From: Pekka Riikonen Date: Wed, 25 Sep 2002 09:39:52 +0000 (+0000) Subject: updates X-Git-Tag: 1.2.beta1~1147 X-Git-Url: http://git.silcnet.org/gitweb/?p=crypto.git;a=commitdiff_plain;h=21d8b39173a6f99b5c6b1bdfc5c21dabd1713c53 updates --- diff --git a/doc/draft-riikonen-silc-pp-06.nroff b/doc/draft-riikonen-silc-pp-06.nroff index 4acfccd9..b9967cd6 100644 --- a/doc/draft-riikonen-silc-pp-06.nroff +++ b/doc/draft-riikonen-silc-pp-06.nroff @@ -2714,11 +2714,12 @@ Hence, packet's MAC generation is as follows: The MAC key is negotiated during the SKE protocol. The sequence number is a 32 bit MSB first value starting from zero for first packet and increasing for subsequent packets, finally wrapping after 2^32 packets. -The value is never reset, not even after rekey has been performed. Note -that the sequence number is incremented only when MAC is computed for a -packet. If packet is not encrypted and MAC is not computed then the -sequence number is not incremented. Hence, the sequence number is zero -for first encrypted packet. +The value is never reset, not even after rekey has been performed. +However, rekey SHOULD be performed before the sequence number repeats +from zero. Note that the sequence number is incremented only when MAC is +computed for a packet. If packet is not encrypted and MAC is not computed +then the sequence number is not incremented. Hence, the sequence number +is zero for first encrypted packet. See [SILC1] for defined and allowed MAC algorithms.