Re: [dhcwg] [Technical Errata Reported] RFC6704 (4995)

Suresh Krishnan <Suresh@kaloom.com> Wed, 19 April 2017 19:14 UTC

Return-Path: <Suresh@kaloom.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84475129C14 for <dhcwg@ietfa.amsl.com>; Wed, 19 Apr 2017 12:14:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kaloom.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 72XP_hRYnDG8 for <dhcwg@ietfa.amsl.com>; Wed, 19 Apr 2017 12:14:07 -0700 (PDT)
Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660108.outbound.protection.outlook.com [40.107.66.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6217612945A for <dhcwg@ietf.org>; Wed, 19 Apr 2017 12:14:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaloom.onmicrosoft.com; s=selector1-kaloom-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=/dv/o0VfGynYPHSa0yAmeBjLU1ebl1OOUGL/zZ5E7PA=; b=HOmjABaAgfb7nFwltIhkgrmmEKMrKMcmNDJn1MA5RWLgrSzopfgc43GSLUF/QDiDE+6WA0yMq+WyrwwSqVbw71GXCL38SZQWjCFYn+lzgKodU/MDzZK3xpChDqfoFICBugX2AIueVit5kKZ93FuGkOycBbU1LeWmhweDpJMKAjA=
Received: from YQXPR01MB0392.CANPRD01.PROD.OUTLOOK.COM (10.165.138.18) by YQXPR01MB0389.CANPRD01.PROD.OUTLOOK.COM (10.165.138.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10; Wed, 19 Apr 2017 19:14:05 +0000
Received: from YQXPR01MB0392.CANPRD01.PROD.OUTLOOK.COM ([10.165.138.18]) by YQXPR01MB0392.CANPRD01.PROD.OUTLOOK.COM ([10.165.138.18]) with mapi id 15.01.1034.018; Wed, 19 Apr 2017 19:14:04 +0000
From: Suresh Krishnan <Suresh@kaloom.com>
To: Bernie Volz <volz@cisco.com>
CC: RFC Editor <rfc-editor@rfc-editor.org>, "davidmiles@google.com" <davidmiles@google.com>, "Wojciech Dec (wdec)" <wdec@cisco.com>, "James.Bristow@swisscom.com" <James.Bristow@swisscom.com>, "roberta.maglione@telecomitalia.it" <roberta.maglione@telecomitalia.it>, Terry Manderson <terry.manderson@icann.org>, Tomek Mrugalski <tomasz.mrugalski@gmail.com>, "niels@qacafe.com" <niels@qacafe.com>, "dhcwg@ietf.org" <dhcwg@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC6704 (4995)
Thread-Index: AQHStVDWuuiX81czlkCrNygpnBjILKHMuVCAgABeRgA=
Date: Wed, 19 Apr 2017 19:14:04 +0000
Message-ID: <3C90BC64-08D9-432E-B16E-0A3C59ADFCE1@kaloom.com>
References: <20170414185617.0DC8FB813F0@rfc-editor.org> <1BDC18F7-878D-4B77-A43E-6B87204C77F3@cisco.com>
In-Reply-To: <1BDC18F7-878D-4B77-A43E-6B87204C77F3@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=kaloom.com;
x-originating-ip: [67.22.228.34]
x-microsoft-exchange-diagnostics: 1; YQXPR01MB0389; 7:zEE8GpZi2lXYliHBChwNvRVfHUg0Z7e4UBAb1gHFG62xYWHsrIWuKPUUq/Bky86nb2DvyrqNf1QdSwbm0Qxk6G2eRGjxYMGpABfWS+Cd4+WPvytGO/dFaa8JBqat6Phk9ALvI46EMm6KuUh7sVwyv+8MtMo/Vpi+KvBmftvAufxagvkzgmsvy+8caIPzohYiqKGKQZKgyrxKLGBXn7weEhZ99NI/fHdWy6iEVUDpqqqV1vWYJxvCE/4QdF1ZbdrRYTdsdY4AXhcc4FsGb49WijnPK+cHJq6o0yqCv10ZeWk/bEE/mN3Bg8SakRoXqbPWyQSqaJpEdeqJVQl7HFBYlg==
x-ms-office365-filtering-correlation-id: 5e4d3af4-2c9e-4daa-4bff-08d487583eed
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075); SRVR:YQXPR01MB0389;
x-microsoft-antispam-prvs: <YQXPR01MB03891F9BA7D8805C0F724DA6B4180@YQXPR01MB0389.CANPRD01.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(95692535739014)(1591387915157);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(6041248)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(20161123560025)(2016111802025)(20161123555025)(20161123564025)(6072148)(6043046); SRVR:YQXPR01MB0389; BCL:0; PCL:0; RULEID:; SRVR:YQXPR01MB0389;
x-forefront-prvs: 028256169F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39830400002)(39410400002)(39400400002)(24454002)(50944005)(377454003)(102836003)(33656002)(6116002)(53546009)(3846002)(966004)(39060400002)(6246003)(25786009)(3660700001)(7736002)(4326008)(110136004)(38730400002)(53936002)(305945005)(86362001)(2906002)(54356999)(122556002)(76176999)(66066001)(3280700002)(8936002)(50986999)(229853002)(189998001)(82746002)(7416002)(36756003)(6916009)(2950100002)(83716003)(6306002)(81166006)(8676002)(6512007)(16799955002)(2900100001)(6486002)(54906002)(6506006)(15188155005)(77096006)(5660300001)(80792005)(6436002); DIR:OUT; SFP:1102; SCL:1; SRVR:YQXPR01MB0389; H:YQXPR01MB0392.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-ID: <1AE1B534CFC58543BF979E9BE9E0E11A@CANPRD01.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: kaloom.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Apr 2017 19:14:04.7812 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 47d58e26-f796-48e8-ac40-1c365c204513
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR01MB0389
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/Mk9N2a_Dfi6kRjjgBJHjDOR2Cbg>
X-Mailman-Approved-At: Wed, 19 Apr 2017 13:34:31 -0700
Subject: Re: [dhcwg] [Technical Errata Reported] RFC6704 (4995)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 19:14:17 -0000

