Re: [OPSAWG] [Technical Errata Reported] RFC3413 (7694)

"Rob Wilton (rwilton)" <rwilton@cisco.com> Thu, 02 November 2023 16:06 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC38AC151539 for <opsawg@ietfa.amsl.com>; Thu, 2 Nov 2023 09:06:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.503
X-Spam-Level:
X-Spam-Status: No, score=-9.503 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, TRACKER_ID=0.1, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="gJCoODQL"; dkim=pass (1024-bit key) header.d=cisco.com header.b="Va4T/Zui"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kR9-7LFT_Puj for <opsawg@ietfa.amsl.com>; Thu, 2 Nov 2023 09:06:32 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B42D6C151531 for <opsawg@ietf.org>; Thu, 2 Nov 2023 09:06:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=58604; q=dns/txt; s=iport; t=1698941192; x=1700150792; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=YAum3qLJAtUKhPVKJmSnrH18A7GtlpQhINgQ/bb7PEE=; b=gJCoODQLFf6enMJbd21Ke80ttZOlIGANjOMSzllofMx+xbxalSAJmexG oG7irRYr9KLfKovygLo7Kk2pZa/uAmcGh8X5ZpXko8SRQhUXaUO8HpZpM sg42yhTNH2BCh7MNCzbe5z6ZUz46//45YbpYS/+QQRjardS+AMQay/7DS U=;
X-CSE-ConnectionGUID: auIX8yKeQQSiRK/UxjbNeA==
X-CSE-MsgGUID: AuxurgrWRQaOwf0XjbMd2A==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:XpuzZRJ7AyABz4EhVtmcuaoyDhhOgF28FhQe5pxijKpBbeH/uZ/jJ 0fYo/5qiQyBUYba7qdcgvHN++D7WGMG6Iqcqn1KbpFWVhEEhMlX1wwtCcKIEwv6edbhbjcxG 4JJU1o2t2qjPx1tEd3lL0bXvmX06DcTHhvlMg8gPPv0HpLViey81vu5/NvYZAAbzDa4aKl5e Q2/th6Z9tFDmJZrMK831hrPrzNEev8Dw2RuKBPbk0P359y7+9ho9CE4hg==
IronPort-Data: A9a23:xXBcGqBwlXNjxBVW/yLjw5YqxClBgxIJ4kV8jS/XYbTApGsh0TJRy 2RNXziEaPqPa2X1Ltt2YIuy808GsZDRyNNmOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hWGthh fuo+5eEYQb9gWYpWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAl3IIx2qK7kLEGGis2p7Ar7Y3nm5fhHWRRe0Y0woo6bAElU/ vAebTsKdB3G3KS9wamwTa9ngcFLwMvDZdxE/Co/i2CCS697HfgvQI2SjTNc9C0vh8RSGvD2b MsCYj0pZxPFC/FKEg5HVc5uzbj32xETdRVxtUKIv6Ut3FLqxStu3uDdMtDwdoajEJA9ckGw/ zKaoDuR7gshHNuH0jOa/Vqti/PB2yThV+ov+KaQ7PVmhhiYwXYeTUZQXlqgqv7/gUm7Mz5CF 6AK0iMzjJhi5W+md+DGXieb50OUvBQ6VvMFRoXW9zqx4qbT5g+YAE0NQThAdMEquacKqdoCi AfhczTBWGwHjVGFdZ6O3uzL8m7qaED5OUdHNHBUF1JUizX2iNhr1kqnczp1LEKiYjTI9dzY2 TuGqm01gK8eyJVN3KSg9leBiDWpznQocuLXzluONo5GxlokDGJAW2BOwQOLhRqnBN3JJmRtR FBex6CjABkmVPlhbhClTuQXB62O7P2YKjDailMHN8B/pmT9pSX/Id8JuGkWyKJV3iAsJ2aBj Kj75FI52XOvFCfCgVJfOtjoUJ16kcAM6/y8BquNBjaxXnSBXFbXoH4xDaJh92vsi0Mr2bouI ouWdN3EMJrpIfoP8dZCfM9EieVD7nlnnQv7HMmnpzz5iuD2TCDOFt843K6mM7pRAFWs+luFq r6y9qKiln1ibQEJSnOPod9MfA5QcCdT6FKfg5U/S9Nv6zFOQQkJI/TQ2rgmPYdimsxoei3gp RlRhmcwJILDuED6
