[Curdle] [Editorial Errata Reported] RFC8270 (7965)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 31 May 2024 10:10 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: curdle@ietf.org
Delivered-To: curdle@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95537C15107C; Fri, 31 May 2024 03:10:50 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id E14017FA63; Fri, 31 May 2024 03:10:49 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240531101049.E14017FA63@rfcpa.rfc-editor.org>
Date: Fri, 31 May 2024 03:10:49 -0700
Message-ID-Hash: YF6MMXSMUIDIOVWWTCN7JUUPF3RRMRQ4
X-Message-ID-Hash: YF6MMXSMUIDIOVWWTCN7JUUPF3RRMRQ4
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-curdle.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: aungko.use@gmail.com, logan@hackers.mu, mdb@juniper.net, curdle@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Curdle] [Editorial Errata Reported] RFC8270 (7965)
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/RwU4OkmULkjgTwBeY3aPiJSruks>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Owner: <mailto:curdle-owner@ietf.org>
List-Post: <mailto:curdle@ietf.org>
List-Subscribe: <mailto:curdle-join@ietf.org>
List-Unsubscribe: <mailto:curdle-leave@ietf.org>

The following errata report has been submitted for RFC8270,
"Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7965

--------------------------------------
Type: Editorial
Reported by: Aung ko <aungko.use@gmail.com>

Section: GLOBAL

Original Text
-------------
Notes:

Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice.



Corrected Text
--------------
Notes:

Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice.



Notes
-----
Notes:

Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC8270 (draft-ietf-curdle-ssh-dh-group-exchange-06)
--------------------------------------
Title               : Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits
Publication Date    : December 2017
Author(s)           : L. Velvindron, M. Baushke
Category            : PROPOSED STANDARD
Source              : CURves, Deprecating and a Little more Encryption
Stream              : IETF
Verifying Party     : IESG