[smime] [Editorial Errata Reported] RFC2631 (7761)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 12 January 2024 17:42 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: smime@ietfa.amsl.com
Delivered-To: smime@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69D2AC14F6E8 for <smime@ietfa.amsl.com>; Fri, 12 Jan 2024 09:42:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.658
X-Spam-Level:
X-Spam-Status: No, score=-1.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R8Ks_oMgO9f5 for <smime@ietfa.amsl.com>; Fri, 12 Jan 2024 09:42:17 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B28FC14F68C for <smime@ietf.org>; Fri, 12 Jan 2024 09:42:17 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 8BA951B65DCD; Fri, 12 Jan 2024 09:42:17 -0800 (PST)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: housley@vigilsec.com, ekr@rtfm.com, smime@ietf.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240112174217.8BA951B65DCD@rfcpa.amsl.com>
Date: Fri, 12 Jan 2024 09:42:17 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/smime/Gpia57IjSUN5vQaeb5UEM2WMHI8>
Subject: [smime] [Editorial Errata Reported] RFC2631 (7761)
X-BeenThere: smime@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: SMIME Working Group <smime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/smime>, <mailto:smime-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/smime/>
List-Post: <mailto:smime@ietf.org>
List-Help: <mailto:smime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smime>, <mailto:smime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jan 2024 17:42:21 -0000

The following errata report has been submitted for RFC2631,
"Diffie-Hellman Key Agreement Method".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7761

--------------------------------------
Type: Editorial
Reported by: Russ Housley <housley@vigilsec.com>

Section: 2.2.1.1

Original Text
-------------
   6. If p > 2^(L-1) use a robust primality test to test whether p is
      prime. Else go to 18.

Corrected Text
--------------
   16. If p > 2^(L-1) use a robust primality test to test whether p is
       prime. Else go to 18.

Notes
-----
This should be numbered as step 16, not step 6.

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC2631 (draft-ietf-smime-x942-07)
--------------------------------------
Title               : Diffie-Hellman Key Agreement Method
Publication Date    : June 1999
Author(s)           : E. Rescorla
Category            : PROPOSED STANDARD
Source              : S/MIME Mail Security
Area                : Security
Stream              : IETF
Verifying Party     : IESG