[tcpm] [Editorial Errata Reported] RFC7413 (8013)
RFC Errata System <rfc-editor@rfc-editor.org> Tue, 02 July 2024 09:55 UTC
Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: tcpm@ietf.org
Delivered-To: tcpm@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8670CC151062; Tue, 2 Jul 2024 02:55:31 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id B48FE7FA60; Tue, 2 Jul 2024 02:55:30 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240702095530.B48FE7FA60@rfcpa.rfc-editor.org>
Date: Tue, 02 Jul 2024 02:55:30 -0700
Message-ID-Hash: 624ML5B6CMYNTIBW74QU7PG4RC6FVWFZ
X-Message-ID-Hash: 624ML5B6CMYNTIBW74QU7PG4RC6FVWFZ
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: bart@bedrijfzondernaam.nl, hkchu@google.com, arvind@google.com, tcpm@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tcpm] [Editorial Errata Reported] RFC7413 (8013)
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/zZEc4T3_s5b_i1kwuIvJPPGlrts>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>
The following errata report has been submitted for RFC7413, "TCP Fast Open". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid8013 -------------------------------------- Type: Editorial Reported by: Bart Overkamp <bart@bedrijfzondernaam.nl> Section: 4.2 Original Text ------------- PendingFastOpenRequests: tracks the number of TFO connections in SYN- RCVD state. If this variable goes over a preset system limit, the server MUST disable TFO for all new connection requests until PendingFastOpenRequests drops below the system limit. This variable is used for defending some vulnerabilities discussed in the "Security Considerations" section (Section 5). Corrected Text -------------- PendingFastOpenRequests: tracks the number of TFO connections in SYN- RCVD state. If this variable goes over a preset system limit, the server MUST disable TFO for all new connection requests until PendingFastOpenRequests drops below the system limit. This variable is used for defending against some vulnerabilities discussed in the "Security Considerations" section (Section 5). Notes ----- The original text seems to suggest defending (the existence of) some vulnerabilities Instructions: ------------- This erratum is currently posted as "Reported". (If it is spam, it will be removed shortly by the RFC Production Center.) Please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party will log in to change the status and edit the report, if necessary. -------------------------------------- RFC7413 (draft-ietf-tcpm-fastopen-10) -------------------------------------- Title : TCP Fast Open Publication Date : December 2014 Author(s) : Y. Cheng, J. Chu, S. Radhakrishnan, A. Jain Category : EXPERIMENTAL Source : TCP Maintenance and Minor Extensions Stream : IETF Verifying Party : IESG
- [tcpm] [Editorial Errata Reported] RFC7413 (8013) RFC Errata System