[tcpm] [Errata Held for Document Update] RFC5926 (6413)
RFC Errata System <rfc-editor@rfc-editor.org> Tue, 02 February 2021 21:33 UTC
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5872C3A0A5E; Tue, 2 Feb 2021 13:33:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hiFQJpBCY6TX; Tue, 2 Feb 2021 13:33:46 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1921F3A0A3F; Tue, 2 Feb 2021 13:33:46 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 25A32F40737; Tue, 2 Feb 2021 13:33:31 -0800 (PST)
To: ananth.nantha@yahoo.com, gregory.ietf@gmail.com, ekr@rtfm.com
X-PHP-Originating-Script: 1005:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: martin.h.duke@gmail.com, iesg@ietf.org, tcpm@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20210202213331.25A32F40737@rfc-editor.org>
Date: Tue, 02 Feb 2021 13:33:31 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/lcZ9tZ3OvCcrxkVwhxoEMcMz-kk>
Subject: [tcpm] [Errata Held for Document Update] RFC5926 (6413)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Feb 2021 21:33:47 -0000
The following errata report has been held for document update for RFC5926, "Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid6413 -------------------------------------- Status: Held for Document Update Type: Editorial Reported by: Ananth Rajadurai <ananth.nantha@yahoo.com> Date Reported: 2021-01-28 Held by: Martin Duke (IESG) Section: 3.1.1.2 Original Text ------------- In section 3.1.1.2 Page 8, figure 1, +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + KDF-AES-128-CMAC + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + + Input : MK (Master_Key, the variable-length shared secret) + + : I (Input, i.e., the input data of the PRF) + + : MKlen (length of MK in octets) + + : len (length of M in octets) + + Output : TK (Traffic_Key, 128-bit Pseudo-Random Variable) + + + +-------------------------------------------------------------------+ Corrected Text -------------- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + KDF-AES-128-CMAC + +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + + Input : MK (Master_Key, the variable-length shared secret) + + : I (Input, i.e., the input data of the PRF) + + : MKlen (length of MK in octets) + + : len (length of I in octets) + + Output : TK (Traffic_Key, 128-bit Pseudo-Random Variable) + + + +-------------------------------------------------------------------+ Notes ----- In Input, "len" is described as (length of "M' in octets), but there is no "M" in the input, but it is supposed to mention the length of the Input Data "I", so it should be (length of "I" in octets) -------------------------------------- RFC5926 (draft-ietf-tcpm-tcp-ao-crypto-03) -------------------------------------- Title : Cryptographic Algorithms for the TCP Authentication Option (TCP-AO) Publication Date : June 2010 Author(s) : G. Lebovitz, E. Rescorla Category : PROPOSED STANDARD Source : TCP Maintenance and Minor Extensions Area : Transport Stream : IETF Verifying Party : IESG
- [tcpm] [Errata Held for Document Update] RFC5926 … RFC Errata System