[Pppext] [Technical Errata Reported] RFC2433 (7742)

RFC Errata System <rfc-editor@rfc-editor.org> Thu, 28 December 2023 18:17 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: pppext@ietfa.amsl.com
Delivered-To: pppext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65900C1654FA for <pppext@ietfa.amsl.com>; Thu, 28 Dec 2023 10:17:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.657
X-Spam-Level:
X-Spam-Status: No, score=-1.657 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SDiwsfc2gh4t for <pppext@ietfa.amsl.com>; Thu, 28 Dec 2023 10:17:55 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3067C151996 for <pppext@ietf.org>; Thu, 28 Dec 2023 10:17:53 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id A6D965C05BA; Thu, 28 Dec 2023 10:17:53 -0800 (PST)
To: glennz@microsoft.com, stevec@microsoft.com, ek.ietf@gmail.com, evyncke@cisco.com, d3e3e3@gmail.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: christophe.deleuze@free.fr, pppext@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20231228181753.A6D965C05BA@rfcpa.amsl.com>
Date: Thu, 28 Dec 2023 10:17:53 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/pppext/YYNYc-zPidHwGPko0UqEIIqpUs8>
Subject: [Pppext] [Technical Errata Reported] RFC2433 (7742)
X-BeenThere: pppext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: PPP Extensions <pppext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pppext>, <mailto:pppext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pppext/>
List-Post: <mailto:pppext@ietf.org>
List-Help: <mailto:pppext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pppext>, <mailto:pppext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Dec 2023 18:17:59 -0000

The following errata report has been submitted for RFC2433,
"Microsoft PPP CHAP Extensions".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7742

--------------------------------------
Type: Technical
Reported by: Christophe Deleuze <christophe.deleuze@free.fr>

Section: GLOBAL

Original Text
-------------
The protocol described here has significant vulnerabilities.  People
planning on implementing or using this protocol should read section
12, "Security Considerations".

Corrected Text
--------------
The protocol described here has significant vulnerabilities.  People
planning on implementing or using this protocol should read section
11, "Security Considerations".

Notes
-----
The section number is incorrect.
This text appears as the "IESG note".

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC2433 (no draft string recorded)
--------------------------------------
Title               : Microsoft PPP CHAP Extensions
Publication Date    : October 1998
Author(s)           : G. Zorn, S. Cobb
Category            : INFORMATIONAL
Source              : Point-to-Point Protocol Extensions
Area                : Internet
Stream              : IETF
Verifying Party     : IESG