IronPort-HdrOrdr: A9a23:f8TVS64+96UaFl6wBgPXwYCCI+orL9Y04lQ7vn2ZFiYlEfBwxv rPoB1E737JYW4qKQ8dcLC7VJVoMkmshKKdgLNhcYtKOTOW2ldAQ7sSl7cKrweQfBEWs9Qtqp uIEJIOR+EYb2IK8PoSiTPQe71Psbz3lJxAx92us0uFJjsaEp2Imj0JcTpzZXcGPDWua6BJcq a0145snRblU3IRaciwG3kCWMb+h/CjrvjbSC9DLSQKrC2Vgx2VyJOSKXWlNxElPA9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDLNbksLlVFhzcziKTIKhxUbyLuz445Mu17kwxrd XKqxA8e+xu9nLqeH2vqxeF4Xih7N9u0Q6g9baruwqnnSXLfkN/NyOHv/MfTvLt0TtjgDi76t MM44vWjesPMfqKplWM2zGBbWAYqqPzmwttrQbW5EYvCrf3r9Rq3NQi1VIQH5EaEC3g7oc7VO FoEcHH/f5TNUiXdnbDowBUsZeRt1kIb167q3I5y4So+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+ CBNqhzjrlBQsIfcKo4XY46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZ yEWlJFsmw5fV7oFKS1rdd22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRoPiQaYY fFBHt7OY6WEYK1I/c64+TXYegmFUUj
X-Talos-CUID: 9a23:Ujo2zG/KPYtvNxyeULCVv0cJO/B1Y17Q9U7rInWbTlt5SrezRHbFrQ==
X-Talos-MUID: 9a23:vbR7pQnuxuDLrJKtIMJDdnpLKdd1+au0N3o0mLIZtZG0NyZVN2202WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Nov 2023 16:06:31 +0000
Received: from rcdn-opgw-4.cisco.com (rcdn-opgw-4.cisco.com [72.163.7.165]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 3A2G6VFM025360 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <opsawg@ietf.org>; Thu, 2 Nov 2023 16:06:31 GMT
X-CSE-ConnectionGUID: VmGGRJasT8mpnkSlHNOI8w==
X-CSE-MsgGUID: oo6aymVrTxiStndGowre8g==
Authentication-Results: rcdn-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.03,272,1694736000"; d="scan'208,217";a="6542844"
Received: from mail-dm6nam12lp2168.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.168]) by rcdn-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Nov 2023 16:06:31 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FcFfDoN/VM0ETkU3XQMhVwSKGf9YMw2amLMet4kMrzFfy0LHvb9IutUDogtuR3lE1ThU6bm5sqXZJngeJF2cir3y4HF7sDF7wufHyMDzu7ZxKKdZz2N7GTVKZJHbOtvqvKeDECt2C5Y35iFd0zgDsh5JFjm1yGeauNj7Uf0u2WXUkQc5aR4mB5ozRQDmgF05IfOWCkj7YMyHWJYS0rvbEZ4mvcXmYdAb1XWjaYgshOdnMjWxc+8Yns1RWgpKo3c0qiSQ3pzvXTl47cfIHi9vwKkl1h7tjJQRfApIhpYJBU7iKX1jRqKYub3Ez6pwbFKTX0gguJl0mOUUhseB2d2yRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YAum3qLJAtUKhPVKJmSnrH18A7GtlpQhINgQ/bb7PEE=; b=mJrUvrbly3VL6DmkcIFVF2Q5A3WcIuFUB0nZ/w75Z7z2tV5Bjn4GMlg/ymnGCqrMX4pP0YarRPjYpCPdHLyTz8IVnp+pBqkclygWU1n1MvphP1ixvKHCk0/XxB7k7hzv8ub0h/gFhObaE24M9jRL8OgvpHdThUnnhbpCuL85y5GxjLRepsmaOmOdaC3JX3PGIyXNN/ee3ZzLBVfSExB41yC2zXE4A4T2Yu2b43ihGfsNSjuJXUVAGkyxuqbOVf3Mj0L4aGkBreLrrBZr3p7NHkXGpUQldSgSlDxKqB0tlYuw4QIsTu7Af2l+WYm5blU6q76ou3rRaqqayqh5dHlcBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YAum3qLJAtUKhPVKJmSnrH18A7GtlpQhINgQ/bb7PEE=; b=Va4T/ZuieZ3OLi1eHtu6nXPPDROdTl0gBxnB3UtBMwSEkyOMYC4nqnW1/p0uNoxxKkrMXuZFihTkuWPKxiFGzhlTfQ541v3Sqq/JBTKm9pbC0DiD0nDch88ENsk9J6BTtXhA0+V1aJRkUiX5UdEPoHusldskI3+XluUFm+CxTU4=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by