[Curdle] [Editorial Errata Reported] RFC8270 (7965)
RFC Errata System <rfc-editor@rfc-editor.org> Fri, 31 May 2024 10:10 UTC
Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: curdle@ietf.org
Delivered-To: curdle@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95537C15107C; Fri, 31 May 2024 03:10:50 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id E14017FA63; Fri, 31 May 2024 03:10:49 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240531101049.E14017FA63@rfcpa.rfc-editor.org>
Date: Fri, 31 May 2024 03:10:49 -0700
Message-ID-Hash: YF6MMXSMUIDIOVWWTCN7JUUPF3RRMRQ4
X-Message-ID-Hash: YF6MMXSMUIDIOVWWTCN7JUUPF3RRMRQ4
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-curdle.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: aungko.use@gmail.com, logan@hackers.mu, mdb@juniper.net, curdle@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Curdle] [Editorial Errata Reported] RFC8270 (7965)
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/RwU4OkmULkjgTwBeY3aPiJSruks>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Owner: <mailto:curdle-owner@ietf.org>
List-Post: <mailto:curdle@ietf.org>
List-Subscribe: <mailto:curdle-join@ietf.org>
List-Unsubscribe: <mailto:curdle-leave@ietf.org>
The following errata report has been submitted for RFC8270, "Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7965 -------------------------------------- Type: Editorial Reported by: Aung ko <aungko.use@gmail.com> Section: GLOBAL Original Text ------------- Notes: Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice. Corrected Text -------------- Notes: Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice. Notes ----- Notes: Instead of ignoring attacks, the administrator wants to know when one is taking place, particularly if it is an intense one which would lead to a denial of service, as suggested by the authors. Thus, using a rate-limited logging mechanism is an appropriate solution to keep records of the attack, and to notify the administrator in real-time then he can take actions if he wants to. As there might not be other ways to inform the administrator of an attack taking place, not logging at all is the last choice. Instructions: ------------- This erratum is currently posted as "Reported". (If it is spam, it will be removed shortly by the RFC Production Center.) Please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party will log in to change the status and edit the report, if necessary. -------------------------------------- RFC8270 (draft-ietf-curdle-ssh-dh-group-exchange-06) -------------------------------------- Title : Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits Publication Date : December 2017 Author(s) : L. Velvindron, M. Baushke Category : PROPOSED STANDARD Source : CURves, Deprecating and a Little more Encryption Stream : IETF Verifying Party : IESG
- [Curdle] [Editorial Errata Reported] RFC8270 (796… RFC Errata System
- [Curdle] Re: [Editorial Errata Reported] RFC8270 … mbaushke ietf
- [Curdle] Re: [Editorial Errata Reported] RFC8270 … Rebecca VanRheenen
- [Curdle] Re: [Editorial Errata Reported] RFC8270 … Rebecca VanRheenen