Hi Bernie,
  I will try to figure out how to do the IANA update. I will hold onto the erratum until then.

Thanks
Suresh

> On Apr 19, 2017, at 8:36 AM, Bernie Volz (volz) <volz@cisco.com> wrote:
> 
> This erratum is verified. Please update it to reflect that is verified.
> 
> We can then notify IANA to have the table corrected.
> 
> - Bernie Volz
> 
> On 4/14/17, 2:56 PM, "RFC Errata System" <rfc-editor@rfc-editor.org> wrote:
> 
>    The following errata report has been submitted for RFC6704,
>    "Forcerenew Nonce Authentication".
> 
>    --------------------------------------
>    You may review the report below and at:
>    http://www.rfc-editor.org/errata_search.php?rfc=6704&eid=4995
> 
>    --------------------------------------
>    Type: Technical
>    Reported by: Niels Widger <niels@qacafe.com>
> 
>    Section: 4
> 
>    Original Text
>    -------------
>       IANA has assigned the following new DHCPv4 option code from the
>       registry "BOOTP Vendor Extensions and DHCP Options" maintained at
>       http://www.iana.org/assignments/bootp-dhcp-parameters:
> 
>       Tag: 145
> 
>       Name: FORCERENEW_NONCE_CAPABLE
> 
>       Data length: 1
> 
>       Description: Forcerenew Nonce Capable
> 
>       Reference: this document
> 
>    Corrected Text
>    --------------
>       IANA has assigned the following new DHCPv4 option code from the
>       registry "BOOTP Vendor Extensions and DHCP Options" maintained at
>       http://www.iana.org/assignments/bootp-dhcp-parameters:
> 
>       Tag: 145
> 
>       Name: FORCERENEW_NONCE_CAPABLE
> 
>       Data length: n
> 
>       Description: Forcerenew Nonce Capable
> 
>       Reference: this document
> 
>    Notes
>    -----
>    RFC 6704 Section 3.1.1 states that the FORCERENEW_NONCE_CAPABLE option is variable length and contains a list of algorithm types:
> 
>    The FORCERENEW_NONCE_CAPABLE option contains code 145, length n, and
>       a sequence of algorithms the client supports:
> 
>                 Code   Len   Algorithms
>                +-----+-----+----+----+----+
>                | 145 |  n  | A1 | A2 | A3 | ....
>                +-----+-----+----+----+----+
> 
>                     Figure 1: FORCERENEW_NONCE_CAPABLE Option
> 
>    Instructions:
>    -------------
>    This erratum is currently posted as "Reported". If necessary, please
>    use "Reply All" to discuss whether it should be verified or
>    rejected. When a decision is reached, the verifying party  
>    can log in to change the status and edit the report, if necessary. 
> 
>    --------------------------------------
>    RFC6704 (draft-ietf-dhc-forcerenew-nonce-07)
>    --------------------------------------
>    Title               : Forcerenew Nonce Authentication
>    Publication Date    : August 2012
>    Author(s)           : D. Miles, W. Dec, J. Bristow, R. Maglione
>    Category            : PROPOSED STANDARD
>    Source              : Dynamic Host Configuration
>    Area                : Internet
>    Stream              : IETF
>    Verifying Party     : IESG
> 
>