Re: [tcpm] [Technical Errata Reported] RFC5925 (4365)

Joe Touch <touch@isi.edu> Tue, 12 May 2015 21:21 UTC

Return-Path: <touch@isi.edu>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8FF91A9035 for <tcpm@ietfa.amsl.com>; Tue, 12 May 2015 14:21:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level:
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L3aHukARyaEs for <tcpm@ietfa.amsl.com>; Tue, 12 May 2015 14:21:46 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C110D1A902C for <tcpm@ietf.org>; Tue, 12 May 2015 14:21:46 -0700 (PDT)
Received: from [128.9.160.252] (pen.isi.edu [128.9.160.252]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id t4CLDA3H009635 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 12 May 2015 14:13:10 -0700 (PDT)
Message-ID: <55526CE4.70906@isi.edu>
Date: Tue, 12 May 2015 14:13:08 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: RFC Errata System <rfc-editor@rfc-editor.org>, mankin@psg.com, rbonica@juniper.net, spencerdawkins.ietf@gmail.com, mls.ietf@gmail.com, michael.scharf@alcatel-lucent.com, nishida@sfc.wide.ad.jp, pasi.sarolahti@iki.fi
References: <20150512204619.0B5CE180092@rfc-editor.org>
In-Reply-To: <20150512204619.0B5CE180092@rfc-editor.org>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <http://mailarchive.ietf.org/arch/msg/tcpm/GVZBdTLxazfYKNc6a_ceXcPIWUQ>
Cc: tcpm@ietf.org
Subject: Re: [tcpm] [Technical Errata Reported] RFC5925 (4365)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 May 2015 21:21:48 -0000

Hi, all,

Thanks to Michael Sharf for pointing this out.

This can be flagged as "wait for update" because it's not critical to
the operation of the option.

Joe

On 5/12/2015 1:46 PM, RFC Errata System wrote:
> The following errata report has been submitted for RFC5925,
> "The TCP Authentication Option".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=5925&eid=4365
> 
> --------------------------------------
> Type: Technical
> Reported by: Joe Touch <touch@isi.edu>
> 
> Section: 7.6
> 
> Original Text
> -------------
>    TCP's 4-bit data offset requires that the options end 60 bytes (15
>    32-bit words) after the header begins, including the 20-byte header.
>    This leaves 40 bytes for options, of which 15 are expected in current
>    implementations (listed below), leaving at most 25 for other uses.
>    TCP-AO consumes 16 bytes, leaving 9 bytes for additional SYN options
>    (depending on implementation dependant alignment padding, which could
>    consume another 2 bytes at most).
> 
>    o  SACK permitted (2 bytes) [RFC2018][RFC3517]
> 
>    o  Timestamps (10 bytes) [RFC1323]
> 
>    o  Window scale (3 bytes) [RFC1323]
> 
> 
> Corrected Text
> --------------
>    TCP's 4-bit data offset requires that the options end 60 bytes (15
>    32-bit words) after the header begins, including the 20-byte header.
>    This leaves 40 bytes for options, of which 19 are expected in current
>    implementations (listed below), leaving at most 21 for other uses.
>    TCP-AO consumes 16 bytes, leaving 5 bytes for additional SYN options
>    (depending on implementation dependent alignment padding, which could
>    consume another 2 bytes at most).
> 
>    o  SACK permitted (2 bytes) [RFC2018][RFC3517]
> 
>    o  Timestamps (10 bytes) [RFC1323]
> 
>    o  Window scale (3 bytes) [RFC1323]
> 
>    o  Maximum Segment Size (4 bytes) [RFC793]
> 
> 
> Notes
> -----
> MSS was missing in the original text. New text includes MSS and updates numbers accordingly.
> 
> Also corrects a spelling error (dependant -> dependent), which is non-technical but included in the revised text.
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
> --------------------------------------
> Title               : The TCP Authentication Option
> Publication Date    : June 2010
> Author(s)           : J. Touch, A. Mankin, R. Bonica
> Category            : PROPOSED STANDARD
> Source              : TCP Maintenance and Minor Extensions
> Area                : Transport
> Stream              : IETF
> Verifying Party     : IESG
>