[pkix] [Errata Held for Document Update] RFC6844 (5452)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 30 November 2018 19:42 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B4C1130FEE; Fri, 30 Nov 2018 11:42:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Px5caTPpI_Zo; Fri, 30 Nov 2018 11:42:44 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D72013101F; Fri, 30 Nov 2018 11:42:44 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 57B10B800F7; Fri, 30 Nov 2018 11:42:40 -0800 (PST)
To: rsalz@akamai.com, philliph@comodo.com, rob.stradling@comodo.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: ekr@rtfm.com, iesg@ietf.org, pkix@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20181130194240.57B10B800F7@rfc-editor.org>
Date: Fri, 30 Nov 2018 11:42:40 -0800 (PST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/4nJVy_QVsPypLHxiGqoIraeU3gA>
Subject: [pkix] [Errata Held for Document Update] RFC6844 (5452)
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Nov 2018 19:42:50 -0000

The following errata report has been held for document update 
for RFC6844, "DNS Certification Authority Authorization (CAA) Resource Record". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata/eid5452

--------------------------------------
Status: Held for Document Update
Type: Technical

Reported by: Rich Salz <rsalz@akamai.com>;
Date Reported: 2018-08-06
Held by: EKR (IESG)

Section: GLOBAL

Original Text
-------------
The EBNF (scattered throughout the document) does not match the examples
nor the prose. It is also ambiguous in places (allowing two different
interpretations of a parameter list), and nonsensical in others (such
as the handling of whitespace).

Corrected Text
--------------
The EBNF should be corrected as follows:

issuevalue = *WSP [domain *WSP] [";" *WSP [parameters *WSP]]

domain = label *("." label)
label = (ALPHA / DIGIT) *( *("-") (ALPHA / DIGIT))

parameters = (parameter *WSP ";" *WSP parameters) / parameter
parameter = tag *WSP "=" *WSP value
tag = (ALPHA / DIGIT) *(ALPHA / DIGIT)
value = *(%x21-3A / %x3C-7E)


Notes
-----
[EBNF, text, examples do not match.]

I am proposing this on behalf of the IETF ACME WG. We want to submit a standards-track document, but the current CAA specification is broken. We know it is being revised, but we do not want to wait.  Our AD has said to submit the errata and he will accept it.

--------------------------------------
RFC6844 (draft-ietf-pkix-caa-15)
--------------------------------------
Title               : DNS Certification Authority Authorization (CAA) Resource Record
Publication Date    : January 2013
Author(s)           : P. Hallam-Baker, R. Stradling
Category            : PROPOSED STANDARD
Source              : Public-Key Infrastructure (X.509)
Area                : Security
Stream              : IETF
Verifying Party     : IESG