Re: [OAUTH-WG] [Errata Held for Document Update] RFC6819 (4267)
"Phil Hunt (IDM)" <phil.hunt@oracle.com> Thu, 17 December 2015 14:03 UTC
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF2641B2D0B; Thu, 17 Dec 2015 06:03:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PjLfRYJPIgsv; Thu, 17 Dec 2015 06:03:20 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63B581B2DEC; Thu, 17 Dec 2015 06:03:19 -0800 (PST)
Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id tBHE3DWt030882 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 17 Dec 2015 14:03:14 GMT
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0022.oracle.com (8.13.8/8.13.8) with ESMTP id tBHE3DsE011726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 17 Dec 2015 14:03:13 GMT
Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by userv0121.oracle.com (8.13.8/8.13.8) with ESMTP id tBHE3COJ030456; Thu, 17 Dec 2015 14:03:12 GMT
Received: from [192.168.2.104] (/93.216.71.75) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 17 Dec 2015 06:03:11 -0800
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: "Phil Hunt (IDM)" <phil.hunt@oracle.com>
X-Mailer: iPhone Mail (13C75)
In-Reply-To: <1736001e4c00fa68e6f3b232ec59c4de@lodderstedt.net>
Date: Thu, 17 Dec 2015 15:02:47 +0100
Content-Transfer-Encoding: 7bit
Message-Id: <7F7D33B0-2245-4B21-AE0C-819E9B3BB6EB@oracle.com>
References: <20151208150508.1B4581832BB@rfc-editor.org> <1736001e4c00fa68e6f3b232ec59c4de@lodderstedt.net>
To: torsten@lodderstedt.net
X-Source-IP: aserv0022.oracle.com [141.146.126.234]
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/VbkJoOGd4HkJ6T_b03Xg-E07WaQ>
Cc: david.gladstone@nib.co.nz, iesg@ietf.org, Kathleen.Moriarty@emc.com, oauth@ietf.org, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [OAUTH-WG] [Errata Held for Document Update] RFC6819 (4267)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Dec 2015 14:03:24 -0000
+1 Phil > On Dec 17, 2015, at 15:00, torsten@lodderstedt.net wrote: > > Hi all, > > the report is correct. Please consider it an errata to RFC 6819. > > kind regards, > Torsten. > > Am 08.12.2015 16:05, schrieb RFC Errata System: >> The following errata report has been held for document update >> for RFC6819, "OAuth 2.0 Threat Model and Security Considerations". >> -------------------------------------- >> You may review the report below and at: >> http://www.rfc-editor.org/errata_search.php?rfc=6819&eid=4267 >> -------------------------------------- >> Status: Held for Document Update >> Type: Editorial >> Reported by: David Gladstone <david.gladstone@nib.co.nz> >> Date Reported: 2015-02-09 >> Held by: Kathleen Moriarty (IESG) >> Section: 4.4.1.11 >> Original Text >> ------------- >> If an authorization server includes a nontrivial amount of entropy >> Corrected Text >> -------------- >> If an authorization server includes a trivial amount of entropy >> Notes >> ----- >> The threat being described outlines a scenario where too little >> entropy is involved; countermeasures include using non-trivial amounts >> of entropy. >> -------------------------------------- >> RFC6819 (draft-ietf-oauth-v2-threatmodel-08) >> -------------------------------------- >> Title : OAuth 2.0 Threat Model and Security Considerations >> Publication Date : January 2013 >> Author(s) : T. Lodderstedt, Ed., M. McGloin, P. Hunt >> Category : INFORMATIONAL >> Source : Web Authorization Protocol >> Area : Security >> Stream : IETF >> Verifying Party : IESG
- [OAUTH-WG] [Editorial Errata Reported] RFC6819 (4… RFC Errata System
- Re: [OAUTH-WG] [Editorial Errata Reported] RFC681… Torsten Lodderstedt
- [OAUTH-WG] [Errata Held for Document Update] RFC6… RFC Errata System
- Re: [OAUTH-WG] [Errata Held for Document Update] … torsten
- Re: [OAUTH-WG] [Errata Held for Document Update] … Phil Hunt (IDM)