RFC Errata


Errata Search

 
Source of RFC  
Summary Table Full Records

Found 4 records.

Status: Reported (4)

RFC 9172, "Bundle Protocol Security (BPSec)", January 2022

Source of RFC: dtn (int)

Errata ID: 7672
Status: Reported
Type: Technical
Publication Format(s) : TEXT, HTML

Reported By: Brian Sipos
Date Reported: 2023-10-10

Section 3.6 says:

Security Context Id:
 This field identifies the security context used to implement
 the security service represented by this block and applied to
 each security target.  This field SHALL be represented by a
 CBOR unsigned integer.  The values for this Id should come from
 the registry defined in Section 11.3.

It should say:

Security Context Id:
 This field identifies the security context used to implement
 the security service represented by this block and applied to
 each security target.  This field SHALL be represented by a
 CBOR unsigned or negative integer.  The values for this Id should
 come from the registry defined in Section 11.3.

Notes:

Per the IANA sub-registry in Section 11.3 the Context ID has "The value range: signed 16-bit integer." and negative values are reserved for private use, so the value can be either an unsigned or a negative integer.

Errata ID: 8312
Status: Reported
Type: Technical
Publication Format(s) : HTML

Reported By: Brian Sipos
Date Reported: 2025-02-24

Section 3.6 says:

/none/

It should say:

Any fields of the ASB, including the Security Source, MAY be treated 
as untrusted input for key material lookup in support of processing 
a security operation as a validator or acceptor.
Any fields of the ASB SHALL NOT be used for making other decisions 
on a node unless they are covered as additional authenticated data 
by an successfully validated or accepted integrity or confidentiality 
operation on that node.

Notes:

There was no original text restricting how the fields of the ASB can be used by a node. This errata explicitly restricts untrusted inputs in the ASB from influencing node processing, including logic or telemetry based on the Security Source. The default security contexts of RFC 9173 do not yet have the possibility to include the Security Source as additional authenticated data.

Errata ID: 8681
Status: Reported
Type: Technical
Publication Format(s) : TEXT

Reported By: Lukas Holst
Date Reported: 2025-12-17

Section 5.1.1 says:

   If an encrypted payload block cannot be decrypted (i.e., the
   ciphertext cannot be authenticated), then the bundle MUST be
   discarded and processed no further.  If an encrypted security target
   other than the payload block cannot be decrypted, then the associated
   security target and all security blocks associated with that target
   MUST be discarded and processed no further.  In both cases, requested
   status reports (see [RFC9171]) MAY be generated to reflect bundle or
   block deletion.

It should say:

   If an encrypted payload block cannot be decrypted (i.e., the 
   ciphertext cannot be authenticated), then the bundle MUST be deleted
   and processed no further. If requested, a deletion status report (see
   [RFC9171]) MAY be generated using the appropriate Bundle Status 
   Report Reason Codes (see Section 11.2) to report bundle deletion. If 
   an encrypted security target other than the payload block cannot be 
   decrypted, then the associated security target and all security 
   blocks associated with that target MUST be discarded and processed 
   no further.

Notes:

There exists no block deletion status report in RFC9171.

Errata ID: 8723
Status: Reported
Type: Technical
Publication Format(s) : TEXT, HTML

Reported By: Lukas Holst
Date Reported: 2026-01-29

Section 3.3 says:

   *  None of the security operations conflict with security operations
      already present in the bundle.

It should say:

   *  None of the security operations conflict with security operations
      already present in the bundle.

   *  In a set of integrity security operations, none of the operations
      target the security block metadata with their associated 
      authenticated data, as this interferes with the processing of BIB
      encryption.

Notes:

Combining two or more integrity operations in a single security block, while the associated authenticated data targets the security block metadata, can lead to invalidation of a security result when following the rules of Section 3.9. When a BIB result is moved into a new BIB, then the security block number changes, thereby invalidating the BIB result. This additional constraint for combining security results prevents this invalidation.

Report New Errata



Advanced Search