[sidr] [Technical Errata Reported] RFC6487 (3168)

RFC Errata System <rfc-editor@rfc-editor.org> Mon, 26 March 2012 20:42 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A713F21E8116 for <sidr@ietfa.amsl.com>; Mon, 26 Mar 2012 13:42:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.454
X-Spam-Level:
X-Spam-Status: No, score=-102.454 tagged_above=-999 required=5 tests=[AWL=0.146, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6hMiP9C2HtsA for <sidr@ietfa.amsl.com>; Mon, 26 Mar 2012 13:42:56 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1890:123a::1:2f]) by ietfa.amsl.com (Postfix) with ESMTP id 385D521E8101 for <sidr@ietf.org>; Mon, 26 Mar 2012 13:42:56 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 31F0BB1E003; Mon, 26 Mar 2012 13:41:37 -0700 (PDT)
To: gih@apnic.net, ggm@apnic.net, robertl@apnic.net, stbryant@cisco.com, adrian@olddog.co.uk, Sandra.Murphy@sparta.com, morrowc@ops-netman.net
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20120326204137.31F0BB1E003@rfc-editor.org>
Date: Mon, 26 Mar 2012 13:41:37 -0700
Cc: rfc-editor@rfc-editor.org, sidr@ietf.org
Subject: [sidr] [Technical Errata Reported] RFC6487 (3168)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Mar 2012 20:42:56 -0000

The following errata report has been submitted for RFC6487,
"A Profile for X.509 PKIX Resource Certificates".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=6487&eid=3168

--------------------------------------
Type: Technical
Reported by: David Mandelberg <dmandelb@bbn.com>

Section: 4.8

Original Text
-------------
   or non-critical.  A certificate-using system MUST reject the
   certificate if it encounters a critical extension it does not
   recognize; however, a non-critical extension MAY be ignored if it is
   not recognized [RFC5280].

Corrected Text
--------------
   or non-critical.  A certificate-using system MUST reject the
   certificate if it encounters an extension not explicitly mentioned
   in this document.  This is in contrast to RFC 5280 which allows
   non-critical extensions to be ignored.

Notes
-----
Other sections of the same document contradict the original section 4.8:

Section 1:

   Any extensions not explicitly mentioned MUST be absent.  The same
   applies to the CRLs used in the RPKI, that are also profiled in this
   document.

Section 8:

   Certificate Extensions:
         This profile does not permit the use of any other critical or
         non-critical extensions.

Instructions:
-------------
This errata is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party (IESG)
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC6487 (draft-ietf-sidr-res-certs-22)
--------------------------------------
Title               : A Profile for X.509 PKIX Resource Certificates
Publication Date    : February 2012
Author(s)           : G. Huston, G. Michaelson, R. Loomans
Category            : PROPOSED STANDARD
Source              : Secure Inter-Domain Routing
Area                : Routing
Stream              : IETF
Verifying Party     : IESG