[DNSOP] [Errata Verified] RFC8945 (7983)

RFC Errata System <rfc-editor@rfc-editor.org> Tue, 11 June 2024 13:50 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: dnsop@ietf.org
Delivered-To: dnsop@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45D68C1519AA; Tue, 11 Jun 2024 06:50:21 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id 9532E204E22; Tue, 11 Jun 2024 06:50:20 -0700 (PDT)
To: terts@nlnetlabs.nl, Francis.Dupont@fdupont.fr, sa.morris8@gmail.com, paul@redbarn.org, d3e3e3@gmail.com, olafur+ietf@cloudflare.com, bwelling@akamai.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240611135020.9532E204E22@rfcpa.rfc-editor.org>
Date: Tue, 11 Jun 2024 06:50:20 -0700
Message-ID-Hash: VKNBXO53B5AITYS34N5BBZ2LR46RE4WG
X-Message-ID-Hash: VKNBXO53B5AITYS34N5BBZ2LR46RE4WG
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: iesg@ietf.org, dnsop@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [DNSOP] [Errata Verified] RFC8945 (7983)
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/6TXduTNn07BEvxZbgHU5j9Hs8DQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

The following errata report has been verified for RFC8945,
"Secret Key Transaction Authentication for DNS (TSIG)". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7983

--------------------------------------
Status: Verified
Type: Editorial

Reported by: Terts Diepraam <terts@nlnetlabs.nl>
Date Reported: 2024-06-11
Verified by: Warren Kumari (Ops AD) (IESG)

Section: 5.2

Original Text
-------------
If the TSIG RR cannot be interpreted, the server MUST regard the
message as corrupt and return a FORMERR to the server.

Corrected Text
--------------
If the TSIG RR cannot be interpreted, the server MUST regard the
message as corrupt and return a FORMERR to the client.

Notes
-----
Server send an error to the client, not to itself.

--------------------------------------
RFC8945 (draft-ietf-dnsop-rfc2845bis-09)
--------------------------------------
Title               : Secret Key Transaction Authentication for DNS (TSIG)
Publication Date    : November 2020
Author(s)           : F. Dupont, S. Morris, P. Vixie, D. Eastlake 3rd, O. Gudmundsson, B. Wellington
Category            : INTERNET STANDARD
Source              : Domain Name System Operations
Stream              : IETF
Verifying Party     : IESG