Re: [netconf] [Errata Verified] RFC8572 (6616)

Chris Smiley <csmiley@amsl.com> Mon, 21 June 2021 20:22 UTC

Return-Path: <csmiley@amsl.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41C993A17D1; Mon, 21 Jun 2021 13:22:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OIdg_2G4Oou0; Mon, 21 Jun 2021 13:22:28 -0700 (PDT)
Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 045DA3A17CC; Mon, 21 Jun 2021 13:22:27 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 84AEE389F00; Mon, 21 Jun 2021 13:22:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2J2Dtq3C7NsP; Mon, 21 Jun 2021 13:22:27 -0700 (PDT)
Received: from [192.168.1.12] (cpe-76-95-228-63.socal.res.rr.com [76.95.228.63]) by c8a.amsl.com (Postfix) with ESMTPSA id 3522B389EFE; Mon, 21 Jun 2021 13:22:27 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Chris Smiley <csmiley@amsl.com>
In-Reply-To: <20210621122110.8D0B5F4075F@rfc-editor.org>
Date: Mon, 21 Jun 2021 13:22:26 -0700
Cc: sramanathan@google.com, RFC Errata System <rfc-editor@rfc-editor.org>, Kent Watsen <kent+ietf@watsen.net>, ian.farrer@telekom.de, mikael.abrahamsson@t-systems.se, IESG <iesg@ietf.org>, netconf@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <FEEE2092-0D90-4125-A696-D829B0ADC63B@amsl.com>
References: <20210621122110.8D0B5F4075F@rfc-editor.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/a1oaXttsWT04FRZPNEYC9SHyRA0>
Subject: Re: [netconf] [Errata Verified] RFC8572 (6616)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jun 2021 20:22:32 -0000

Hi Rob,

The section has been updated from 4.2 to 4.2.3. to match the original errata report and RFC 8572.
Please let me know if you have any objections.

Thank you,
RFC Editor/cs


> On Jun 21, 2021, at 5:21 AM, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been verified for RFC8572,
> "Secure Zero Touch Provisioning (SZTP)". 
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid6616
> 
> --------------------------------------
> Status: Verified
> Type: Editorial
> 
> Reported by: Srihari Ramanathan <sramanathan@google.com>
> Date Reported: 2021-06-18
> Verified by: Rob Wilton (IESG)
> 
> Section: 4.2.
> 
> Original Text
> -------------
>   For device-independent queries, the three bootstrapping artifacts
>   defined in Section 3 are encoded into the SVR records as follows.
> 
>   Artifact to SRV Record Mapping:
> 
>      Conveyed Information:  This artifact is not supported directly.
>         Instead, the essence of unsigned redirect information is mapped
>         to SVR records per [RFC2782].
> 
> Corrected Text
> --------------
>   For device-independent queries, the three bootstrapping artifacts
>   defined in Section 3 are encoded into the SRV records as follows.
> 
>   Artifact to SRV Record Mapping:
> 
>      Conveyed Information:  This artifact is not supported directly.
>         Instead, the essence of unsigned redirect information is mapped
>         to SRV records per [RFC2782].
> 
> Notes
> -----
> In both places "SVR" should obviously read "SRV".
> 
> 
> --------------------------------------
> RFC8572 (draft-ietf-netconf-zerotouch-29)
> --------------------------------------
> Title               : Secure Zero Touch Provisioning (SZTP)
> Publication Date    : April 2019
> Author(s)           : K. Watsen, I. Farrer, M. Abrahamsson
> Category            : PROPOSED STANDARD
> Source              : Network Configuration
> Area                : Operations and Management
> Stream              : IETF
> Verifying Party     : IESG
>