[tcpm] [Errata Held for Document Update] RFC5926 (6413)

RFC Errata System <rfc-editor@rfc-editor.org> Tue, 02 February 2021 21:33 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5872C3A0A5E; Tue, 2 Feb 2021 13:33:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hiFQJpBCY6TX; Tue, 2 Feb 2021 13:33:46 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1921F3A0A3F; Tue, 2 Feb 2021 13:33:46 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 25A32F40737; Tue, 2 Feb 2021 13:33:31 -0800 (PST)
To: ananth.nantha@yahoo.com, gregory.ietf@gmail.com, ekr@rtfm.com
X-PHP-Originating-Script: 1005:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: martin.h.duke@gmail.com, iesg@ietf.org, tcpm@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20210202213331.25A32F40737@rfc-editor.org>
Date: Tue, 02 Feb 2021 13:33:31 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/lcZ9tZ3OvCcrxkVwhxoEMcMz-kk>
Subject: [tcpm] [Errata Held for Document Update] RFC5926 (6413)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Feb 2021 21:33:47 -0000

The following errata report has been held for document update 
for RFC5926, "Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid6413

--------------------------------------
Status: Held for Document Update
Type: Editorial

Reported by: Ananth Rajadurai <ananth.nantha@yahoo.com>
Date Reported: 2021-01-28
Held by: Martin Duke (IESG)

Section: 3.1.1.2

Original Text
-------------
In section 3.1.1.2 Page 8, figure 1,

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+                        KDF-AES-128-CMAC                           +
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+                                                                   +
+ Input  : MK (Master_Key, the variable-length shared secret)       +
+        : I (Input, i.e., the input data of the PRF)               +
+        : MKlen (length of MK in octets)                           +
+        : len (length of M in octets)                              +
+ Output : TK (Traffic_Key, 128-bit Pseudo-Random Variable)         +
+                                                                   +
+-------------------------------------------------------------------+

Corrected Text
--------------
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+                        KDF-AES-128-CMAC                           +
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+                                                                   +
+ Input  : MK (Master_Key, the variable-length shared secret)       +
+        : I (Input, i.e., the input data of the PRF)               +
+        : MKlen (length of MK in octets)                           +
+        : len (length of I in octets)                              +
+ Output : TK (Traffic_Key, 128-bit Pseudo-Random Variable)         +
+                                                                   +
+-------------------------------------------------------------------+

Notes
-----
In Input, "len" is described as (length of "M' in octets), but there is no "M" in the input, but it is supposed to mention the length of the Input Data "I", so it should be (length of "I" in octets)

--------------------------------------
RFC5926 (draft-ietf-tcpm-tcp-ao-crypto-03)
--------------------------------------
Title               : Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)
Publication Date    : June 2010
Author(s)           : G. Lebovitz, E. Rescorla
Category            : PROPOSED STANDARD
Source              : TCP Maintenance and Minor Extensions
Area                : Transport
Stream              : IETF
Verifying Party     : IESG