[core] [Errata Verified] RFC7959 (7523)
RFC Errata System <rfc-editor@rfc-editor.org> Sat, 08 July 2023 00:14 UTC
Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9A76C151549; Fri, 7 Jul 2023 17:14:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.013
X-Spam-Level:
X-Spam-Status: No, score=-0.013 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CTE_8BIT_MISMATCH=0.84, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p1TEe9ydluzt; Fri, 7 Jul 2023 17:14:42 -0700 (PDT)
Received: from rfcpa.amsl.com (unknown [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 98024C14CF1B; Fri, 7 Jul 2023 17:14:42 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 628258528B; Fri, 7 Jul 2023 17:14:42 -0700 (PDT)
To: christian@amsuess.com, cabo@tzi.org, zach.shelby@arm.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: superuser@gmail.com, iesg@ietf.org, core@ietf.org, iana@iana.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20230708001442.628258528B@rfcpa.amsl.com>
Date: Fri, 07 Jul 2023 17:14:42 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/DO_lUF7afreGF_HVG1nj16xwWXg>
Subject: [core] [Errata Verified] RFC7959 (7523)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Jul 2023 00:14:46 -0000
The following errata report has been verified for RFC7959, "Block-Wise Transfers in the Constrained Application Protocol (CoAP)". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7523 -------------------------------------- Status: Verified Type: Editorial Reported by: Christian Amsüss <christian@amsuess.com> Date Reported: 2023-05-24 Verified by: Murray Kucherawy (IESG) Section: 3 Original Text ------------- then the block number (NUM), more bit (M), and block size exponent (2**(SZX+4)) separated by slashes. For example, a Block2 Option Corrected Text -------------- then the block number (NUM), more bit (M), and block size (2**(SZX+4)) separated by slashes. For example, a Block2 Option Notes ----- The examples are given in the style of "2:1/1/128", wher 128 is the size (2**(SZX+4)), not the size exponent -- it contains the size exponent in the expression, but the full expression is the size. (Reporting this as an erratum because the use of "SZX" for "size" instead of "size exponent" has some potential for spreading and creating confusion; for example in Wireshark at https://gitlab.com/wireshark/wireshark/-/merge_requests/10763) -------------------------------------- RFC7959 (draft-ietf-core-block-21) -------------------------------------- Title : Block-Wise Transfers in the Constrained Application Protocol (CoAP) Publication Date : August 2016 Author(s) : C. Bormann, Z. Shelby, Ed. Category : PROPOSED STANDARD Source : Constrained RESTful Environments Area : Applications and Real-Time Stream : IETF Verifying Party : IESG
- [core] [Errata Verified] RFC7959 (7523) RFC Errata System