[Curdle] [Errata Verified] RFC8410 (6263)
RFC Errata System <rfc-editor@rfc-editor.org> Wed, 30 October 2024 10:03 UTC
Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: curdle@ietf.org
Delivered-To: curdle@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87237C151531; Wed, 30 Oct 2024 03:03:50 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id 02FD67F9E1; Wed, 30 Oct 2024 03:03:50 -0700 (PDT)
To: ietf104729@di-mgt.com.au, simon@josefsson.org, ietf@augustcellars.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20241030100350.02FD67F9E1@rfcpa.rfc-editor.org>
Date: Wed, 30 Oct 2024 03:03:50 -0700
Message-ID-Hash: UI7P267RDOXXMYURBB5XMNIVEC7BQUVX
X-Message-ID-Hash: UI7P267RDOXXMYURBB5XMNIVEC7BQUVX
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-curdle.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: debcooley1@gmail.com, iesg@ietf.org, curdle@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Curdle] [Errata Verified] RFC8410 (6263)
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/0DkNd8ru2dZxCnra5eS_PjBxEyw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Owner: <mailto:curdle-owner@ietf.org>
List-Post: <mailto:curdle@ietf.org>
List-Subscribe: <mailto:curdle-join@ietf.org>
List-Unsubscribe: <mailto:curdle-leave@ietf.org>
The following errata report has been verified for RFC8410, "Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid6263 -------------------------------------- Status: Verified Type: Technical Reported by: David Ireland <ietf104729@di-mgt.com.au> Date Reported: 2020-08-24 Verified by: Deb Cooley (IESG) Section: 7 Original Text ------------- NOTE: There exist some private key import functions that have not picked up the new ASN.1 structure OneAsymmetricKey that is defined in [RFC7748]. Corrected Text -------------- NOTE: There exist some private key import functions that have not picked up the new ASN.1 structure OneAsymmetricKey that is defined in [RFC5958]. Notes ----- RFC7748 does not define or even mention OneAsymmetricKey. The correct reference should be RFC5958 "Asymmetric Key Packages" -------------------------------------- RFC8410 (draft-ietf-curdle-pkix-10) -------------------------------------- Title : Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure Publication Date : August 2018 Author(s) : S. Josefsson, J. Schaad Category : PROPOSED STANDARD Source : CURves, Deprecating and a Little more Encryption Stream : IETF Verifying Party : IESG
- [Curdle] [Errata Verified] RFC8410 (6263) RFC Errata System