[tcpm] Re: [Technical Errata Reported] RFC5925 (8884)

"Bonica, Ron" <ronald.bonica@hpe.com> Fri, 17 April 2026 17:20 UTC

Return-Path: <ronald.bonica@hpe.com>
X-Original-To: tcpm@mail2.ietf.org
Delivered-To: tcpm@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A95FFDE706A1; Fri, 17 Apr 2026 10:20:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776446403; bh=nE1BdR5BUPha17VyQzkzG5BglygTVAaOhk9wRZSDh3k=; h=From:To:CC:Subject:Date:References:In-Reply-To; b=fEgR8Niq6z57b4ikeQLj9D97cS9lF46HhcPfjlsrlwBREMGT7TbjpPH5v4YQi0NyL 1fI/GsbNtAKUtFKnh4+dkmn9mzK9B50jcIp71uGWwyfSDwCTnzOUvIULfwI+cD3mNv 3i1/RqG2tOP81m9tmo4RciHhpF6HN5YmDVtGtQqg=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.194
X-Spam-Level:
X-Spam-Status: No, score=-2.194 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=hpe.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jcdqo8ZxVPnw; Fri, 17 Apr 2026 10:20:01 -0700 (PDT)
Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 02D14DE70684; Fri, 17 Apr 2026 10:19:57 -0700 (PDT)
Received: from pps.filterd (m0134423.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 63HF1Xmp1212504; Fri, 17 Apr 2026 17:19:51 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hpe.com; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pps0720; bh=nE1BdR5BUPha17VyQzkzG5Bgly gTVAaOhk9wRZSDh3k=; b=RMqhVMWEdLW/LI5FZ0duNF+JFDWWnD/fqyVcl2QT1y 6qYDQzV/REllPTdST6nVztm6I0+Ie1McBEpIs73rLIKrG2LiyAuTA757488F89/6 moS18h382YOXf+1eqgqFHg3UBp/in6pooG4bGEELF24oeXvFYJhsHksc/PzyFcB+ FQig+0klp5MNeZW8SxfwGKOPyN4LqV3OTIdcFPPhrln4bTOgr48DhQvOZRU4P3xr Pbb2EXFLvcsSSuAdX+6vnmjvp+QfD+pRB7bWz8YF0ZzAt1ywyv5qTxvku7TwlWDz VsV6CF7L6Yifle2kAjcbQowtdUkrJHFMbo9gmRFzr+Kw==
Received: from p1lg14879.it.hpe.com (p1lg14879.it.hpe.com [16.230.97.200]) by mx0b-002e3701.pphosted.com (PPS) with ESMTPS id 4dkgn1pb76-1 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Fri, 17 Apr 2026 17:19:51 +0000 (GMT)
Received: from p1wg14924.americas.hpqcorp.net (unknown [10.119.18.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by p1lg14879.it.hpe.com (Postfix) with ESMTPS id 185982FCEF; Fri, 17 Apr 2026 17:19:50 +0000 (UTC)
Received: from p1wg14925.americas.hpqcorp.net (10.119.18.114) by p1wg14924.americas.hpqcorp.net (10.119.18.113) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Fri, 17 Apr 2026 05:19:06 -1200
Received: from p1wg14919.americas.hpqcorp.net (16.230.19.122) by p1wg14925.americas.hpqcorp.net (10.119.18.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend Transport; Fri, 17 Apr 2026 05:19:06 -1200
