[tcpm] [Technical Errata Reported] RFC5925 (7899)

RFC Errata System <rfc-editor@rfc-editor.org> Wed, 17 April 2024 15:13 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82CE3C14F5F6; Wed, 17 Apr 2024 08:13:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.65
X-Spam-Level:
X-Spam-Status: No, score=-6.65 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2ysn84zVLHvd; Wed, 17 Apr 2024 08:13:32 -0700 (PDT)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71793C14F697; Wed, 17 Apr 2024 08:13:32 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 5152018EF214; Wed, 17 Apr 2024 08:13:32 -0700 (PDT)
To: touch@isi.edu, mankin@psg.com, rbonica@juniper.net, tcpm-ads@ietf.org, nsd.ietf@gmail.com, tuexen@fh-muenster.de, ianswett@google.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: jeanmichel.combes@gmail.com, tcpm@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240417151332.5152018EF214@rfcpa.amsl.com>
Date: Wed, 17 Apr 2024 08:13:32 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/68HCFULOA71ITZKNTO6VPRZe4xg>
X-Mailman-Approved-At: Thu, 18 Apr 2024 11:07:07 -0700
Subject: [tcpm] [Technical Errata Reported] RFC5925 (7899)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2024 15:13:36 -0000

The following errata report has been submitted for RFC5925,
"The TCP Authentication Option".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7899

--------------------------------------
Type: Technical
Reported by: Jean-Michel COMBES <jeanmichel.combes@gmail.com>

Section: 5.2

Original Text
-------------
   o  Receive_SYN_traffic_key - the traffic key used to authenticate
      incoming SYNs.  The source ISN is known (the TCP connection's
      remote ISN), and the destination (remote) ISN is unknown (and so
      the value 0 is used).

Corrected Text
--------------
   o  Receive_SYN_traffic_key - the traffic key used to authenticate
      incoming SYNs.  The source ISN is known (the TCP connection's
      remote ISN), and the destination (local) ISN is unknown (and so
      the value 0 is used).

Notes
-----
"remote side" is referenced twice: cut-and-paste error, IMHO, from the previous paragraph

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
--------------------------------------
Title               : The TCP Authentication Option
Publication Date    : June 2010
Author(s)           : J. Touch, A. Mankin, R. Bonica
Category            : PROPOSED STANDARD
Source              : TCP Maintenance and Minor Extensions
Stream              : IETF
Verifying Party     : IESG