[Ohai] [Technical Errata Reported] RFC9458 (7781)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 25 January 2024 02:47 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: ohai@ietfa.amsl.com
Delivered-To: ohai@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25E74C14F6F7 for <ohai@ietfa.amsl.com>; Wed, 24 Jan 2024 18:47:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.658
X-Spam-Level:
X-Spam-Status: No, score=-6.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1yiK__KbsDmh for <ohai@ietfa.amsl.com>; Wed, 24 Jan 2024 18:47:19 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 512BFC14F60F for <ohai@ietf.org>; Wed, 24 Jan 2024 18:47:19 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 1F596E7C65; Wed, 24 Jan 2024 18:47:19 -0800 (PST)
To: mt@lowentropy.net, caw@heapingbits.net, rdd@cert.org, paul.wouters@aiven.io, rlb@ipv.sx, shivankaulsahib@gmail.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: d@ngould.dev, ohai@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240125024719.1F596E7C65@rfcpa.amsl.com>
Date: Wed, 24 Jan 2024 18:47:19 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/ohai/Xm_Aq9gX2kBxIkI6MQZXtDfmU-0>
Subject: [Ohai] [Technical Errata Reported] RFC9458 (7781)
X-BeenThere: ohai@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Oblivious HTTP Application Intermediation <ohai.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ohai>, <mailto:ohai-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ohai/>
List-Post: <mailto:ohai@ietf.org>
List-Help: <mailto:ohai-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ohai>, <mailto:ohai-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jan 2024 02:47:23 -0000

The following errata report has been submitted for RFC9458,
"Oblivious HTTP".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7781

--------------------------------------
Type: Technical
Reported by: Dan Gould <d@ngould.dev>

Section: Appendix A

Original Text
-------------
   The AEAD Seal() function is then used to encrypt the response, which
   is added to the randomized nonce value to produce the Encapsulated
   Response:

   c789e7151fcba46158ca84b04464910d86f9013e404feea014e7be4a441f234f
   857fbd

   The Oblivious Gateway Resource constructs a response with the same
   content:

   HTTP/1.1 200 OK
   Date: Wed, 27 Jan 2021 04:45:07 GMT
   Cache-Control: private, no-store
   Content-Type: message/ohttp-res
   Content-Length: 38

   <content is the Encapsulated Response>

Corrected Text
--------------
   The AEAD Seal() function is then used to encrypt the response, which
   is added to the randomized nonce value to produce the Encapsulated
   Response:

   c789e7151fcba46158ca84b04464910d86f9013e404feea014e7be4a441f234f
   857fbd

   The Oblivious Gateway Resource constructs a response with the same
   content:

   HTTP/1.1 200 OK
   Date: Wed, 27 Jan 2021 04:45:07 GMT
   Cache-Control: private, no-store
   Content-Type: message/ohttp-res
   Content-Length: 35

   <content is the Encapsulated Response>

Notes
-----
The Content-Length header in the example response is set to 38 while the given Encapsulated Response (c789e7151fcba46158ca84b04464910d86f9013e404feea014e7be4a441f234f
857fbd) has a length of 35

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC9458 (draft-ietf-ohai-ohttp-10)
--------------------------------------
Title               : Oblivious HTTP
Publication Date    : January 2024
Author(s)           : M. Thomson, C. A. Wood
Category            : PROPOSED STANDARD
Source              : Oblivious HTTP Application Intermediation
Area                : Security
Stream              : IETF
Verifying Party     : IESG