follows:
"Send a 10-octet pseudo-signature consisting of "%xFF size %x7F" where 'size' is the number of octets in the sender's identity (0 or greater) plus 1. The size SHALL be 8 octets in network byte order and occupies the padding field."
However, RFC13 states that ZMTP1.0 long length messages follow the format "%xFF size flags", where bit 0 of flags specifies whether there are more messages to come, which is wrong for an identity frame. Do existing ZMTP1.0 implementations simply ignore this flag on identity frames?
Cheers,
Merijn
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <https://lists.zeromq.org/pipermail/zeromq-dev/attachments/20130811/f41db304/attachment.sig>
More information about the zeromq-dev
mailing list