[Lsr] [Editorial Errata Reported] RFC4576 (7765)

RFC Errata System <rfc-editor@rfc-editor.org> Mon, 15 January 2024 18:12 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05D58C151996 for <lsr@ietfa.amsl.com>; Mon, 15 Jan 2024 10:12:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.659
X-Spam-Level:
X-Spam-Status: No, score=-1.659 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mpq67XXJqRlT for <lsr@ietfa.amsl.com>; Mon, 15 Jan 2024 10:12:54 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37067C151992 for <lsr@ietf.org>; Mon, 15 Jan 2024 10:12:54 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id F23CCB3B03; Mon, 15 Jan 2024 10:12:53 -0800 (PST)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: julesreid@gmail.com, erosen@cisco.com, ppsenak@cisco.com, ppe@cisco.com, lsr@ietf.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240115181253.F23CCB3B03@rfcpa.amsl.com>
Date: Mon, 15 Jan 2024 10:12:53 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/xnm-ACADftgxShlVJhaBYXLFDKo>
Subject: [Lsr] [Editorial Errata Reported] RFC4576 (7765)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jan 2024 18:12:58 -0000

The following errata report has been submitted for RFC4576,
"Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual Private Networks (VPNs)".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7765

--------------------------------------
Type: Editorial
Reported by: Julian Cowley <julesreid@gmail.com>

Section: 7

Original Text
-------------
   [OSPFv2]   Postel, J., "Suggested Telnet Protocol Changes", RFC 328,
              April 1972.

Corrected Text
--------------
   [OSPFv2]   Moy, J., "OSPF Version 2", RFC 2328, April 1998.

Notes
-----
The error was caused by a missing 2 in front of the RFC number in the reference.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC4576 (draft-ietf-ospf-2547-dnbit-04)
--------------------------------------
Title               : Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual Private Networks (VPNs)
Publication Date    : June 2006
Author(s)           : E. Rosen, P. Psenak, P. Pillay-Esnault
Category            : PROPOSED STANDARD
Source              : Open Shortest Path First IGP
Area                : Routing
Stream              : IETF
Verifying Party     : IESG