Re: [tcpm] [Errata Rejected] RFC5925 (5347)

Mirja Kuehlewind <ietf@kuehlewind.net> Wed, 04 March 2020 11:20 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE0F13A0CA9 for <tcpm@ietfa.amsl.com>; Wed, 4 Mar 2020 03:20:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gw5lgRKRpA6a for <tcpm@ietfa.amsl.com>; Wed, 4 Mar 2020 03:20:40 -0800 (PST)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 438EB3A0CA3 for <tcpm@ietf.org>; Wed, 4 Mar 2020 03:20:40 -0800 (PST)
Received: from p200300dee7239a0084809b28d0f22131.dip0.t-ipconnect.de ([2003:de:e723:9a00:8480:9b28:d0f2:2131]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1j9S4i-0004Up-0D; Wed, 04 Mar 2020 12:20:28 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Mirja Kuehlewind <ietf@kuehlewind.net>
In-Reply-To: <20200304103542.94AB2F40721@rfc-editor.org>
Date: Wed, 04 Mar 2020 12:20:27 +0100
Cc: mankin@psg.com, rbonica@juniper.net, tcpm <tcpm@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <94FF64F5-2B55-4365-B6BB-6609BC04480B@kuehlewind.net>
References: <20200304103542.94AB2F40721@rfc-editor.org>
To: touch@isi.edu, ignacio.goyret@nokia.com
X-Mailer: Apple Mail (2.3445.104.11)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1583320840;7e0eec13;
X-HE-SMSGID: 1j9S4i-0004Up-0D
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/F_2xTry0xwz5ZUdb6rONVJIqQ2E>
Subject: Re: [tcpm] [Errata Rejected] RFC5925 (5347)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Mar 2020 11:20:42 -0000

Hi all,

This errata was discussed on the list some time back. The discussion didn’t converge to an appropriate text, therefore I rejected the errata for now. 

Please simply file a new errata if text was agreed and it is still needed!

Thanks!
Mirja



> On 4. Mar 2020, at 11:35, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been rejected for RFC5925,
> "The TCP Authentication Option".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid5347
> 
> --------------------------------------
> Status: Rejected
> Type: Editorial
> 
> Reported by: Ignacio Goyret <ignacio.goyret@nokia.com>
> Date Reported: 2018-05-03
> Rejected by: Mirja Kühlewind (IESG)
> 
> Section: 5.1
> 
> Original Text
> -------------
> 3. The TCP header, by default including options, and where the TCP
>   checksum and TCP-AO MAC fields are set to zero, all in network-
>   byte order.
> 
>   The TCP option flag of the MKT indicates whether the TCP options
>   are included in the MAC.  When included, only the TCP-AO MAC field
>   is zeroed.
> 
>   When TCP options are not included, all TCP options except for TCP-
>   AO are omitted from MAC processing.  Again, the TCP-AO MAC field
>   is zeroed for the MAC processing.
> 
> 
> Corrected Text
> --------------
> 3. The TCP header and TCP options, where the TCP checksum and TCP-AO
>   MAC fields are always set to zero, all in network-byte order.
> 
>   The TCP option flag of the MKT indicates which TCP options are
>   included in the MAC. When TCP options are not included, only the
>   TCP option for TCP-AO (as described in Section 2.2) is included
>   in the MAC. Otherwise, all the TCP options are included in the MAC.
> 
> 
> Notes
> -----
> Rewording for clarity and simplification.
> The original text could lead to confusion re '...When included, only the TCP-AO MAC field is zeroed.'
> --VERIFIER NOTES-- 
> Rejected as the proposed text does not seem fundamentally clearer.
> 
> --------------------------------------
> RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
> --------------------------------------
> Title               : The TCP Authentication Option
> Publication Date    : June 2010
> Author(s)           : J. Touch, A. Mankin, R. Bonica
> Category            : PROPOSED STANDARD
> Source              : TCP Maintenance and Minor Extensions
> Area                : Transport
> Stream              : IETF
> Verifying Party     : IESG
> 
>