Received: from CH4PR07CU001.outbound.protection.outlook.com (192.58.206.35) by edge.it.hpe.com (16.230.19.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Fri, 17 Apr 2026 05:19:06 -1200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XNe1nK9nj5wKg1ozTNELWujXmNQXQvuo/n6bKZ7aLs5nHDZ6ZrN9/CbN4paQHbvfUY4nHDnWQdJVL212dFWPzTYTxyZ5CP6RGUnlVCfY6Gg7eiFXPbw1yWwApkcu4o3aLbpoDzW6hPu4+SLTzc4/1hnCPNIIAoiDRhsBara8KWeWoZd07WyznnXi/Zrye9ZzCeX2OeZS4z8C+X9q0woNKEpwNvqRdImKRNlITyFO8H/bLb7/gzjJYLRAVxzbi5u8GTDpZJd5WL1WMxR6R/PFagk4Ysm34NVNiCpnU9S42vy6vJj1Y/ZtBRsAWafZNgI86DNzG9QV6pae35XRxSHMnQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nE1BdR5BUPha17VyQzkzG5BglygTVAaOhk9wRZSDh3k=; b=dMNkORwlkvoZbO9d6wZUWyI36S3QNwZg30KuYRpl61HvEINm2bmqKRT2mUgkmcv3g8D55uAGq82dmQilG7KPhHVyFYTuAmxfwVnNAYn3ZgEBJl/CFfCPxKH24VNqQ0G5tZ6TGEGCC6Pb39g19/2RsFqoeIAd3aSPBKzwBjxdBtzjU4W7dGRZRodIas4BHtpcbUMTC6MMHQoSq8FX3/EHLTfbCWmT1PegZvzZrMGDw/bxX4zl+KLG/6hI27lyNLCHNgCNYg6I0EufFyZMyGlcWLVG94P1FD1ZpJquzJ5w4XfDZ6yPQP1/OmkYM3ohyWpjqYHsWMCs+FPVtdKVCmu4sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:8:51::18) by MW4PR84MB1489.NAMPRD84.PROD.OUTLOOK.COM (2603:10b6:303:1a4::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Fri, 17 Apr 2026 17:19:01 +0000
Received: from DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f9b2:4189:25fa:bd66]) by DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM ([fe80::f9b2:4189:25fa:bd66%3]) with mapi id 15.20.9818.023; Fri, 17 Apr 2026 17:19:01 +0000
From: "Bonica, Ron" <ronald.bonica@hpe.com>
To: "touch@strayalpha.com" <touch@strayalpha.com>, RFC Errata System <rfc-editor@rfc-editor.org>
Thread-Topic: [tcpm] [Technical Errata Reported] RFC5925 (8884)
Thread-Index: AQHczmKzNnIsRL5Jn0Ge2nBB09EMoLXjZxwAgAAYp9s=
Date: Fri, 17 Apr 2026 17:19:01 +0000
Message-ID: <DM4PR84MB23107319789ED57D7F93A4A9F4202@DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM>
References: <20260417120628.BD93AC0004D7@rfcpa.rfc-editor.org> <D30187E8-0357-4A87-850D-504CB7AFA88C@strayalpha.com>
In-Reply-To: <D30187E8-0357-4A87-850D-504CB7AFA88C@strayalpha.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR84MB2310:EE_|MW4PR84MB1489:EE_
x-ms-office365-filtering-correlation-id: 00996661-c49c-4e65-0791-08de9ca56b4f
x-ld-processed: 105b2061-b669-4b31-92ac-24d304d195dc,ExtAddr
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|4022899009|376014|38070700021|13003099007|8096899003|18002099003|22082099003|56012099003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(4022899009)(376014)(38070700021)(13003099007)(8096899003)(18002099003)(22082099003)(56012099003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM4PR84MB23107319789ED57D7F93A4A9F4202DM4PR84MB2310NAMP_"
MIME-Version: 1.0
X-Exchange-RoutingPolicyChecked: j2tSyB3zHcgxKY4jAsLUNJs0zTvdmazclq+Ezl6MS3NxTWE9AYukPLQEBPLjMV+lmHUFR1idGdHKbCDqjn9pQrOfh7u8lMPXVNZqyBx4iwhm5dG64oWM4Nd5ndTJFLaSB4WtgALVE2Mk0DjbB9uQrSTZbrkq/eJTjgbP/OnuaI6hhajkKvVNDduR+Ne/x28CAOOSK7ftoENcfo1nvb4odmakbhPfZepvgBaAFRp3uOmA6tXX0wLjYa1T/uOWTmdpoB6fehgUV90tAgGhotU8jDwzyT2nXnew7EObbLnUSWaBZXqojy98CgHDFdjfnlK0sGgQ+y3qRkUW4k6MoH0LjA==
