[Curdle] [Errata Held for Document Update] RFC8410 (7848)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 11 April 2024 19:52 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16A49C14F6A1; Thu, 11 Apr 2024 12:52:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.949
X-Spam-Level:
X-Spam-Status: No, score=-3.949 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QbC9FyKlfpv8; Thu, 11 Apr 2024 12:52:08 -0700 (PDT)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 46183C14F6F4; Thu, 11 Apr 2024 12:52:08 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 2366DCE3BD; Thu, 11 Apr 2024 12:52:08 -0700 (PDT)
To: corey.bonnell@digicert.com, simon@josefsson.org, ietf@augustcellars.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: debcooley1@gmail.com, iesg@ietf.org, curdle@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240411195208.2366DCE3BD@rfcpa.amsl.com>
Date: Thu, 11 Apr 2024 12:52:08 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/vVZGbrawNIfPfc9j7CfyTJRoyBw>
Subject: [Curdle] [Errata Held for Document Update] RFC8410 (7848)
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2024 19:52:13 -0000

The following errata report has been held for document update 
for RFC8410, "Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7848

--------------------------------------
Status: Held for Document Update
Type: Technical

Reported by: Corey Bonnell <corey.bonnell@digicert.com>
Date Reported: 2024-03-12
Held by: Deb Cooley (IESG)

Section: 6

Original Text
-------------
Certificate  ::=  SEQUENCE  {
           tbsCertificate       TBSCertificate,
           signatureAlgorithm   AlgorithmIdentifier,
           signatureValue       BIT STRING  }

...


For the Certificate structure, the signature value is
   wrapped in the "signatureValue" BIT STRING field.

Corrected Text
--------------
Certificate  ::=  SEQUENCE  {
           tbsCertificate       TBSCertificate,
           signatureAlgorithm   AlgorithmIdentifier,
           signature            BIT STRING  }

...

For the Certificate structure, the signature value is
   wrapped in the "signature" BIT STRING field.

Notes
-----
There is no field with the name "signatureValue" in the Certificate SEQUENCE. It is instead named "signature" according to the ASN.1 module in RFC 5280 A.1 as well as the ASN.1 module in section 14 of RFC 5912.

--------------------------------------
RFC8410 (draft-ietf-curdle-pkix-10)
--------------------------------------
Title               : Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure
Publication Date    : August 2018
Author(s)           : S. Josefsson, J. Schaad
Category            : PROPOSED STANDARD
Source              : CURves, Deprecating and a Little more Encryption
Stream              : IETF
Verifying Party     : IESG