Re: [smime] [IANA #1303700] [Errata Verified] RFC2633 (5019)

Paul Wouters <paul.wouters@aiven.io> Mon, 12 February 2024 22:08 UTC

Return-Path: <paul.wouters@aiven.io>
X-Original-To: smime@ietfa.amsl.com
Delivered-To: smime@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED113C15155E for <smime@ietfa.amsl.com>; Mon, 12 Feb 2024 14:08:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=aiven.io
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HTCcFVdcV1fa for <smime@ietfa.amsl.com>; Mon, 12 Feb 2024 14:08:03 -0800 (PST)
Received: from mail-ed1-x52f.google.com (mail-ed1-x52f.google.com [IPv6:2a00:1450:4864:20::52f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4CE62C151522 for <smime@ietf.org>; Mon, 12 Feb 2024 14:08:03 -0800 (PST)
Received: by mail-ed1-x52f.google.com with SMTP id 4fb4d7f45d1cf-560e9c7a094so4912167a12.0 for <smime@ietf.org>; Mon, 12 Feb 2024 14:08:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aiven.io; s=google; t=1707775681; x=1708380481; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=klzhC3QhA+sySuk65Dh2bOKVyC1WIGY8X75eF7tf6Kg=; b=K6Wwx86DpBR4GiYZBpQU9gpEHA8xiiWIVohNVneSYx779kvMFOR2DInfDOX3/Cspv2 mDQI8MOs5bmX4fwti0zbnLd/4PCPUs5BGEwL8lKSa5yzUFFLPTUsXHMA4TXr53eC6E6F 2C/vAUEOPR8FOJvbhDHP1PZDeXEuEKVZk4HnY=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707775681; x=1708380481; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=klzhC3QhA+sySuk65Dh2bOKVyC1WIGY8X75eF7tf6Kg=; b=c8bLjOvKmxEaKk3jvlUGlTaoeoGj4M+ILwY9STGP8KM68KwGQr+GqBHZhq7Xq9d31p DrcOKrO9U+YSQ1YWf3mHfCYFlc8zenOmyVoyRJcFdn8imoZZZE4MXFYPUlqUN+Fcsxsd sZWOraN6VnmQtzwlv3NXUH2xKuiVEAku3m/SzlzOzTszloaVGJiV+/SZx0rkhOLYyFWN si79GVo7wyw9aRsKlvAe1e3etjm88ffejoK/Kjml9YgKDPPi0DaQ/IC7lWEWYy8gRFDh bJGhvByLdXCZ803Kj8PKdvIDdi0PlQfupmc5jRCpZ5DW2WnX4mbGGhwALAIlxgPKesKL 5CgQ==
X-Forwarded-Encrypted: i=1; AJvYcCXCPWesQRKgtq5SBzuWLTKDkGS9bSAXkUxFGKoiUNGMXjYTkvez0rmS5jYJNHgM6YarYgFu2SRTdeaYpVFExw==
X-Gm-Message-State: AOJu0YydW5pGTWFRLCM5qiL3xpIpDt2enEsDVURWU5QCvFRR6IVhqMhn 7YPbY3hc4AB69FM1svHCuJGirxmxxyAipE7wzryTUEaJKYgR1OxdWdnKhu1EntPy3y0ADexnDTt 4a13xwAyHio8R24mKDZTplDXcdy+8V6zackjLyQ==
X-Google-Smtp-Source: AGHT+IGYamiI04hdIhndr2bp4ADIRKmdRv0p8lUNPvHfXbcqncAMyWMu9GM8gxv8k3j8ZfPPPGv3dgpM/ZUUFKpQDMs=
X-Received: by 2002:a17:907:bb96:b0:a3c:8002:3eea with SMTP id xo22-20020a170907bb9600b00a3c80023eeamr3475200ejc.43.1707775681265; Mon, 12 Feb 2024 14:08:01 -0800 (PST)
MIME-Version: 1.0
References: <RT-Ticket-1303700@icann.org> <20240112200812.3D6F31A2161D@rfcpa.amsl.com> <D7CFA801-0335-407E-88B6-ACF2688CDE1A@vigilsec.com> <rt-5.0.3-481535-1707188819-1028.1303700-9-0@icann.org> <19EEF5F7-E9C7-4845-BCB8-1CDC882EDBE3@vigilsec.com>
In-Reply-To: <19EEF5F7-E9C7-4845-BCB8-1CDC882EDBE3@vigilsec.com>
From: Paul Wouters <paul.wouters@aiven.io>
Date: Mon, 12 Feb 2024 17:07:49 -0500
Message-ID: <CAGL5yWbUCC6RaY=y4aGK6_cjikLx+R4dEKHV46__Dqj5iZR5tQ@mail.gmail.com>
To: Russ Housley <housley@vigilsec.com>
Cc: iana-matrix-comment@iana.org, jsoref@gmail.com, IESG <iesg@ietf.org>, IETF SMIME <smime@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d6d3c90611368246"
Archived-At: <https://mailarchive.ietf.org/arch/msg/smime/Xg6G72h_sRlrVOaxyescka6bX2I>
Subject: Re: [smime] [IANA #1303700] [Errata Verified] RFC2633 (5019)
X-BeenThere: smime@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: SMIME Working Group <smime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/smime>, <mailto:smime-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/smime/>
List-Post: <mailto:smime@ietf.org>
List-Help: <mailto:smime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smime>, <mailto:smime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Feb 2024 22:08:08 -0000

I agree with Russ,

If there had been a Notes column, we could have added a note. I guess now
developers will have to ponder the weirdness until they read the errata of
the RFC that is linked to item 11 there.

