[OAUTH-WG] [Editorial Errata Reported] RFC7591 (6619)

RFC Errata System <rfc-editor@rfc-editor.org> Tue, 22 June 2021 18:47 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C3AA3A128B for <oauth@ietfa.amsl.com>; Tue, 22 Jun 2021 11:47:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.202
X-Spam-Level:
X-Spam-Status: No, score=-3.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CTE_8BIT_MISMATCH=0.998, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BprZeBQ3mdub for <oauth@ietfa.amsl.com>; Tue, 22 Jun 2021 11:47:34 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 324BB3A128C for <oauth@ietf.org>; Tue, 22 Jun 2021 11:47:31 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id BFAFDF40817; Tue, 22 Jun 2021 11:47:26 -0700 (PDT)
To: ietf@justin.richer.org, mbj@microsoft.com, ve7jtb@ve7jtb.com, maciej.machulak@gmail.com, phil.hunt@yahoo.com, rdd@cert.org, kaduk@mit.edu, Hannes.Tschofenig@gmx.net, rifaat.s.ietf@gmail.com
X-PHP-Originating-Script: 1005:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: disaacs@surveymonkey.com, oauth@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20210622184726.BFAFDF40817@rfc-editor.org>
Date: Tue, 22 Jun 2021 11:47:26 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/0ylPWM74_k3YxJvmW2Bt9nlE1v8>
Subject: [OAUTH-WG] [Editorial Errata Reported] RFC7591 (6619)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Jun 2021 18:47:39 -0000

The following errata report has been submitted for RFC7591,
"OAuth 2.0 Dynamic Client Registration Protocol".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid6619

--------------------------------------
Type: Editorial
Reported by: Dave Isaacs <disaacs@surveymonkey.com>

Section: 2

Original Text
-------------
token_endpoint_auth_method
      String indicator of the requested authentication method for the
      token endpoint.  Values defined by this specification are:

      *  "none": The client is a public client as defined in OAuth 2.0,
         Section 2.1, and does not have a client secret.

      *  "client_secret_post": The client uses the HTTP POST parameters
         as defined in OAuth 2.0, Section 2.3.1.

      *  "client_secret_basic": The client uses HTTP Basic as defined in
         OAuth 2.0, Section 2.3.1.

Corrected Text
--------------
Text unchanged. It is the links that are incorrect.

Notes
-----
The links that are present in each bullet—to Section 2.1, and to Section 2.3.1 (twice)—link internally to the current RFC (RFC 7591) when they are supposed to link to the OAuth 2.0 RFC (RFC 6749).

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC7591 (draft-ietf-oauth-dyn-reg-30)
--------------------------------------
Title               : OAuth 2.0 Dynamic Client Registration Protocol
Publication Date    : July 2015
Author(s)           : J. Richer, Ed., M. Jones, J. Bradley, M. Machulak, P. Hunt
Category            : PROPOSED STANDARD
Source              : Web Authorization Protocol
Area                : Security
Stream              : IETF
Verifying Party     : IESG