DM8PR11MB5640.namprd11.prod.outlook.com (2603:10b6:8:3f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.21; Thu, 2 Nov 2023 16:06:29 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::5554:29ce:b3d:4c44]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::5554:29ce:b3d:4c44%4]) with mapi id 15.20.6954.019; Thu, 2 Nov 2023 16:06:29 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "Nemura, Blake" <BNemura@zebra.com>, "mundy@tislabs.com" <mundy@tislabs.com>, "dbh@enterasys.com" <dbh@enterasys.com>, "opsawg@ietf.org" <opsawg@ietf.org>, Jürgen Schönwälder <jschoenwaelder@constructor.university>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Thread-Topic: [Technical Errata Reported] RFC3413 (7694)
Thread-Index: AQHaDUiGi+8MXohxY02BgcLkpSuG7LBm2BWAgABG8ACAABGI0A==
Date: Thu, 02 Nov 2023 16:06:28 +0000
Message-ID: <BY5PR11MB41966EBA91768FED737FA6E7B5A6A@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <20231102045320.95EA8E7C06@rfcpa.amsl.com> <BY5PR11MB4196E9CF08F526B516CEC5D1B5A6A@BY5PR11MB4196.namprd11.prod.outlook.com> <DM6PR03MB4218C1754EAF38A1FDCFEEF6B9A6A@DM6PR03MB4218.namprd03.prod.outlook.com>
In-Reply-To: <DM6PR03MB4218C1754EAF38A1FDCFEEF6B9A6A@DM6PR03MB4218.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|DM8PR11MB5640:EE_
x-ms-office365-filtering-correlation-id: 9d77f48f-4bf7-49b3-0066-08dbdbbdac5d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(39860400002)(376002)(136003)(366004)(396003)(230922051799003)(230173577357003)(230273577357003)(451199024)(64100799003)(1800799009)(186009)(55016003)(9686003)(26005)(478600001)(7696005)(6506007)(53546011)(71200400001)(66574015)(83380400001)(2906002)(5660300002)(41300700001)(66946007)(110136005)(76116006)(8936002)(966005)(66476007)(66556008)(9326002)(52536014)(316002)(64756008)(66446008)(8676002)(38070700009)(38100700002)(166002)(122000001)(86362001)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB41966EBA91768FED737FA6E7B5A6ABY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9d77f48f-4bf7-49b3-0066-08dbdbbdac5d
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Nov 2023 16:06:28.9615 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oEmVCWgj6j2kn5ABc3OJjiLGZaYkWuq2XbqSjCJ05BXG2QTuQAyH+uuad5f/wN/nL3hBq+ILLoDRVBC+soBKwg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR11MB5640
X-Outbound-SMTP-Client: 72.163.7.165, rcdn-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/gz5rsP5THF22yBzQY3dd0QVJDKw>
Subject: Re: [OPSAWG] [Technical Errata Reported] RFC3413 (7694)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Nov 2023 16:06:37 -0000

