base.txt   issue62b.txt 
  Skipping to change at page 24, line 12:
entry. This allows nodes that have large difference in their entry. This allows nodes that have large difference in their
clocks to still communicate with each other, by exchanging NS/NA clocks to still communicate with each other, by exchanging NS/NA
pairs. pairs.
o When a message is received from a known peer, i.e., one that o When a message is received from a known peer, i.e., one that
already has an entry in the cache, the time stamp is checked already has an entry in the cache, the time stamp is checked
against the previously received SEND message: against the previously received SEND message:
TSnew + fuzz > TSlast + (RDnew - RDlast) x (1 - drift) - fuzz TSnew + fuzz > TSlast + (RDnew - RDlast) x (1 - drift) - fuzz
If this does not hold, the message SHOULD be silently discarded. If this inequality does not hold, the receiver SHOULD silently
discard the message. On the other hand, if the inequality holds,
the receiver SHOULD process the message.
If it does hold, the message is processed. However, if TSnew < Moreover, if the above inequality holds and TSnew > TSlast, the
TSlast, which is possible if packets arrive rapidly and out of receiver SHOULD update RDlast and TSlast. Otherwise, the receiver
order, TSlast MUST NOT be updated, i.e., the stored TSlast for a MUST NOT update update RDlast or TSlast.
given node MUST NOT ever decrease. Otherwise TSlast and RDlast
SHOULD be updated.
6. Authorization Delegation Discovery 6. Authorization Delegation Discovery
Several protocols (NDP included) allow a node to automatically Several protocols (NDP included) allow a node to automatically
configure itself based on information it learns shortly after configure itself based on information it learns shortly after
connecting to a new link. It is particularly easy to configure connecting to a new link. It is particularly easy to configure
"rogue" routers on an unsecured link, and it is particularly "rogue" routers on an unsecured link, and it is particularly
difficult for a node to distinguish between valid and invalid sources difficult for a node to distinguish between valid and invalid sources
of information, when the node needs this information before being of information, when the node needs this information before being
able to communicate with nodes outside of the link. able to communicate with nodes outside of the link.
 End of changes. 

This html diff was produced by rfcdiff v0.42, available from http://www.levkowetz.com/ietf/tools/rfcdiff/