Re: [tcpm] [Technical Errata Reported] RFC5925 (7899)

Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com> Wed, 17 April 2024 16:16 UTC

Return-Path: <zahed.sarker.ietf@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C6ADC14F5FF; Wed, 17 Apr 2024 09:16:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZV8beOJKiIFD; Wed, 17 Apr 2024 09:16:16 -0700 (PDT)
Received: from mail-pf1-x430.google.com (mail-pf1-x430.google.com [IPv6:2607:f8b0:4864:20::430]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8403BC14F5E3; Wed, 17 Apr 2024 09:16:16 -0700 (PDT)
Received: by mail-pf1-x430.google.com with SMTP id d2e1a72fcca58-6eff9dc1821so3182726b3a.3; Wed, 17 Apr 2024 09:16:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1713370576; x=1713975376; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Zgikfrh0QhsFdca3c4l+H1DQg+lsA5iRFbq9aMj96EQ=; b=f0h0h5SuvS8HbOz8Zq5DgNbwhVPJU0Vxsa15x94v4QxxAYY9iRtrS66o2eba9/9VZ0 wJhQQBLxKd7dBKCmQsAOCjiF29i4GL32pQrvMSyG4zpB4E7OwPipq0ZTvtKQHkku65rE Bll9PzdBWikaSzXI5uOoDcKzew6WJY2QX4brzViAndap5O0ffASzqNAsTUUTxyCkPc0W hSOTUlvXY8IlkU08aw2hl4aGkZ0CDe+v8YN4AYEsEw4/MXZHCWbRHmpPdkIhHhxVf0O8 pFAKETn9aZYkY3PLk3pAqOiVF8Hs51LGDw0N79o5k1EUnLzOb2CPpMBuiH5q3jdoJmrp vdLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713370576; x=1713975376; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Zgikfrh0QhsFdca3c4l+H1DQg+lsA5iRFbq9aMj96EQ=; b=Js82P4CaJjOTi5qL1uXbSPT5icisL74Gf+irUZEWbPinCVXMxRTz0lAIHjnVfpsVKK XNfAmJZrHPOjrhjKfOnMo6GGcpoVmnEnm48Ni4IJobdw6wJqHFPEr01CrYsaU+juBiRS gCrIXbLHk0tOgAlFHaapwA8O/HpQs6IJE22U63oPK8WFgthFwX6YcpbZCXqwBLr0FCkL /1EKfsDe/YJmDrefghYummXZhaXh3+vKpeV0Ei/Uz8jEFykbeTi7JPGhTOLzanQCOoDz GY83OOtnen0pOvWVOQFe3a0hpDoqdXEFU6MoVfYsgfga71lpNvzpRi9UB9shsrgB6ZH0 pmkg==
X-Forwarded-Encrypted: i=1; AJvYcCVmr6/uOtnNMxp9OZDNvyrGxuVTMB/a4q/q3RgnU2AhR1eOniaJBYKBao5E1b6qiJ80Ru7AQkzRUHDyCEZRpj/W+EQKb8bUDJI9BIExzapgtg==
X-Gm-Message-State: AOJu0YzRH1dRByoSrf58GmoynnVIkBhyADD+AEgHyhIUbbK0bsdZmxna q3XZAgbMjiG1nG9PQBEQGs5eWneW3yozd4SK5u9ZFCo4Feo6ratp72sWVnWYrEUTuaIdiW1N3Jh exCU+GlmbVaRTmOK8Iu64+eybIuc=
X-Google-Smtp-Source: AGHT+IFKP0CPnleXh5rH1x/iZr4INC8w9s2k3DLXHjp8AJVUfmWrvhg1JkJQu1MOUwgA3KdOe+Bp2o4e/nA280stiWw=
X-Received: by 2002:a17:90a:f2c4:b0:2a5:395e:8673 with SMTP id gt4-20020a17090af2c400b002a5395e8673mr14843366pjb.5.1713370575778; Wed, 17 Apr 2024 09:16:15 -0700 (PDT)
MIME-Version: 1.0
References: <20240417151332.5152018EF214@rfcpa.amsl.com> <8B8FA176-B23F-4785-B005-FEFDD7EC4EBB@fh-muenster.de> <D1FD8DB2-BFC8-4F7B-9B02-0869119F2BFD@strayalpha.com>
In-Reply-To: <D1FD8DB2-BFC8-4F7B-9B02-0869119F2BFD@strayalpha.com>
From: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>
Date: Wed, 17 Apr 2024 19:18:44 +0300
Message-ID: <CAEh=tcfNLt-wb7jpsg5sqda9FOkJfxKyp5T6KzizdMFs-aNrqA@mail.gmail.com>
To: touch@strayalpha.com
Cc: Michael Tuexen <tuexen@fh-muenster.de>, RFC Errata System <rfc-editor@rfc-editor.org>, "tcpm@ietf.org Extensions" <tcpm@ietf.org>, tcpm-ads@ietf.org, Allison Mankin <mankin@psg.com>, Ron Bonica <rbonica@juniper.net>, "Dr. Joe Touch" <touch@isi.edu>, jeanmichel.combes@gmail.com
Content-Type: multipart/alternative; boundary="00000000000089c3b306164d2c96"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/_a7E315PrCji04ds0xvS39BeYVk>
Subject: Re: [tcpm] [Technical Errata Reported] RFC5925 (7899)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2024 16:16:20 -0000