Hi Blake,

Thanks for the extra context.  Generally, IETF has a high bar for what it will accept as errata, particularly if it looks like it could have a high impact, and particularly when the RFC in question is now so old, and I generally err on the side of caution!

For me to mark this errata as verified then I need to determine that this is a mistake or omission and that the text that you suggest is what the WG intended and had consensus for at the time when the draft was approved for publication.  If there is doubt or ambiguity then another choice is “hold for document update” which effectively says that this should be considered for a future revision of this RFC, if that occurs.  The third choice is that the errata is rejected, which would occur if the consensus was that the current text is correct.

Regards,
Rob


From: Nemura, Blake <BNemura@zebra.com>
Sent: Thursday, November 2, 2023 2:57 PM
To: Rob Wilton (rwilton) <rwilton@cisco.com>; mundy@tislabs.com; dbh@enterasys.com; opsawg@ietf.org; Jürgen Schönwälder <jschoenwaelder@constructor.university>; Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Subject: RE: [Technical Errata Reported] RFC3413 (7694)

I went through entire STD 62 to try to determine how notInView case is supposed to be handled, and this seemed to me (and my team implementing SNMPv3 in our products), based on the combination of multiple related RFCs referenced, to be the most appropriate and logical choice.

However, the main point of this erratum is just that it is not clear; the notInView error case handling is not defined.

If the authors/experts feel a different error-status or handling is more appropriate, such as to explicitly add it into the otherError case and result in a genErr error-status, that could be okay too. Although that would seem to conflict with RFC3416 4.2.5 (1), and otherwise the only explicit noAccess error-status case is in usmUserOwnAuth/PrivKeyChange descriptions.

Thank you for your consideration of this report.

Best,
Blake

From: Rob Wilton (rwilton) <rwilton@cisco.com<mailto:rwilton@cisco.com>>
Sent: Thursday, November 02, 2023 5:47 AM
To: mundy@tislabs.com<mailto:mundy@tislabs.com>; dbh@enterasys.com<mailto:dbh@enterasys.com>; opsawg@ietf.org<mailto:opsawg@ietf.org>; Jürgen Schönwälder <jschoenwaelder@constructor.university<mailto:jschoenwaelder@constructor.university>>; Randy Presuhn <randy_presuhn@alumni.stanford.edu<mailto:randy_presuhn@alumni.stanford.edu>>
Cc: Nemura, Blake <BNemura@zebra.com<mailto:BNemura@zebra.com>>
Subject: RE: [Technical Errata Reported] RFC3413 (7694)

Hi, I would appreciate input from the authors, and SNMP experts on how they think this errata should be processed please. I've looked at the appropriate sections of the RFC, but it isn't clear to me whether this errata is valid or not and I'm
ZjQcmQRYFpfptBannerStart
External Sender
This message came from outside our organization. Please use caution before acting on the message.
ZjQcmQRYFpfptBannerEnd

Hi,



I would appreciate input from the authors, and SNMP experts on how they think this errata should be processed please.  I've looked at the appropriate sections of the RFC, but it isn't clear to me whether this errata is valid or not and I'm slightly nervous of making what could amount to quite a significant change to the external API.



Regards,

Rob





-----Original Message-----

From: RFC Errata System <rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>>

Sent: Thursday, November 2, 2023 4:53 AM

To: warren@kumari.net<mailto:warren@kumari.net>; Rob Wilton (rwilton) <rwilton@cisco.com<mailto:rwilton@cisco.com>>; mundy@tislabs.com<mailto:mundy@tislabs.com>; dbh@enterasys.com<mailto:dbh@enterasys.com>

Cc: bnemura@zebra.com<mailto:bnemura@zebra.com>; rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>

Subject: [Technical Errata Reported] RFC3413 (7694)



The following errata report has been submitted for RFC3413,

"Simple Network Management Protocol (SNMP) Applications".



