From 3f42d00654d9f0325bddb646e423d8bc3d9d9399 Mon Sep 17 00:00:00 2001 From: Pekka Riikonen Date: Wed, 25 Sep 2002 09:59:10 +0000 Subject: [PATCH] updates --- doc/draft-riikonen-silc-pp-06.nroff | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/doc/draft-riikonen-silc-pp-06.nroff b/doc/draft-riikonen-silc-pp-06.nroff index bcf226e3..6c511ffa 100644 --- a/doc/draft-riikonen-silc-pp-06.nroff +++ b/doc/draft-riikonen-silc-pp-06.nroff @@ -2715,11 +2715,11 @@ The MAC key is negotiated during the SKE protocol. The sequence number is a 32 bit MSB first value starting from zero for first packet and increasing for subsequent packets, finally wrapping after 2^32 packets. The value is never reset, not even after rekey has been performed. -However, rekey SHOULD be performed before the sequence number repeats -from zero. Note that the sequence number is incremented only when MAC is -computed for a packet. If packet is not encrypted and MAC is not computed -then the sequence number is not incremented. Hence, the sequence number -is zero for first encrypted packet. +However, rekey MUST be performed before the sequence number wraps +and repeats from zero. Note that the sequence number is incremented only +when MAC is computed for a packet. If packet is not encrypted and MAC is +not computed then the sequence number is not incremented. Hence, the +sequence number is zero for first encrypted packet. See [SILC1] for defined and allowed MAC algorithms. -- 2.24.0