[IPsec] [Editorial Errata Reported] RFC7296 (6940)

Tero Kivinen <kivinen@iki.fi> Fri, 22 April 2022 07:55 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E2463A11F6 for <ipsec@ietfa.amsl.com>; Fri, 22 Apr 2022 00:55:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iki.fi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fRUPQRNEMo5v for <ipsec@ietfa.amsl.com>; Fri, 22 Apr 2022 00:55:43 -0700 (PDT)
Received: from lahtoruutu.iki.fi (lahtoruutu.iki.fi [185.185.170.37]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 774543A11F0 for <ipsec@ietf.org>; Fri, 22 Apr 2022 00:55:43 -0700 (PDT)
Received: from fireball.acr.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: kivinen@iki.fi) by lahtoruutu.iki.fi (Postfix) with ESMTPSA id 5ABB31B00131; Fri, 22 Apr 2022 10:55:40 +0300 (EEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu; t=1650614140; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TqHf6gkzE5iUAVHP+hUqxHIIRX2cMwx3obAv/M7fi5c=; b=QBWLDM0nMi/+5J696jIK7Y0/leZnxoI/XBMWGVgUtbughGM8h80c7s54ZpKd0NbxNrLEJ2 twLLXhKEymJWG4B8mNmXKWUkbSV45BN8zzZmxtupX0pbdSuvIu2wFCxj5sH2OgZsaEpy6L pzN7vvyfrDwtRfYomTfszT47uG6JcI5labplVcq3TOq/ZTCosgEsfSz+JxA0q/DagNn5Na Dq8RW+ocatF33uwLmrHBIA8cRss+IullCdZFPj7mK0E8eIZFn5DK2a3yZsQN1uiFzMHtRR uZeaD6U3cbC705XzuEBuNIcQmrAoILkvAl53mOOSC+MPnYBVk87wEjS7OZhDog==
Received: by fireball.acr.fi (Postfix, from userid 15204) id EE31025C12DC; Fri, 22 Apr 2022 10:55:39 +0300 (EEST)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <25186.24443.897408.821601@fireball.acr.fi>
Date: Fri, 22 Apr 2022 10:55:39 +0300
From: Tero Kivinen <kivinen@iki.fi>
To: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: 648936027@qq.com, charliekaufman@outlook.com, paul.hoffman@vpnc.org, nir.ietf@gmail.com, pe@iki.fi, ipsec@ietf.org
In-Reply-To: <20220421163101.D6ECF1E65D@rfcpa.amsl.com>
References: <20220421163101.D6ECF1E65D@rfcpa.amsl.com>
X-Mailer: VM 8.2.0b under 26.3 (x86_64--netbsd)
X-Edit-Time: 3 min
X-Total-Time: 2 min
ARC-Seal: i=1; s=lahtoruutu; d=iki.fi; t=1650614140; a=rsa-sha256; cv=none; b=JG8kdVJAdSWV+ipcOV2517n4NTqbMIDXzhSx0vVzTO8tPvyY72jG5lBnuf9QTx1um1INkV MRztkQGBcQMeW+77jmzmYq2c+cvV0dwDZKTyVb1Jjs6rrHUT+DRpeMZPjdALupPvXF2RIi 5BSP1C5EyvH6HxErGPZd1bgygn2OYuFLr+dsoX1/B0OSxkSuD67/mU2aNh9o7Rm3PeMDsu z86N08IU4RXEZgJe/V6pr0Wrc60B9+eWsOtWJLxJ4NE6Lqx8AURqOWE8IDCQX3YazhhV9V bA2H66Vla9Yv2Yw2BmLa4ZSYpghvV/IkeIS7rujr3gpWPKq31H42bAkK/UQ0NQ==
ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=kivinen@iki.fi smtp.mailfrom=kivinen@iki.fi
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=lahtoruutu; t=1650614140; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TqHf6gkzE5iUAVHP+hUqxHIIRX2cMwx3obAv/M7fi5c=; b=CnD4Xymt5qHX00foDkQdMn7CGMnR4StvQoz33DpVqYONuY/SwjkAPbXbRiLeoVlLo/qP7M vWC0YGYzd67pOIDPn9kBf+N4T46Kb8yAWJdUgvTgkC8gNLQd9LwfjaOfPu1mcD2C66SWjS mRfdYd0eqwvxWo/gSXIHlC6MwC1FIT1DFhyJzlhXB7pdQ7rRjnSNXk9bpl3PeI2RftZIYa WeFPr9yQE28eXG3VElCfD4vwLplVPO+XTWYpGFHdGuwEn+UqXXFKQzsJtO7XYic+V8904U 5OfrwFgPqI+V30jG/jOHo3s9PyLdC72OqeDomHoQ/ki23qSsnh1iCRNiGI5PBA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipsec/iu9d6E77bmiNGONn6VbYmlDrsSQ>
Subject: [IPsec] [Editorial Errata Reported] RFC7296 (6940)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipsec/>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Apr 2022 07:55:49 -0000

RFC Errata System writes:
> The following errata report has been submitted for RFC7296,
> "Internet Key Exchange Protocol Version 2 (IKEv2)".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid6940
> 
> --------------------------------------
> Type: Editorial
> Reported by: warren.wang <648936027@qq.com>
> 
> Section: 3.10
> 
> Original Text
> -------------
> o SPI Size (1 octet) - Length in octets of the SPI as defined by the
>  IPsec protocol ID or zero if no SPI is applicable. For a
>  notification concerning the IKE SA, the SPI Size MUST be zero and
>  the field must be empty.
> 
> 
> Corrected Text
> --------------
> o SPI Size (1 octet) - Length in octets of the SPI as defined by the
>  IPsec protocol ID or zero if no SPI is applicable. For a
>  notification concerning the IKE SA, the SPI Size MUST be zero and
>  the SPI field must be empty.
> 
> 
> Notes
> -----
> the field must be empty -> the SPI field must be empty

This change is correct, and the errata can be verified.

> so for a notification concerning the IKE SA, the Protocol ID field
> still shall be zero?(According to the last sentence of Protocol ID
> section:"If the SPI field is empty, this field MUST be sent as zero
> and MUST be ignored on receipt".) 

Yes. For IKE SA notifications the SPI can be seen from the header,
thus there is no point of repeating the SPIs in notify payload. The
Protocol ID field of the notification payload indicates which type of
SPI is inside the notification payload, thus if there is no SPI in
there, then there is no point of having Protocol ID either.

> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC7296 (draft-kivinen-ipsecme-ikev2-rfc5996bis-04)
> --------------------------------------
> Title               : Internet Key Exchange Protocol Version 2 (IKEv2)
> Publication Date    : October 2014
> Author(s)           : C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, T. Kivinen
> Category            : INTERNET STANDARD
> Source              : IP Security Maintenance and Extensions
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG

-- 
kivinen@iki.fi