--------------------------------------

You may review the report below and at:

https://urldefense.proofpoint.com/v2/url?u=https-3A__www.rfc-2Deditor.org_errata_eid7694&d=DwIGaQ&c=Qwsh1H-X9ypOoLLEcAIltRyC0Dw0FG3Mmyd56ahml5w&r=lPfzzfb7P6JnRX7KHetEnJUQ73Ip0b_Gi7F4Es-CoMM&m=XArDtevwDu4lwoJL71VdxN4YHBEPEAvGTIXqiqw5T7-iSHPtALuezSsr8ZeqYVoH&s=T_Fz_YiP1BwpFqeQ7SJnmPMbef3POGY0UxjzXGRq9Gs&e=



--------------------------------------

Type: Technical

Reported by: Blake Nemura <bnemura@zebra.com<mailto:bnemura@zebra.com>>



Section: 3.2



Original Text

-------------

       - If the isAccessAllowed ASI returns a noSuchView, noAccessEntry,

         or noGroupName error, processing of the management operation is

         halted, a PDU value is constructed using the values from the

         originally received PDU, but replacing the error-status with an

         authorizationError code, and error-index value of 0, and

         control is passed to step (6) below.



       - If the isAccessAllowed ASI returns an otherError, processing of

         the management operation is halted, a different PDU value is

         constructed using the values from the originally received PDU,

         but replacing the error-status with a genError code and the

         error-index with the index of the failed variable binding, and

         control is passed to step (6) below.



Corrected Text

--------------

       - If the isAccessAllowed ASI returns a notInView error for a

         Write-Class viewType (e.g. for a SetRequest-PDU), processing

         of the management operation is halted, a different PDU value is

         constructed using the values from the originally received PDU,

         but replacing the error-status with a noAccess code and the

         error-index with the index of the failed variable binding, and

         control is passed to step (6) below.



       - If the isAccessAllowed ASI returns a noSuchView, noAccessEntry,

         or noGroupName error, processing of the management operation is

         halted, a PDU value is constructed using the values from the

         originally received PDU, but replacing the error-status with an

         authorizationError code, and error-index value of 0, and

         control is passed to step (6) below.



       - If the isAccessAllowed ASI returns an otherError, processing of

         the management operation is halted, a different PDU value is

         constructed using the values from the originally received PDU,

         but replacing the error-status with a genError code and the

         error-index with the index of the failed variable binding, and

         control is passed to step (6) below.



Notes

-----

RFC3415, Section 3, defines 6 distinct errorIndication types for the isAccessAllowed ASI: notInView, noSuchView, noSuchContext, noGroupName, noAccessEntry, and otherError.



Whereas RFC3413 does not define handling of the notInView error. Whereby one might, presumably mistakenly, assume that notInView should be handled as "an otherError". However otherError is a distinct errorIndication for "undefined error" (presumably as a catch-all for possible implementation-level errors), whereas notInView is a defined error.



Additionally, RFC3416, Section 4.2.5, and only for SetRequest-PDU, clearly defines noAccess error-status as the first-priority validation check for "not...in the appropriate MIB view" case:

   (1)   If the variable binding's name specifies an existing or non-

         existent variable to which this request is/would be denied

         access because it is/would not be in the appropriate MIB view,

         then the value of the Response-PDU's error-status field is set

         to "noAccess", and the value of its error-index field is set to

         the index of the failed variable binding.



Instructions:

-------------

This erratum is currently posted as "Reported". (If it is spam, it

will be removed shortly by the RFC Production Center.) Please

use "Reply All" to discuss whether it should be verified or

rejected. When a decision is reached, the verifying party

will log in to change the status and edit the report, if necessary.



--------------------------------------

RFC3413 (draft-ietf-snmpv3-appl-v3-01)

--------------------------------------

Title               : Simple Network Management Protocol (SNMP) Applications

Publication Date    : December 2002

Author(s)           : D. Levi, P. Meyer, B. Stewart

Category            : INTERNET STANDARD

Source              : SNMP Version 3

Area                : Operations and Management

Stream              : IETF

Verifying Party     : IESG

________________________________
- CONFIDENTIAL-

This email and any files transmitted with it are confidential, and may also be legally privileged. If you are not the intended recipient, you may not review, use, copy, or distribute this message. If you receive this email in error, please notify the sender immediately by reply email and then delete this email.