Re: [dnsext] [Technical Errata Reported] RFC4034 (2681)

Olafur Gudmundsson <ogud@ogud.com> Thu, 24 March 2011 02:56 UTC

Return-Path: <ogud@ogud.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52A7D3A67B6 for <dnsext@core3.amsl.com>; Wed, 23 Mar 2011 19:56:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.059
X-Spam-Level:
X-Spam-Status: No, score=-100.059 tagged_above=-999 required=5 tests=[AWL=-2.460, BAYES_00=-2.599, GB_SUMOF=5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vMNrGdsN4mYs for <dnsext@core3.amsl.com>; Wed, 23 Mar 2011 19:56:26 -0700 (PDT)
Received: from stora.ogud.com (stora.ogud.com [66.92.146.20]) by core3.amsl.com (Postfix) with ESMTP id 906D23A67D9 for <dnsext@ietf.org>; Wed, 23 Mar 2011 19:56:26 -0700 (PDT)
Received: from [IPv6:::1] (nyttbox.md.ogud.com [10.20.30.4]) by stora.ogud.com (8.14.4/8.14.4) with ESMTP id p2O2vtmr009215; Wed, 23 Mar 2011 22:57:55 -0400 (EDT) (envelope-from ogud@ogud.com)
Message-ID: <4D8AB330.5090504@ogud.com>
Date: Wed, 23 Mar 2011 22:57:52 -0400
From: Olafur Gudmundsson <ogud@ogud.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: RFC Errata System <rfc-editor@rfc-editor.org>
References: <20110105221815.A7E0FE0701@rfc-editor.org>
In-Reply-To: <20110105221815.A7E0FE0701@rfc-editor.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.20.30.4
X-Mailman-Approved-At: Fri, 25 Mar 2011 08:15:13 -0700
Cc: sra@isc.org, gubailey@microsoft.com, dnsext@ietf.org, rdroms.ietf@gmail.com, jari.arkko@piuha.net, massey@cs.colostate.edu, roy.arends@telin.nl
Subject: Re: [dnsext] [Technical Errata Reported] RFC4034 (2681)
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 02:56:28 -0000

This errata is also correct,
I ran into this same issue myself.


	Olafur


On 05/01/2011 5:18 PM, RFC Errata System wrote:
> The following errata report has been submitted for RFC4034,
> "Resource Records for the DNS Security Extensions".
>
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=4034&eid=2681
>
> --------------------------------------
> Type: Technical
> Reported by: Guillaume Bailey<gubailey@microsoft.com>
>
> Section: B
>
> Original Text
> -------------
>     The key tag is the same for all DNSKEY algorithm types except
>     algorithm 1 (please see Appendix B.1 for the definition of the key
>     tag for algorithm 1).  The key tag algorithm is the sum of the wire
>     format of the DNSKEY RDATA broken into 2 octet groups.  First, the
>     RDATA (in wire format) is treated as a series of 2 octet groups.
>     These groups are then added together, ignoring any carry bits.
>
>
> Corrected Text
> --------------
>     The key tag is the same for all DNSKEY algorithm types except
>     algorithm 1 (please see Appendix B.1 for the definition of the key
>     tag for algorithm 1).  The key tag algorithm is the sum of the wire
>     format of the DNSKEY RDATA broken into 2 octet groups.  First, the
>     RDATA (in wire format) is treated as a series of 2 octet groups.
>     These groups are then added together with at least 32-bit precision,
>     retaining any carry bits. The carry bits are then added to the result,
>     and finally, only the lower 16 bits of the result are used as the key
>     tag.
>
>
>
> Notes
> -----
> This change comes from the example implementation. The accumulator, ac, is required ("assumed") to be 32-bits or larger, and the carry bits are added to the accumulator before returning:
>
>      ac += (ac>>  16)&  0xFFFF;
>
> Instructions:
> -------------
> This errata is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party (IESG)
> can log in to change the status and edit the report, if necessary.
>
> --------------------------------------
> RFC4034 (draft-ietf-dnsext-dnssec-records-11)
> --------------------------------------
> Title               : Resource Records for the DNS Security Extensions
> Publication Date    : March 2005
> Author(s)           : R. Arends, R. Austein, M. Larson, D. Massey, S. Rose
> Category            : PROPOSED STANDARD
> Source              : DNS Extensions
> Area                : Internet
> Stream              : IETF
> Verifying Party     : IESG
>
>
>