Re: [art] [Technical Errata Reported] RFC7505 (6932)
Chris Smiley <csmiley@amsl.com> Tue, 12 April 2022 20:42 UTC
Return-Path: <csmiley@amsl.com>
X-Original-To: art@ietfa.amsl.com
Delivered-To: art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EDC53A110C for <art@ietfa.amsl.com>; Tue, 12 Apr 2022 13:42:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A-Or_GkqByai for <art@ietfa.amsl.com>; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from c8a.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34B923A110F for <art@ietf.org>; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 13195427C641; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JMRJBFZ0BOwF; Tue, 12 Apr 2022 13:42:30 -0700 (PDT)
Received: from [192.168.1.14] (cpe-76-95-228-63.socal.res.rr.com [76.95.228.63]) by c8a.amsl.com (Postfix) with ESMTPSA id C9FF7427C640; Tue, 12 Apr 2022 13:42:29 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chris Smiley <csmiley@amsl.com>
In-Reply-To: <20220412185133.E31526AACF@rfcpa.amsl.com>
Date: Tue, 12 Apr 2022 13:42:29 -0700
Cc: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <32A44DDA-8C7B-4AE8-BA0E-F034A7794882@amsl.com>
References: <20220412185133.E31526AACF@rfcpa.amsl.com>
To: standards@taugh.com, mx0dot@yahoo.com, "Murray S. Kucherawy" <superuser@gmail.com>, Francesca Palombini <francesca.palombini@ericsson.com>, art@ietf.org
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/art/dDgYN8UsX_E46C7CTitHAAbIxVE>
Subject: Re: [art] [Technical Errata Reported] RFC7505 (6932)
X-BeenThere: art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications and Real-Time Area Discussion <art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/art>, <mailto:art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/art/>
List-Post: <mailto:art@ietf.org>
List-Help: <mailto:art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/art>, <mailto:art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2022 20:42:35 -0000
Greetings, FYI - this report has been deleted as junk. Thank you. RFC Editor/cs > On Apr 12, 2022, at 11:51 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote: > > The following errata report has been submitted for RFC7505, > "A "Null MX" No Service Resource Record for Domains That Accept No Mail". > > -------------------------------------- > You may review the report below and at: > https://www.rfc-editor.org/errata/eid6932 > > -------------------------------------- > Type: Technical > Reported by: Jesus Alvarado <mannyman4208@gmail.com> > > Section: 2119 > > Original Text > ------------- > RFC7507] Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher > Suite Value (SCSV) for Preventing Protocol Downgrade > Attacks", RFC 7507, April 2015. > It should say: > > [RFC7507] Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher > Suite Value (SCSV) for Preventing Protocol Downgrade > Attacks", RFC 7507, April 2015, > <http://www.rfc-editor.org/info/rfc7507>. > > > Corrected Text > -------------- > RFC7507] Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher > Suite Value (SCSV) for Preventing Protocol Downgrade > Attacks", RFC 7507, April 2015. > It should say: > > [RFC7507] Moeller, B. and A. Langley, "TLS Fallback Signaling Cipher > Suite Value (SCSV) for Preventing Protocol Downgrade > Attacks", RFC 7507, April 2015, > <http://www.rfc-editor.org/info/rfc7507>. > [RFC7505] may of 2015 is the date of the pki updated > > Notes > ----- > All the old tls got affected by cyrpto problems and clean a mass build up from the computer get hit by every Trojans from tech and government sides and everyone that is still playing with Trojans keeps getting foreign Trojans as well. > > Instructions: > ------------- > This erratum is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party > can log in to change the status and edit the report, if necessary. > > -------------------------------------- > RFC7505 (draft-ietf-appsawg-nullmx-10) > -------------------------------------- > Title : A "Null MX" No Service Resource Record for Domains That Accept No Mail > Publication Date : June 2015 > Author(s) : J. Levine, M. Delany > Category : PROPOSED STANDARD > Source : ART Area General Application Working Group > Area : Applications and Real-Time > Stream : IETF > Verifying Party : IESG >
- [art] [Technical Errata Reported] RFC7505 (6932) RFC Errata System
- Re: [art] [Technical Errata Reported] RFC7505 (69… Chris Smiley