[netconf] [Errata Rejected] RFC8572 (7223)

RFC Errata System <rfc-editor@rfc-editor.org> Wed, 02 November 2022 11:40 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A54A2C14CE34; Wed, 2 Nov 2022 04:40:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.659
X-Spam-Level:
X-Spam-Status: No, score=-6.659 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CyUqIFs_m7F6; Wed, 2 Nov 2022 04:40:10 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDAF6C14F742; Wed, 2 Nov 2022 04:40:10 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id B3FFD19E1CE0; Wed, 2 Nov 2022 04:40:10 -0700 (PDT)
To: nmalykh@ieee.org, kent+ietf@watsen.net, ian.farrer@telekom.de, mikael.abrahamsson@t-systems.se
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: rwilton@cisco.com, iesg@ietf.org, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20221102114010.B3FFD19E1CE0@rfcpa.amsl.com>
Date: Wed, 02 Nov 2022 04:40:10 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/aCFeRHVABAPnKiCvQ_RKRc4wJ1k>
Subject: [netconf] [Errata Rejected] RFC8572 (7223)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2022 11:40:14 -0000

The following errata report has been rejected for RFC8572,
"Secure Zero Touch Provisioning (SZTP)".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7223

--------------------------------------
Status: Rejected
Type: Technical

Reported by: Nikolai Malykh <nmalykh@ieee.org>
Date Reported: 2022-11-01
Rejected by: Rob Wilton (IESG)

Section: 5.2

Original Text
-------------
    4.  Loop back to Step 1


Corrected Text
--------------
    4.  Loop back to Step 2


Notes
-----
There is no need to repeat step 1.
 --VERIFIER NOTES-- 
As per Kent's (the author) clarification:

Per the note beneath the diagram and the last paragraph in that section (Section 5.2), alternate config mechanisms MAY be used and they SHOULD unset the "flag enabling SZTP bootstrapping", which is what Step 1 tests.

--------------------------------------
RFC8572 (draft-ietf-netconf-zerotouch-29)
--------------------------------------
Title               : Secure Zero Touch Provisioning (SZTP)
Publication Date    : April 2019
Author(s)           : K. Watsen, I. Farrer, M. Abrahamsson
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG