[IPsec] [Errata Held for Document Update] RFC7296 (6779)

RFC Errata System <rfc-editor@rfc-editor.org> Sat, 11 December 2021 03:07 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D85BD3A011F; Fri, 10 Dec 2021 19:07:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGgbuWD-tQkO; Fri, 10 Dec 2021 19:07:21 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D7403A0105; Fri, 10 Dec 2021 19:07:21 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 499) id CE283EEA16; Fri, 10 Dec 2021 19:07:19 -0800 (PST)
To: 648936027@qq.com, charliekaufman@outlook.com, paul.hoffman@vpnc.org, nir.ietf@gmail.com, pe@iki.fi, kivinen@iki.fi
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: kaduk@mit.edu, iesg@ietf.org, ipsec@ietf.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20211211030719.CE283EEA16@rfc-editor.org>
Date: Fri, 10 Dec 2021 19:07:19 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/4iAAyXTTVuqGV0TyEFSoPXe0rZc>
Subject: [IPsec] [Errata Held for Document Update] RFC7296 (6779)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Dec 2021 03:07:26 -0000

The following errata report has been held for document update 
for RFC7296, "Internet Key Exchange Protocol Version 2 (IKEv2)". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid6779

--------------------------------------
Status: Held for Document Update
Type: Editorial

Reported by: warren.wang <648936027@qq.com>
Date Reported: 2021-12-08
Held by: Benjamin Kaduk (IESG)

Section: 1.1.1

Original Text
-------------
   In this scenario, neither endpoint of the IP connection implements
   IPsec, but network nodes between them protect traffic for part of the
   way.  Protection is transparent to the endpoints, and depends on
   ordinary routing to send packets through the tunnel endpoints for
   processing.  Each endpoint would announce the set of addresses
   "behind" it, and packets would be sent in tunnel mode where the inner
   IP header would contain the IP addresses of the actual endpoints.


Corrected Text
--------------
   In this scenario, neither endpoint of the IP connection implements
   IPsec, but network nodes between them protect traffic for part of the
   way.  Protection is transparent to the endpoints, and depends on
   ordinary routing to send packets through the tunnel endpoints for
   processing.  Each tunnel endpoint would announce the set of addresses
   "behind" it, and packets would be sent in tunnel mode where the inner
   IP header would contain the IP addresses of the actual endpoints.


Notes
-----
"Each tunnel endpoint" will make it easy to understand which entity is announcing the set of addresses.

--------------------------------------
RFC7296 (draft-kivinen-ipsecme-ikev2-rfc5996bis-04)
--------------------------------------
Title               : Internet Key Exchange Protocol Version 2 (IKEv2)
Publication Date    : October 2014
Author(s)           : C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, T. Kivinen
Category            : INTERNET STANDARD
Source              : IP Security Maintenance and Extensions
Area                : Security
Stream              : IETF
Verifying Party     : IESG