Skip to content

Commit ac9bd88

Browse files
committed
deploy: 300fd3f
1 parent 7db3f52 commit ac9bd88

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

draft-ietf-ipsecme-eesp-latest.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1909,8 +1909,8 @@ <h4 id="name-sequence-number">
19091909
Similar to the Session ID, this Sender ID can be used as an
19101910
additional Subs SA ID (see <a href="#sec-session-id-as-sub-sa-id" class="auto internal xref">Section 2.9</a>).
19111911
Defining such an Option is left for future documents.<a href="#section-2.3.1-1" class="pilcrow"></a></p>
1912-
<p id="section-2.3.1-2">Replay protection is optional, but enabled by default.
1913-
Replay protection SHOULD be enabled whenever possible.
1912+
<p id="section-2.3.1-2">Replay protection is optional, but SHOULD be enabled whenever
1913+
possible.
19141914
However, on multicast or in datacenter environments where
19151915
the upper layer protocols ensure replay protection,
19161916
it can be disabled. Disabling replay protection MUST

draft-ietf-ipsecme-eesp-latest.txt

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -532,12 +532,11 @@ Internet-Draft EESP July 2025
532532
additional Subs SA ID (see Section 2.9). Defining such an Option is
533533
left for future documents.
534534

535-
Replay protection is optional, but enabled by default. Replay
536-
protection SHOULD be enabled whenever possible. However, on
537-
multicast or in datacenter environments where the upper layer
538-
protocols ensure replay protection, it can be disabled. Disabling
539-
replay protection MUST be negotiated by IKEv2. In this case the
540-
sequence number field is omitted.
535+
Replay protection is optional, but SHOULD be enabled whenever
536+
possible. However, on multicast or in datacenter environments where
537+
the upper layer protocols ensure replay protection, it can be
538+
disabled. Disabling replay protection MUST be negotiated by IKEv2.
539+
In this case the sequence number field is omitted.
541540

542541
In contrast to ESP, where the receiver alone decides wether to
543542
disable replay protecton, it is negotiated in EESP so that sender and
@@ -554,6 +553,7 @@ Internet-Draft EESP July 2025
554553
data as part of an RFC specifying how the algorithm is used with
555554
EESP. (Typically, the IV immediately precedes the ciphertext. See
556555
Table 1) If such synchronization data is implicit, the algorithm for
556+
deriving the data MUST be part of the algorithm definition RFC. (If
557557

558558

559559

@@ -562,7 +562,6 @@ Klassert, et al. Expires 4 January 2026 [Page 10]
562562
Internet-Draft EESP July 2025
563563

564564

565-
deriving the data MUST be part of the algorithm definition RFC. (If
566565
included, cryptographic synchronization data, e.g., an Initialization
567566
Vector (IV), usually is not encrypted per se (see Table 1), although
568567
it sometimes is referred to as being part of the ciphertext.)
@@ -613,6 +612,7 @@ Internet-Draft EESP July 2025
613612

614613

615614

615+
616616
Klassert, et al. Expires 4 January 2026 [Page 11]
617617

618618
Internet-Draft EESP July 2025

0 commit comments

Comments
 (0)