[pkix] [Errata Held for Document Update] RFC6844 (5452)
RFC Errata System <rfc-editor@rfc-editor.org> Fri, 30 November 2018 19:42 UTC
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B4C1130FEE; Fri, 30 Nov 2018 11:42:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Px5caTPpI_Zo; Fri, 30 Nov 2018 11:42:44 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D72013101F; Fri, 30 Nov 2018 11:42:44 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 57B10B800F7; Fri, 30 Nov 2018 11:42:40 -0800 (PST)
To: rsalz@akamai.com, philliph@comodo.com, rob.stradling@comodo.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: ekr@rtfm.com, iesg@ietf.org, pkix@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20181130194240.57B10B800F7@rfc-editor.org>
Date: Fri, 30 Nov 2018 11:42:40 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/4nJVy_QVsPypLHxiGqoIraeU3gA>
Subject: [pkix] [Errata Held for Document Update] RFC6844 (5452)
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Nov 2018 19:42:50 -0000
The following errata report has been held for document update for RFC6844, "DNS Certification Authority Authorization (CAA) Resource Record". -------------------------------------- You may review the report below and at: http://www.rfc-editor.org/errata/eid5452 -------------------------------------- Status: Held for Document Update Type: Technical Reported by: Rich Salz <rsalz@akamai.com> Date Reported: 2018-08-06 Held by: EKR (IESG) Section: GLOBAL Original Text ------------- The EBNF (scattered throughout the document) does not match the examples nor the prose. It is also ambiguous in places (allowing two different interpretations of a parameter list), and nonsensical in others (such as the handling of whitespace). Corrected Text -------------- The EBNF should be corrected as follows: issuevalue = *WSP [domain *WSP] [";" *WSP [parameters *WSP]] domain = label *("." label) label = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT)) parameters = (parameter *WSP ";" *WSP parameters) / parameter parameter = tag *WSP "=" *WSP value tag = (ALPHA / DIGIT) *(ALPHA / DIGIT) value = *(%x21-3A / %x3C-7E) Notes ----- [EBNF, text, examples do not match.] I am proposing this on behalf of the IETF ACME WG. We want to submit a standards-track document, but the current CAA specification is broken. We know it is being revised, but we do not want to wait. Our AD has said to submit the errata and he will accept it. -------------------------------------- RFC6844 (draft-ietf-pkix-caa-15) -------------------------------------- Title : DNS Certification Authority Authorization (CAA) Resource Record Publication Date : January 2013 Author(s) : P. Hallam-Baker, R. Stradling Category : PROPOSED STANDARD Source : Public-Key Infrastructure (X.509) Area : Security Stream : IETF Verifying Party : IESG
- [pkix] [Errata Held for Document Update] RFC6844 … RFC Errata System