Looks correct to me as well. If I don't receive any issue on this errata by
end of this week, it will be verified early next week.

/Zahed

On Wed, Apr 17, 2024, 18:59 touch@strayalpha.com <touch@strayalpha.com>
wrote:

> I recommend accepting this errata.
>
> Joe
>
>
> > On Apr 17, 2024, at 8:27 AM, tuexen@fh-muenster.de wrote:
> >
> >> On 17. Apr 2024, at 17:13, RFC Errata System <rfc-editor@rfc-editor.org>
> wrote:
> >>
> >> The following errata report has been submitted for RFC5925,
> >> "The TCP Authentication Option".
> >>
> >> --------------------------------------
> >> You may review the report below and at:
> >> https://www.rfc-editor.org/errata/eid7899
> >>
> >> --------------------------------------
> >> Type: Technical
> >> Reported by: Jean-Michel COMBES <jeanmichel.combes@gmail.com>
> >>
> >> Section: 5.2
> >>
> >> Original Text
> >> -------------
> >>  o  Receive_SYN_traffic_key - the traffic key used to authenticate
> >>     incoming SYNs.  The source ISN is known (the TCP connection's
> >>     remote ISN), and the destination (remote) ISN is unknown (and so
> >>     the value 0 is used).
> >>
> >> Corrected Text
> >> --------------
> >>  o  Receive_SYN_traffic_key - the traffic key used to authenticate
> >>     incoming SYNs.  The source ISN is known (the TCP connection's
> >>     remote ISN), and the destination (local) ISN is unknown (and so
> >>     the value 0 is used).
> >>
> >> Notes
> >> -----
> >> "remote side" is referenced twice: cut-and-paste error, IMHO, from the
> previous paragraph
> >>
> >> Instructions:
> >> -------------
> >> This erratum is currently posted as "Reported". (If it is spam, it
> >> will be removed shortly by the RFC Production Center.) Please
> >> use "Reply All" to discuss whether it should be verified or
> >> rejected. When a decision is reached, the verifying party
> >> will log in to change the status and edit the report, if necessary.
> >>
> >> --------------------------------------
> >> RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
> >> --------------------------------------
> >> Title               : The TCP Authentication Option
> >> Publication Date    : June 2010
> >> Author(s)           : J. Touch, A. Mankin, R. Bonica
> >> Category            : PROPOSED STANDARD
> >> Source              : TCP Maintenance and Minor Extensions
> >> Stream              : IETF
> >> Verifying Party     : IESG
> > I think the reporter is correct.
> >
> > Best regards
> > Michael_______________________________________________
> > tcpm mailing list
> > tcpm@ietf.org
> > https://www.ietf.org/mailman/listinfo/tcpm
>
>