Re: [art] [Technical Errata Reported] RFC7505 (6932)

Chris Smiley <csmiley@amsl.com> Tue, 12 April 2022 20:42 UTC

Return-Path: <csmiley@amsl.com>
X-Original-To: art@ietfa.amsl.com
Delivered-To: art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EDC53A110C for <art@ietfa.amsl.com>; Tue, 12 Apr 2022 13:42:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-Or_GkqByai for <art@ietfa.amsl.com>; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from c8a.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34B923A110F for <art@ietf.org>; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 13195427C641; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JMRJBFZ0BOwF; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from [192.168.1.14] (cpe-76-95-228-63.socal.res.rr.com [76.95.228.63]) by c8a.amsl.com (Postfix) with ESMTPSA id C9FF7427C640; Tue, 12 Apr 2022 13:42:29 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chris Smiley <csmiley@amsl.com>
In-Reply-To: <20220412185133.E31526AACF@rfcpa.amsl.com>
Date: Tue, 12 Apr 2022 13:42:29 -0700
Cc: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <32A44DDA-8C7B-4AE8-BA0E-F034A7794882@amsl.com>
References: <20220412185133.E31526AACF@rfcpa.amsl.com>
To: standards@taugh.com, mx0dot@yahoo.com, "Murray S. Kucherawy" <superuser@gmail.com>, Francesca Palombini <francesca.palombini@ericsson.com>, art@ietf.org
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/art/dDgYN8UsX_E46C7CTitHAAbIxVE>
Subject: Re: [art] [Technical Errata Reported] RFC7505 (6932)
X-BeenThere: art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications and Real-Time Area Discussion <art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/art>, <mailto:art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/art/>
List-Post: <mailto:art@ietf.org>
List-Help: <mailto:art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/art>, <mailto:art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2022 20:42:35 -0000

Greetings,

FYI - this report has been deleted as junk.

Thank you.

RFC Editor/cs


> On Apr 12, 2022, at 11:51 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been submitted for RFC7505,
> "A "Null MX" No Service Resource Record for Domains That Accept No Mail".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid6932
> 
> --------------------------------------
> Type: Technical
> Reported by: Jesus Alvarado <mannyman4208@gmail.com>
> 
> Section: 2119
> 
> Original Text
> -------------
> RFC7507]  Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher
>           Suite Value (SCSV) for Preventing Protocol Downgrade
>           Attacks", RFC 7507, April 2015.
> It should say:
> 
> [RFC7507]  Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher
>           Suite Value (SCSV) for Preventing Protocol Downgrade
>           Attacks", RFC 7507, April 2015,
>           <http://www.rfc-editor.org/info/rfc7507>.
> 
> 
> Corrected Text
> --------------
> RFC7507]  Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher
>           Suite Value (SCSV) for Preventing Protocol Downgrade
>           Attacks", RFC 7507, April 2015.
> It should say:
> 
> [RFC7507]  Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher
>           Suite Value (SCSV) for Preventing Protocol Downgrade
>           Attacks", RFC 7507, April 2015,
>           <http://www.rfc-editor.org/info/rfc7507>.
> [RFC7505] may of 2015 is the date of the pki updated 
> 
> Notes
> -----
> All the old tls got affected by cyrpto problems and clean a mass build up from the computer get hit by every Trojans from tech and government sides and everyone that is still playing with Trojans keeps getting foreign Trojans as well.
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC7505 (draft-ietf-appsawg-nullmx-10)
> --------------------------------------
> Title               : A "Null MX" No Service Resource Record for Domains That Accept No Mail
> Publication Date    : June 2015
> Author(s)           : J. Levine, M. Delany
> Category            : PROPOSED STANDARD
> Source              : ART Area General Application Working Group
> Area                : Applications and Real-Time
> Stream              : IETF
> Verifying Party     : IESG
>