Re: [tcpm] [Technical Errata Reported] RFC5925 (5961)

Joe Touch <touch@strayalpha.com> Wed, 22 January 2020 15:19 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA50512010E for <tcpm@ietfa.amsl.com>; Wed, 22 Jan 2020 07:19:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.22
X-Spam-Level:
X-Spam-Status: No, score=-1.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 466EkmQyVqg0 for <tcpm@ietfa.amsl.com>; Wed, 22 Jan 2020 07:19:26 -0800 (PST)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D444312010C for <tcpm@ietf.org>; Wed, 22 Jan 2020 07:19:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=eIFZsKNChQQkXRP2rr5fetZ7/NKibv2T3vDuUilUs+Q=; b=I+95fS128ZtZKGzeTY/qqVclM yj5j00cZW0NTWqFe5RMmirEa2PXVWsksXQDxGRneAkeGYHxXgb+8LdrvyBR+26aD7K8C/IIbNKQPm z3AgL+nveG7ThfN3srolElNdcNqaHVlPIqFvSdnXJV1ZmwmoxKZQ6JLX4etGIFpo0moz+5bwYi//h MfWZLe6bqACwhciRC/rs+CIYXrALxFSHqI0sCkURJqjGh3opBVIsN59zDojDPC49D2lhsYj3MR0+I NrdqyubnN6Ep4CHfNsqag5NtSUZLmqatDh/RV/ynEVlDfgdhqwvkqwWB/GmwvHLqhG7mBJp+dlNiS stQhu1x5g==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:64041 helo=[192.168.1.10]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1iuHmn-002wQf-5z; Wed, 22 Jan 2020 10:19:21 -0500
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <20200122141007.AC3E5F40710@rfc-editor.org>
Date: Wed, 22 Jan 2020 07:19:16 -0800
Cc: "Dr. Joe Touch" <touch@isi.edu>, Allison Mankin <mankin@psg.com>, Ron Bonica <rbonica@juniper.net>, ietf@kuehlewind.net, magnus.westerlund@ericsson.com, michael.scharf@hs-esslingen.de, tuexen@fh-muenster.de, nsd.ietf@gmail.com, tcpm@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <3DE0239D-EB27-40E6-A4A3-DE5093D0FE73@strayalpha.com>
References: <20200122141007.AC3E5F40710@rfc-editor.org>
To: RFC Errata System <rfc-editor@rfc-editor.org>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
X-OutGoing-Spam-Status: No, score=-0.2
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/fyAzMRQI99IRHPOoLN2HXZsi6wo>
X-Mailman-Approved-At: Wed, 22 Jan 2020 09:25:37 -0800
Subject: Re: [tcpm] [Technical Errata Reported] RFC5925 (5961)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jan 2020 15:19:29 -0000

FYI - Ron and I both checked this.

> On Jan 22, 2020, at 6:10 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been submitted for RFC5925,
> "The TCP Authentication Option".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid5961
> 
> --------------------------------------
> Type: Technical
> Reported by: Ron Bonica <rbonica@juniper.net>
> 
> Section: 7.4
> 
> Original Text
> -------------
> d. Determine the RNextKeyID as indicated by the rnext_key
> pointer, and insert it in the TCP-AO RNextKeyID field (using
> the rnext_key MKT’s RecvID as the TCP-AO KeyID)
> 
> 
> Corrected Text
> --------------
> d. Determine the RNextKeyID as indicated by the rnext_key
> pointer, and insert it in the TCP-AO RNextKeyID field (using
> the rnext_key MKT’s RecvID as the TCP-AO RNextKeyID)
> 
> 
> Notes
> -----
> This was a cut-and-paste error
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
> --------------------------------------
> Title               : The TCP Authentication Option
> Publication Date    : June 2010
> Author(s)           : J. Touch, A. Mankin, R. Bonica
> Category            : PROPOSED STANDARD
> Source              : TCP Maintenance and Minor Extensions
> Area                : Transport
> Stream              : IETF
> Verifying Party     : IESG