[Dime] FW: [Errata Held for Document Update] RFC4072 (1955)

"Romascanu, Dan (Dan)" <dromasca@avaya.com> Tue, 11 May 2010 10:28 UTC

Return-Path: <dromasca@avaya.com>
X-Original-To: dime@core3.amsl.com
Delivered-To: dime@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 769E328C171 for <dime@core3.amsl.com>; Tue, 11 May 2010 03:28:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[AWL=0.598, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EoTIElDCH+aa for <dime@core3.amsl.com>; Tue, 11 May 2010 03:28:04 -0700 (PDT)
Received: from de307622-de-outbound.net.avaya.com (de307622-de-outbound.net.avaya.com [198.152.71.100]) by core3.amsl.com (Postfix) with ESMTP id 06C913A6C0D for <dime@ietf.org>; Tue, 11 May 2010 03:26:00 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.53,206,1272859200"; d="scan'208";a="188102285"
Received: from unknown (HELO p-us1-erheast.us1.avaya.com) ([135.11.50.53]) by de307622-de-outbound.net.avaya.com with ESMTP; 11 May 2010 06:25:49 -0400
X-IronPort-AV: E=Sophos;i="4.53,206,1272859200"; d="scan'208";a="461497363"
Received: from unknown (HELO 307622ANEX5.global.avaya.com) ([135.64.140.13]) by p-us1-erheast-out.us1.avaya.com with ESMTP; 11 May 2010 06:25:49 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 11 May 2010 12:25:41 +0200
Message-ID: <EDC652A26FB23C4EB6384A4584434A04021BE9EA@307622ANEX5.global.avaya.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Errata Held for Document Update] RFC4072 (1955)
Thread-Index: AcrwRkrsqu+VpgCcQeWeBcFpCh4tYQArgErg
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: dime@ietf.org
Subject: [Dime] FW: [Errata Held for Document Update] RFC4072 (1955)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 May 2010 10:28:05 -0000

 

-----Original Message-----
From: RFC Errata System [mailto:rfc-editor@rfc-editor.org] 
Sent: Monday, May 10, 2010 4:40 PM
To: gwz@net-zen.net; pasi.eronen@nokia.com; tomhiller@lucent.com;
gwz@cisco.com
Cc: Romascanu, Dan (Dan); iesg@iesg.org; rfc-editor@rfc-editor.org
Subject: [Errata Held for Document Update] RFC4072 (1955)


The following errata report has been held for document update for
RFC4072, "Diameter Extensible Authentication Protocol (EAP)
Application". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=4072&eid=1955

--------------------------------------
Status: Held for Document Update
Type: Editorial

Reported by: Glen Zorn <gwz@net-zen.net> Date Reported: 2009-12-03 Held
by: Dan Romascanu (IESG)

Section: 4.1.4

Original Text
-------------
   Note that not all link layers use this name, and currently most EAP

   methods do not generate it.  Since the NAS operates in pass-through

   mode, it cannot know the Key-Name before receiving it from the AAA

   server.  As a result, a Key-Name AVP sent in a Diameter-EAP-Request

   MUST NOT contain any data.  A home Diameter server receiving a

   Diameter-EAP-Request with a Key-Name AVP with non-empty data MUST

   silently discard the AVP.  

Corrected Text
--------------
   Note that not all link layers use this name, and currently most EAP

   methods do not generate it.  Since the NAS operates in pass-through

   mode, it cannot know the name of the key before receiving it from the
AAA

   server.  As a result, an EAP-Key-Name AVP sent in a
Diameter-EAP-Request

   MUST NOT contain any data.  A home Diameter server receiving a

   Diameter-EAP-Request containing an EAP-Key-Name AVP with non-empty
data MUST

   silently ignore the AVP.  

Notes
-----
In the original text, the first occurrence of the string "Key-Name"
apparently is meant to refer to the actual name of the key, rather than
an AVP identifier, while the next two occurrences are obviously typos,
since no Key-Name AVP is defined in the document.  Also, the term
"silently discard" is typically used in reference to messages; with
reference to a single AVP, "silently ignore" seems more appropriate.

--------------------------------------
RFC4072 (draft-ietf-aaa-eap-10)
--------------------------------------
Title               : Diameter Extensible Authentication Protocol (EAP)
Application
Publication Date    : August 2005
Author(s)           : P. Eronen, Ed., T. Hiller, G. Zorn
Category            : PROPOSED STANDARD
Source              : Authentication, Authorization and Accounting
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG