[Sidrops] [Technical Errata Reported] RFC9286 (7118)

RFC Errata System <rfc-editor@rfc-editor.org> Sat, 03 September 2022 17:08 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 744DDC14F73F for <sidrops@ietfa.amsl.com>; Sat, 3 Sep 2022 10:08:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.658
X-Spam-Level:
X-Spam-Status: No, score=-1.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MA-slv3rsss7 for <sidrops@ietfa.amsl.com>; Sat, 3 Sep 2022 10:08:54 -0700 (PDT)
Received: from rfcpa.amsl.com (rfc-editor.org [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE489C14F74B for <sidrops@ietf.org>; Sat, 3 Sep 2022 10:08:54 -0700 (PDT)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id A7AB6877CA; Sat, 3 Sep 2022 10:08:54 -0700 (PDT)
To: sra@hactrn.net, gih@apnic.net, kent@alum.mit.edu, mlepinski@ncf.edu, warren@kumari.net, rwilton@cisco.com, keyur@arrcus.com, morrowc@ops-netman.net
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: job@fastly.com, sidrops@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20220903170854.A7AB6877CA@rfcpa.amsl.com>
Date: Sat, 03 Sep 2022 10:08:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/I758iDAi2qUzoZ-_efAw5v66TxI>
X-Mailman-Approved-At: Sun, 04 Sep 2022 13:22:02 -0700
Subject: [Sidrops] [Technical Errata Reported] RFC9286 (7118)
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Sep 2022 17:08:59 -0000

The following errata report has been submitted for RFC9286,
"Manifests for the Resource Public Key Infrastructure (RPKI)".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7118

--------------------------------------
Type: Technical
Reported by: Job Snijders <job@fastly.com>

Section: Appendix A

Original Text
-------------
fileList           SEQUENCE SIZE (0..MAX) OF FileAndHash

Corrected Text
--------------
fileList           SEQUENCE SIZE (1..MAX) OF FileAndHash

Notes
-----
Section 7 specifies " A CA's manifest will always contain at least one entry"; therefor, a fileList sequence of size 0 is invalid.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC9286 (draft-ietf-sidrops-6486bis-11)
--------------------------------------
Title               : Manifests for the Resource Public Key Infrastructure (RPKI)
Publication Date    : June 2022
Author(s)           : R. Austein, G. Huston, S. Kent, M. Lepinski
Category            : PROPOSED STANDARD
Source              : SIDR Operations
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG