Skip to content

Commit a2b520e

Browse files
committed
deploy: 786a4c3
1 parent 59c7946 commit a2b520e

File tree

2 files changed

+125
-137
lines changed

2 files changed

+125
-137
lines changed

draft-ietf-ipsecme-eesp-latest.html

Lines changed: 8 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1223,11 +1223,11 @@
12231223
<thead><tr>
12241224
<td class="left">Internet-Draft</td>
12251225
<td class="center">EESP</td>
1226-
<td class="right">July 2025</td>
1226+
<td class="right">August 2025</td>
12271227
</tr></thead>
12281228
<tfoot><tr>
12291229
<td class="left">Klassert, et al.</td>
1230-
<td class="center">Expires 10 January 2026</td>
1230+
<td class="center">Expires 2 February 2026</td>
12311231
<td class="right">[Page]</td>
12321232
</tr></tfoot>
12331233
</table>
@@ -1238,12 +1238,12 @@
12381238
<dd class="workgroup">IPSECME Working Group</dd>
12391239
<dt class="label-published">Published:</dt>
12401240
<dd class="published">
1241-
<time datetime="2025-07-09" class="published">9 July 2025</time>
1241+
<time datetime="2025-08-01" class="published">1 August 2025</time>
12421242
</dd>
12431243
<dt class="label-intended-status">Intended Status:</dt>
12441244
<dd class="intended-status">Standards Track</dd>
12451245
<dt class="label-expires">Expires:</dt>
1246-
<dd class="expires"><time datetime="2026-01-10">10 January 2026</time></dd>
1246+
<dd class="expires"><time datetime="2026-02-02">2 February 2026</time></dd>
12471247
<dt class="label-authors">Authors:</dt>
12481248
<dd class="authors">
12491249
<div class="author">
@@ -1295,7 +1295,7 @@ <h2 id="name-status-of-this-memo">
12951295
time. It is inappropriate to use Internet-Drafts as reference
12961296
material or to cite them other than as "work in progress."<a href="#section-boilerplate.1-3" class="pilcrow"></a></p>
12971297
<p id="section-boilerplate.1-4">
1298-
This Internet-Draft will expire on 10 January 2026.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
1298+
This Internet-Draft will expire on 2 February 2026.<a href="#section-boilerplate.1-4" class="pilcrow"></a></p>
12991299
</section>
13001300
</div>
13011301
<div id="copyright">
@@ -1794,9 +1794,7 @@ <h4 id="name-fixed-base-header">
17941794
<dt id="section-2.2.1-6.1">Packet Format (F)</dt>
17951795
<dd style="margin-left: 1.5em" id="section-2.2.1-6.2">
17961796
<p id="section-2.2.1-6.2.1">1 bit: Set to zero for full EESP packet Format (i.e., the EESP header includes the
1797-
'<code>Payload Info Header</code>'), set to 1 for Optimized EESP Packet format. This bit
1798-
MAY be only set to 1 if the Crypt Offset is positive. It MUST be set to
1799-
0 otherwise.<a href="#section-2.2.1-6.2.1" class="pilcrow"></a></p>
1797+
'<code>Payload Info Header</code>'), set to 1 for Optimized EESP Packet format.<a href="#section-2.2.1-6.2.1" class="pilcrow"></a></p>
18001798
</dd>
18011799
<dd class="break"></dd>
18021800
<dt id="section-2.2.1-6.3">Reserved (RR)</dt>
@@ -2036,18 +2034,8 @@ <h3 id="name-padding-for-encryption">
20362034
requirements noted above, but all implementations MUST support
20372035
generation and consumption of padding.<a href="#section-2.6-3" class="pilcrow"></a></p>
20382036
<p id="section-2.6-4">If Padding bytes are needed but the algorithm does not
2039-
specify the padding contents, then the following default processing
2040-
MUST be used. The default processing follows exactly ESP as of <span>[<a href="#RFC4303" class="cite xref">RFC4303</a>]</span>.
2041-
The Padding bytes are initialized with a series of
2042-
(unsigned, 1-byte) integer values. The first padding byte appended
2043-
to the plaintext is numbered 1, with subsequent padding bytes making
2044-
up a monotonically increasing sequence: 1, 2, 3, .... When this
2045-
padding scheme is employed, the receiver SHOULD inspect the Padding
2046-
field. (This scheme was selected because of its relative simplicity,
2047-
ease of implementation in hardware, and because it offers limited
2048-
protection against certain forms of "cut and paste" attacks in the
2049-
absence of other integrity measures, if the receiver checks the
2050-
padding values upon decryption.)<a href="#section-2.6-4" class="pilcrow"></a></p>
2037+
specify the padding contents, then the Padding bytes
2038+
MUST be set to 0.<a href="#section-2.6-4" class="pilcrow"></a></p>
20512039
<p id="section-2.6-5">If an algorithm imposes constraints on
20522040
the values of the bytes used for padding, they MUST be specified by
20532041
the RFC defining how the algorithm is employed with EESP. If the

0 commit comments

Comments
 (0)