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR84MB2310.NAMPRD84.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 00996661-c49c-4e65-0791-08de9ca56b4f
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Apr 2026 17:19:01.6461 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 105b2061-b669-4b31-92ac-24d304d195dc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EC7w8xcU/VtkmVWVOXwW9J7Rau4qgJT7NPYuhZsRjlfY/JrSfJqiiO5B6RH4pvZTreYSQl9sE3Nez94oDojNYw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR84MB1489
X-OriginatorOrg: hpe.com
X-Authority-Analysis: v=2.4 cv=HaAkiCE8 c=1 sm=1 tr=0 ts=69e26bb7 cx=c_pps a=5jkVtQsCUlC8zk5UhkBgHg==:117 a=5jkVtQsCUlC8zk5UhkBgHg==:17 a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19 a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22 a=gQcMVamqm3wCPoSYhaRC:22 a=g3u0LPWLDYfGfufhFw6-:22 a=5PjRKeHDAAAA:8 a=BqEg4_3jAAAA:8 a=No5EcEP4AAAA:8 a=OUXY8nFuAAAA:8 a=48vgC7mUAAAA:8 a=pGLkceISAAAA:8 a=MvuuwTCpAAAA:8 a=XLhEnHehmPNa6ITH0H0A:9 a=QEXdDO2ut3YA:10 a=3PDoVsikitjMVH8e76sA:9 a=Tyhy7Gj6PBPgOOi5:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10 a=JUmZIVAtDGArBY8dChIh:22 a=0mFWnFbQd5xWBqmg7tTt:22 a=d7s2MEQe8WEhQVw-R4CT:22 a=cAcMbU7R10T-QSRYIcO_:22
X-Proofpoint-GUID: v5FHblauIGHgvzsWT4xvBfqi7KX_ARZw
X-Proofpoint-ORIG-GUID: v5FHblauIGHgvzsWT4xvBfqi7KX_ARZw
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwNDE3MDE3NCBTYWx0ZWRfX9oeI/yyN0OHQ xHVYD+DrAGsqTZ7ymyQYtGEF6ExhqvQUVusYdNEyZlVk3uprna6B3GrqwCDpUWH0zLDFY0ZuHVj h4zquhMmivxHzc9/DioH1J4pZHjnvQlsgCepf2to5S91hb2A5FuDTqUQqb14TS9EM2AToKLn/En jzlJAvU6bBZlYWYOXrs+t0WWwg7AFsCwEcHxh/UYajkIZ8UQBIn2aKhgiItTR+qF/9b67u8ZEWQ ZEg6TJSuLNpuIpQnTiCQrC0UCF9cZ+jTKM9tx3vHyF/LwNGJ1fZsqvudjg/R+7Nbtyu5isI88Gx axzPJPFVqtpql2l2edqO2yHClGT+1cSj9etFh/7tCqn/BQ7TP9jhrV3sOgnf88jJltDX0dAbMOG 1JkMtz9apsfUH9CoUJ8bLo3xf468wL7GVMKoruNKOmSSb3yFvFfcWVkEhmC5PEkIl6q/D8aB12c eJWL6SI8OSpS5CPaV0Q==
X-HPE-SCL: -1
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-04-17_01,2026-04-17_04,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 lowpriorityscore=0 malwarescore=0 suspectscore=0 bulkscore=0 spamscore=0 phishscore=0 clxscore=1011 impostorscore=0 adultscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604070000 definitions=main-2604170174
Message-ID-Hash: BRNJTQAIDDLV45IJKQMJCXCDYHJUYEED
X-Message-ID-Hash: BRNJTQAIDDLV45IJKQMJCXCDYHJUYEED
X-MailFrom: ronald.bonica@hpe.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "Dr. Joe Touch" <touch@isi.edu>, Allison Mankin <mankin@psg.com>, Ron Bonica <rbonica@juniper.net>, "tcpm-ads@ietf.org" <tcpm-ads@ietf.org>, "tuexen@fh-muenster.de" <tuexen@fh-muenster.de>, "tcpm@ietf.org" <tcpm@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: [Technical Errata Reported] RFC5925 (8884)
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/p4TZ-MsoIha6YdDzipfYUOefBCA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

