[Curdle] [Errata Held for Document Update] RFC8270 (5501)

RFC Errata System <rfc-editor@rfc-editor.org> Sun, 23 September 2018 23:26 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D639124BE5; Sun, 23 Sep 2018 16:26:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X_s9X55fJvJ6; Sun, 23 Sep 2018 16:26:31 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A61B12F1AC; Sun, 23 Sep 2018 16:26:31 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id AC673B80A76; Sun, 23 Sep 2018 16:26:24 -0700 (PDT)
To: eugene.adell@gmail.com, logan@hackers.mu, mdb@juniper.net
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: kaduk@mit.edu, iesg@ietf.org, curdle@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20180923232624.AC673B80A76@rfc-editor.org>
Date: Sun, 23 Sep 2018 16:26:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/l6Iw003eXeRhS6VG7UNKE8VaUlc>
Subject: [Curdle] [Errata Held for Document Update] RFC8270 (5501)
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Sep 2018 23:26:33 -0000

The following errata report has been held for document update 
for RFC8270, "Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata/eid5501

--------------------------------------
Status: Held for Document Update
Type: Editorial

Reported by: Eugene Adell <eugene.adell@gmail.com>
Date Reported: 2018-09-21
Held by: Benjamin Kaduk (IESG)

Section: 3

Original Text
-------------
[RFC4419] specifies a recommended minimum size of 1024 bits for k,
   which is the modulus length of the DH group.  It also suggests that,
   in all cases, the size of the group needs be at least 1024 bits.

Corrected Text
--------------
[RFC4419] specifies a recommended minimum size of 1024 bits for k,
   which is the modulus length of the DH group.  It also suggests that,
   in all cases, the size of the group needs to be at least 1024 bits.

Notes
-----
Fix a typo (missing "to").

--------------------------------------
RFC8270 (draft-ietf-curdle-ssh-dh-group-exchange-06)
--------------------------------------
Title               : Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits
Publication Date    : December 2017
Author(s)           : L. Velvindron, M. Baushke
Category            : PROPOSED STANDARD
Source              : CURves, Deprecating and a Little more Encryption
Area                : Security
Stream              : IETF
Verifying Party     : IESG