Re: [IPsec] [Editorial Errata Reported] RFC7296 (6940)

Chris Smiley <csmiley@amsl.com> Thu, 21 April 2022 21:44 UTC

Return-Path: <csmiley@amsl.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 070F13A0DB4 for <ipsec@ietfa.amsl.com>; Thu, 21 Apr 2022 14:44:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c1kq3BsEihZU for <ipsec@ietfa.amsl.com>; Thu, 21 Apr 2022 14:44:53 -0700 (PDT)
Received: from c8a.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8710A3A0DA6 for <ipsec@ietf.org>; Thu, 21 Apr 2022 14:44:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 62B76427C640; Thu, 21 Apr 2022 14:44:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BhUmKZu9Q_22; Thu, 21 Apr 2022 14:44:53 -0700 (PDT)
Received: from [192.168.1.14] (cpe-76-95-228-63.socal.res.rr.com [76.95.228.63]) by c8a.amsl.com (Postfix) with ESMTPSA id 0B22E425C356; Thu, 21 Apr 2022 14:44:53 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chris Smiley <csmiley@amsl.com>
In-Reply-To: <20220421163101.D6ECF1E65D@rfcpa.amsl.com>
Date: Thu, 21 Apr 2022 14:44:52 -0700
Cc: RFC Errata System <rfc-editor@rfc-editor.org>, 648936027@qq.com, nir.ietf@gmail.com, pe@iki.fi, paul.hoffman@vpnc.org, kivinen@iki.fi, ipsec@ietf.org, charliekaufman@outlook.com
Content-Transfer-Encoding: quoted-printable
Message-Id: <E362124C-DE6F-48ED-A393-C95D96E10A7C@amsl.com>
References: <20220421163101.D6ECF1E65D@rfcpa.amsl.com>
To: "Roman D. Danyliw" <rdd@cert.org>, Paul Wouters <paul.wouters@aiven.io>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/fjWPVQMvSQd_99mjFmRJcopBPkU>
Subject: Re: [IPsec] [Editorial Errata Reported] RFC7296 (6940)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Apr 2022 21:44:58 -0000

Greetings,

We are unable to verify this erratum that the submitter marked as editorial.  
Please note that we have changed the “Type” of the following errata 
report to “Technical”.  As Stream Approver, please review and set the 
Status and Type accordingly (see the definitions at 
https://www.rfc-editor.org/errata-definitions/).

You may review the report at: 
https://www.rfc-editor.org/errata/eid6940

Please see https://www.rfc-editor.org/how-to-verify/ for further 
information on how to verify errata reports.

Further information on errata can be found at: 
https://www.rfc-editor.org/errata.php.

Thank you.

RFC Editor/cs

> On Apr 21, 2022, at 9:31 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been submitted for RFC7296,
> "Internet Key Exchange Protocol Version 2 (IKEv2)".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid6940
> 
> --------------------------------------
> Type: Editorial
> Reported by: warren.wang <648936027@qq.com>
> 
> Section: 3.10
> 
> Original Text
> -------------
> o SPI Size (1 octet) - Length in octets of the SPI as defined by the
> IPsec protocol ID or zero if no SPI is applicable. For a
> notification concerning the IKE SA, the SPI Size MUST be zero and
> the field must be empty.
> 
> 
> Corrected Text
> --------------
> o SPI Size (1 octet) - Length in octets of the SPI as defined by the
> IPsec protocol ID or zero if no SPI is applicable. For a
> notification concerning the IKE SA, the SPI Size MUST be zero and
> the SPI field must be empty.
> 
> 
> Notes
> -----
> the field must be empty -> the SPI field must be empty
> 
> so for a notification concerning the IKE SA, the Protocol ID field still shall be zero?(According to the last sentence of Protocol ID section:"If the SPI field is empty, this field MUST be sent as zero and MUST be ignored on receipt".)
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC7296 (draft-kivinen-ipsecme-ikev2-rfc5996bis-04)
> --------------------------------------
> Title               : Internet Key Exchange Protocol Version 2 (IKEv2)
> Publication Date    : October 2014
> Author(s)           : C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, T. Kivinen
> Category            : INTERNET STANDARD
> Source              : IP Security Maintenance and Extensions
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG
>