[Adding the IPsec mailing list.]

> Notes
> -----
> RFC-7296 and RFC-5282 contradict each other (yet RFC-7296 cites RFC-5282 
> without any clarification):
> 
> - RFC-7296 explicitly disallows mixing AEAD and non-AEAD algorithms in a 
> single
>   proposal; RFC-5282 does not (and strongly implies it is allowed)
> 
> - RFC-7296 allows 'none' integrity in an AEAD-only proposal; RFC-5282 does 
> not.

Please provide pointers to the RFC 7296 text that supports each of these 
assertions.

Thanks, --David
----------------------------------------------------------------
David L. Black, Distinguished Engineer
Dell EMC, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953    Mobile: +1 (978) 394-7754
david.bl...@dell.com
----------------------------------------------------------------

> -----Original Message-----
> From: RFC Errata System [mailto:rfc-edi...@rfc-editor.org]
> Sent: Friday, September 8, 2017 11:13 AM
> To: Black, David <david.bl...@emc.com>; mcg...@cisco.com; i...@ietf.org
> Cc: andrew.cag...@gmail.com; rfc-edi...@rfc-editor.org
> Subject: [Technical Errata Reported] RFC5282 (5109)
> 
> The following errata report has been submitted for RFC5282,
> "Using Authenticated Encryption Algorithms with the Encrypted Payload of
> the Internet Key Exchange version 2 (IKEv2) Protocol".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata/eid5109
> 
> --------------------------------------
> Type: Technical
> Reported by: Andrew Cagney <andrew.cag...@gmail.com>
> 
> Section: 8.
> 
> Original Text
> -------------
> 8.  IKEv2 Algorithm Selection
> 
>    This section applies to the use of any authenticated encryption
>    algorithm with the IKEv2 Encrypted Payload and is unique to that
>    usage.
> 
>    IKEv2 (Section 3.3.3 of [RFC4306]) specifies that both an encryption
>    algorithm and an integrity checking algorithm are required for an IKE
>    SA (Security Association).  This document updates [RFC4306] to
>    require that when an authenticated encryption algorithm is selected
>    as the encryption algorithm for any SA (IKE or ESP), an integrity
>    algorithm MUST NOT be selected for that SA.  This document further
>    updates [RFC4306] to require that if all of the encryption algorithms
>    in any proposal are authenticated encryption algorithms, then the
>    proposal MUST NOT propose any integrity transforms.
> 
> Corrected Text
> --------------
> 8.  IKEv2 Algorithm Selection
> 
> IKEv2 [rfc7296], section 3.3. Security Association Payload, specifies
> AEAD algorithm selection.
> 
> 
> Notes
> -----
> RFC-7296 and RFC-5282 contradict each other (yet RFC-7296 cites RFC-5282
> without any
> clarification):
> 
> - RFC-7296 explicitly disallows mixing AEAD and non-AEAD algorithms in a
> single
>   proposal; RFC-5282 does not (and strongly implies it is allowed)
> 
> - RFC-7296 allows 'none' integrity in an AEAD-only proposal; RFC-5282 does
> not
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party
> can log in to change the status and edit the report, if necessary.
> 
> --------------------------------------
> RFC5282 (draft-black-ipsec-ikev2-aead-modes-01)
> --------------------------------------
> Title               : Using Authenticated Encryption Algorithms with the 
> Encrypted
> Payload of the Internet Key Exchange version 2 (IKEv2) Protocol
> Publication Date    : August 2008
> Author(s)           : D. Black, D. McGrew
> Category            : PROPOSED STANDARD
> Source              : IETF - NON WORKING GROUP
> Area                : N/A
> Stream              : IETF
> Verifying Party     : IESG
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to