@@ -1293,9 +1293,10 @@ using separate confidentiality and integrity algorithms becomes
12931293necessary, a new version of EESP MUST be defined.
12941294
12951295The mandatory-to-implement algorithms for use with EESP described
1296- in a separate RFC (TBD), to facilitate updating the algorithm requirements
1297- independently from the protocol per se. Additional algorithms,
1298- beyond those mandated for EESP, MAY be supported.
1296+ in a separate RFC, for e.g. RFC8221bis or another I.D., to facilitate
1297+ updating the algorithm requirements independently from the protocol
1298+ per se. Additional algorithms, beyond those mandated for EESP, MAY
1299+ be supported.
12991300
13001301*** Combined Mode Algorithms
13011302
@@ -1819,12 +1820,11 @@ overflow were imminent. Thus, a compliant implementation SHOULD NOT
18191820provide anti-replay service in conjunction with SAs that are manually
18201821keyed.
18211822
1822- The mandatory-to-implement algorithms for use with EESP are described
1823- in a separate document RFC (TBD),
1824- # [[RFC4305]] is for ESP
1825- to facilitate updating the algorithm
1826- requirements independently from the protocol per se. Additional
1827- algorithms, beyond those mandated for EESP, MAY be supported.
1823+ The mandatory-to-implement algorithms for use with EESP described
1824+ in a separate RFC, for e.g. RFC8221bis or another I.D., to facilitate
1825+ updating the algorithm requirements independently from the protocol
1826+ per se. Additional algorithms, beyond those mandated for EESP, MAY
1827+ be supported.
18281828
18291829#Because use of encryption in EESP is optional, support for the "NULL"
18301830#encryption algorithm also is required to maintain consistency with
0 commit comments