Note that this version includes the clarification of Apad initialization: OSPF routers sending OSPF packets must initialize the first 4 octets of Apad to the value of the IP source address that would be used when sending the OSPFv2 packet. The remainder of Apad will contain the value 0x878FE1F3 repeated (L - 4)/4 times, where L is the length of the hash, measured in octets. The basic idea is to incorporate the IP source address from the IP header in the cryptographic authentication computation so that any change of IP source address in a replayed packet can be detected.
Thanks, Acee On 11/10/14, 10:37 AM, "Acee Lindem (acee)" <a...@cisco.com> wrote: >I believe this version satisfies both Adrian¹s and Suresh¹s comments made >during the IESG and GENART review. It also includes a editorial correction >from Alissa Cooper. > >Thanks, >Acee > >On 11/10/14, 10:27 AM, "internet-dra...@ietf.org" ><internet-dra...@ietf.org> wrote: > >> >>A new version (-11) has been submitted for >>draft-ietf-ospf-security-extension-manual-keying: >>http://www.ietf.org/internet-drafts/draft-ietf-ospf-security-extension-ma >>n >>ual-keying-11.txt >> >>Sub state has been changed to AD Followup from Revised ID Needed >> >> >>The IETF datatracker page for this Internet-Draft is: >>https://datatracker.ietf.org/doc/draft-ietf-ospf-security-extension-manua >>l >>-keying/ >> >>Diff from previous version: >>http://www.ietf.org/rfcdiff?url2=draft-ietf-ospf-security-extension-manua >>l >>-keying-11 >> >>Please note that it may take a couple of minutes from the time of >>submission >>until the htmlized version and diff are available at tools.ietf.org. >> >>IETF Secretariat. >> > _______________________________________________ OSPF mailing list OSPF@ietf.org https://www.ietf.org/mailman/listinfo/ospf