Fine by me
________________________________
From: touch@strayalpha.com <touch@strayalpha.com>
Sent: Friday, April 17, 2026 11:50 AM
To: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: Dr. Joe Touch <touch@isi.edu>; Allison Mankin <mankin@psg.com>; Ron Bonica <rbonica@juniper.net>; tcpm-ads@ietf.org <tcpm-ads@ietf.org>; nsd.ietf@gmail.com <nsd.ietf@gmail.com>; tuexen@fh-muenster.de <tuexen@fh-muenster.de>; Bonica, Ron <ronald.bonica@hpe.com>; tcpm@ietf.org <tcpm@ietf.org>
Subject: Re: [tcpm] [Technical Errata Reported] RFC5925 (8884)

I believe better corrected text would be:

  The implementation of SNEs is not specified in this document, but one
  possible way is described in RFC 9817.

I don’t think the doc should mandate code.

Joe

—
Dr. Joe Touch, temporal epistemologist
www.strayalpha.com<https://urldefense.com/v3/__http://www.strayalpha.com__;!!NpxR!iWiz84sPSymM7ZjqtZQjDCn2D-HQN6wsa_LqTwVH7UqKqffgArpQz0qsOsyrUR-bLQc2YPmNsMumUGtndg$>

On Apr 17, 2026, at 5:06 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote:

The following errata report has been submitted for RFC5925,
"The TCP Authentication Option".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8884<https://urldefense.com/v3/__https://www.rfc-editor.org/errata/eid8884__;!!NpxR!iWiz84sPSymM7ZjqtZQjDCn2D-HQN6wsa_LqTwVH7UqKqffgArpQz0qsOsyrUR-bLQc2YPmNsMuUETHO7w$>

--------------------------------------
Type: Technical
Reported by: Ron Bonica <ronald.bonica@hpe.com>

Section: 6.2

Original Text
-------------
The implementation of SNEs is not specified in this document, but one
  possible way is described here that can be used for either RCV.SNE,
  SND.SNE, or both.

  Consider an implementation with two SNEs as required (SND.SNE, RCV.
  SNE), and additional variables as listed below, all initialized to
  zero, as well as a current TCP segment field (SEG.SEQ):

  o  SND.PREV_SEQ, needed to detect rollover of SND.SEQ

  o  RCV.PREV_SEQ, needed to detect rollover of RCV.SEQ

  o  SND.SNE_FLAG, which indicates when to increment the SND.SNE

  o  RCV.SNE_FLAG, which indicates when to increment the RCV.SNE

  When a segment is received, the following algorithm (in C-like
  pseudocode) computes the SNE used in the MAC; this is the "RCV" side,
  and an equivalent algorithm can be applied to the "SND" side:







Touch, et al.                Standards Track                   [Page 25]

RFC 5925              The TCP Authentication Option            June 2010


     /* set the flag when the SEG.SEQ first rolls over */
     if ((RCV.SNE_FLAG == 0)
        && (RCV.PREV_SEQ > 0x7fff) && (SEG.SEQ < 0x7fff)) {
           RCV.SNE = RCV.SNE + 1;
           RCV.SNE_FLAG = 1;
     }
     /* decide which SNE to use after incremented */
     if ((RCV.SNE_FLAG == 1) && (SEG.SEQ > 0x7fff)) {
        SNE = RCV.SNE - 1; # use the pre-increment value
     } else {
        SNE = RCV.SNE; # use the current value
     }
     /* reset the flag in the *middle* of the window */
     if ((RCV.PREV_SEQ < 0x7fff) && (SEG.SEQ > 0x7fff)) {
        RCV.SNE_FLAG = 0;
     }
     /* save the current SEQ for the next time through the code */
     RCV.PREV_SEQ = SEG.SEQ;

  In the above code, the first time the sequence number rolls over,
  i.e., when the new number is low (in the bottom half of the number
  space) and the old number is high (in the top half of the number
  space), the SNE is incremented and a flag is set.

  If the flag is set and a high number is seen, it must be a reordered
  segment, so use the pre-increment SNE; otherwise, use the current
  SNE.

  The flag will be cleared by the time the number rolls all the way
  around.

  The flag prevents the SNE from being incremented again until the flag
  is reset, which happens in the middle of the window (when the old
  number is in the bottom half and the new is in the top half).
  Because the receive window is never larger than half of the number
  space, it is impossible to both set and reset the flag at the same
  time -- outstanding segments, regardless of reordering, cannot
  straddle both regions simultaneously.

Corrected Text
--------------
The implementation of SNEs is specified in RFC 9817.

Notes
-----
The deleted text includes a buggy version of the SNE algorithm. RFC 9817 specifies a better SNE algorithm.

Implementation that use the RFC 9817 SNE algorithm will be mostly, but not 100% backwards compatible with implementations that implement the deleted RFC 5925 version.

Thanks to Pig Chen for raising this issue.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC5925 (draft-ietf-tcpm-tcp-auth-opt-11)
--------------------------------------
Title               : The TCP Authentication Option
Publication Date    : June 2010
Author(s)           : J. Touch, A. Mankin, R. Bonica
Category            : PROPOSED STANDARD
Source              : TCP Maintenance and Minor Extensions
Stream              : IETF
Verifying Party     : IESG

_______________________________________________
tcpm mailing list -- tcpm@ietf.org
To unsubscribe send an email to tcpm-leave@ietf.org