Hi, David.

Section 2.7 last paragraph:

   If an initiator proposes both normal ciphers with integrity
   protection as well as combined-mode ciphers, then two proposals are
   needed.  One of the proposals includes the normal ciphers with the
   integrity algorithms for them, and the other proposal includes all
   the combined-mode ciphers without the integrity algorithms (because
   combined-mode ciphers are not allowed to have any integrity algorithm
   other than "NONE").

if you allow one proposal to specify 
(ENCR-AES-CBC,ENCR-AES-GCM,AUTH-None,AUTH-HMAC-SHA1) then the responder can 
validly select (ENCR-AES-GCM,AUTH-HMAC-SHA1) and that’s not a valid combination.

Yoav

> On 12 Sep 2017, at 1:19, Black, David <david.bl...@dell.com> wrote:
> 
> [Adding the IPsec mailing list.]
> 
>> Notes
>> -----
>> RFC-7296 and RFC-5282 contradict each other (yet RFC-7296 cites RFC-5282 
>> without any clarification):
>> 
>> - RFC-7296 explicitly disallows mixing AEAD and non-AEAD algorithms in a 
>> single
>>  proposal; RFC-5282 does not (and strongly implies it is allowed)
>> 
>> - RFC-7296 allows 'none' integrity in an AEAD-only proposal; RFC-5282 does 
>> not.
> 
> Please provide pointers to the RFC 7296 text that supports each of these 
> assertions.
> 
> Thanks, --David
> ----------------------------------------------------------------
> David L. Black, Distinguished Engineer
> Dell EMC, 176 South St., Hopkinton, MA  01748
> +1 (508) 293-7953    Mobile: +1 (978) 394-7754
> david.bl...@dell.com
> ----------------------------------------------------------------
> 
>> -----Original Message-----
>> From: RFC Errata System [mailto:rfc-edi...@rfc-editor.org]
>> Sent: Friday, September 8, 2017 11:13 AM
>> To: Black, David <david.bl...@emc.com>; mcg...@cisco.com; i...@ietf.org
>> Cc: andrew.cag...@gmail.com; rfc-edi...@rfc-editor.org
>> Subject: [Technical Errata Reported] RFC5282 (5109)
>> 
>> The following errata report has been submitted for RFC5282,
>> "Using Authenticated Encryption Algorithms with the Encrypted Payload of
>> the Internet Key Exchange version 2 (IKEv2) Protocol".
>> 
>> --------------------------------------
>> You may review the report below and at:
>> http://www.rfc-editor.org/errata/eid5109
>> 
>> --------------------------------------
>> Type: Technical
>> Reported by: Andrew Cagney <andrew.cag...@gmail.com>
>> 
>> Section: 8.
>> 
>> Original Text
>> -------------
>> 8.  IKEv2 Algorithm Selection
>> 
>>   This section applies to the use of any authenticated encryption
>>   algorithm with the IKEv2 Encrypted Payload and is unique to that
>>   usage.
>> 
>>   IKEv2 (Section 3.3.3 of [RFC4306]) specifies that both an encryption
>>   algorithm and an integrity checking algorithm are required for an IKE
>>   SA (Security Association).  This document updates [RFC4306] to
>>   require that when an authenticated encryption algorithm is selected
>>   as the encryption algorithm for any SA (IKE or ESP), an integrity
>>   algorithm MUST NOT be selected for that SA.  This document further
>>   updates [RFC4306] to require that if all of the encryption algorithms
>>   in any proposal are authenticated encryption algorithms, then the
>>   proposal MUST NOT propose any integrity transforms.
>> 
>> Corrected Text
>> --------------
>> 8.  IKEv2 Algorithm Selection
>> 
>> IKEv2 [rfc7296], section 3.3. Security Association Payload, specifies
>> AEAD algorithm selection.
>> 
>> 
>> Notes
>> -----
>> RFC-7296 and RFC-5282 contradict each other (yet RFC-7296 cites RFC-5282
>> without any
>> clarification):
>> 
>> - RFC-7296 explicitly disallows mixing AEAD and non-AEAD algorithms in a
>> single
>>  proposal; RFC-5282 does not (and strongly implies it is allowed)
>> 
>> - RFC-7296 allows 'none' integrity in an AEAD-only proposal; RFC-5282 does
>> not
>> 
>> Instructions:
>> -------------
>> This erratum is currently posted as "Reported". If necessary, please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party
>> can log in to change the status and edit the report, if necessary.
>> 
>> --------------------------------------
>> RFC5282 (draft-black-ipsec-ikev2-aead-modes-01)
>> --------------------------------------
>> Title               : Using Authenticated Encryption Algorithms with the 
>> Encrypted
>> Payload of the Internet Key Exchange version 2 (IKEv2) Protocol
>> Publication Date    : August 2008
>> Author(s)           : D. Black, D. McGrew
>> Category            : PROPOSED STANDARD
>> Source              : IETF - NON WORKING GROUP
>> Area                : N/A
>> Stream              : IETF
>> Verifying Party     : IESG
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to