Paul


On Tue, Feb 6, 2024 at 9:08 AM Russ Housley <housley@vigilsec.com> wrote:

> I do not see any updates needed to the SMI Security for S/MIME Attributes
> (1.2.840.113549.1.9.16.2) registry.
>
> Russ
>
> > On Feb 5, 2024, at 10:06 PM, David Dong via RT <
> iana-matrix-comment@iana.org> wrote:
> >
> > Hi Paul,
> >
> > Following up for this errata; do we need to update the description for
> decimal 11, id-aa-encrypKeyPref, in SMI Security for S/MIME Attributes
> (1.2.840.113549.1.9.16.2)?
> >
> > Thank you.
> >
> > Best regards,
> >
> > David Dong
> > IANA Services Sr. Specialist
> >
> > On Fri Jan 12 20:22:28 2024, housley@vigilsec.com wrote:
> >> I think it would be better to put an ASC.1 comment after the line.
> >> Otherwise, [sic] looks like an undefined ASN.1 tag.
> >>
> >> Russ
> >>
> >>> On Jan 12, 2024, at 3:08 PM, RFC Errata System <rfc-editor@rfc-
> >>> editor.org> wrote:
> >>>
> >>> The following errata report has been verified for RFC2633,
> >>> "S/MIME Version 3 Message Specification".
> >>>
> >>> --------------------------------------
> >>> You may review the report below and at:
> >>> https://www.rfc-editor.org/errata/eid5019
> >>>
> >>> --------------------------------------
> >>> Status: Verified
> >>> Type: Editorial
> >>>
> >>> Reported by: Josh Soref <jsoref@gmail.com>
> >>> Date Reported: 2017-05-14
> >>> Verified by: Paul Wouters (IESG)
> >>>
> >>> Section: 5
> >>>
> >>> Original Text
> >>> -------------
> >>> id-aa-encrypKeyPref OBJECT IDENTIFIER ::= {id-aa 11}
> >>>
> >>>
> >>> Corrected Text
> >>> --------------
> >>> id-aa-encrypKeyPref [sic] OBJECT IDENTIFIER ::= {id-aa 11}
> >>>
> >>> Notes
> >>> -----
> >>> encryp isn't a word, it's a typo. Unfortunately, like http's
> >>> (rfc1945) referer [sic] before it, this is now part of the API.
> >>>
> >>> This error should be highlighted (as rfc2068 does for referer [sic])
> >>> so that people are aware that the natural spelling doesn't apply.
> >>>
> >>> If it's possible for a revised RFC to be published suggesting the
> >>> correct spelling w/ a way for clients/servers to handle the old
> >>> spelling, that would be nice, but based on precedent, that seems
> >>> unlikely.
> >>>
> >>> ---
> >>> Kathleen Moriarty: As AD, this discussion needs to be continued and
> >>> possibly with a different draft.  As such, I am marking this as hold
> >>> for document update and listing it as editorial so that there are no
> >>> n the wire changes at this time with this errata.
> >>> ----
> >>> There was quite a bit of on list discussion that should be reviewed
> >>> for any future changes.
> >>>
> >>> One summary from the discussion:
> >>> he mailing list participants are copied on these errata to get their
> >>> opinion in order to inform the AD how to dispose of the errata.  Most
> >>> folks are just making their opinions known.
> >>>
> >>> 1) The next thing that folks look at is whether it’s technical or
> >>> not.  Debate ensues, but generally technical errata are those that
> >>> affect interoperability.  This one I don’t think does because there
> >>> are no changes to the bits on the wire.
> >>>
> >>> 2) And, well folks want to get lots of changes, but the change has to
> >>> run through the consensus process (back to mailing list input).
> >>>
> >>> So to the import bit:
> >>>
> >>> As I see it, there are two ways to get the note incorporated:
> >>>
> >>> 1. Write a draft that adds the note; this seems a bit heavy weight
> >>> for what you are trying to do.
> >>>
> >>> 2. Apply the note to the latest RFC/draft that obsoletes RFC 2633; I
> >>> guess you went for upstream, but generally the IETF applies changes
> >>> to the latest/greatest RFC/draft.  That obsoletes chain is: RFC 3851
> >>> obsoleted RFC 2633, RFC 3851 was obsoleted by RFC 5751, and draft-
> >>> ietf-lamps-rfc5751-bis is about to obsolete RFC 5751.  Luckily,
> >>> draft-ietf-lamps-rfc5751-bis isn’t yet an RFC so there’s an option to
> >>> have the note added there.
> >>>
> >>> Any objections to adding a note in draft-ietf-lamps-rfc5751-bis along
> >>> the same lines as the note for receipentKeyId?
> >>>
> >>> Paul Wouters (AD): This note made it into RFC 8551, so marking this
> >>> errata Verified to close it
> >>>
> >>> --------------------------------------
> >>> RFC2633 (draft-ietf-smime-msg-08)
> >>> --------------------------------------
> >>> Title               : S/MIME Version 3 Message Specification
> >>> Publication Date    : June 1999
> >>> Author(s)           : B. Ramsdell, Ed.
> >>> Category            : PROPOSED STANDARD
> >>> Source              : S/MIME Mail Security
> >>> Area                : Security
> >>> Stream              : IETF
> >>> Verifying Party     : IESG
> >>>
> >>> _______________________________________________
> >>> smime mailing list
> >>> smime@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/smime
> >
>
>