[tcpm] [Editorial Errata Reported] RFC7413 (8013)

RFC Errata System <rfc-editor@rfc-editor.org> Tue, 02 July 2024 09:55 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: tcpm@ietf.org
Delivered-To: tcpm@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8670CC151062; Tue, 2 Jul 2024 02:55:31 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id B48FE7FA60; Tue, 2 Jul 2024 02:55:30 -0700 (PDT)
To: rfc-editor@rfc-editor.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240702095530.B48FE7FA60@rfcpa.rfc-editor.org>
Date: Tue, 02 Jul 2024 02:55:30 -0700
Message-ID-Hash: 624ML5B6CMYNTIBW74QU7PG4RC6FVWFZ
X-Message-ID-Hash: 624ML5B6CMYNTIBW74QU7PG4RC6FVWFZ
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: bart@bedrijfzondernaam.nl, hkchu@google.com, arvind@google.com, tcpm@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tcpm] [Editorial Errata Reported] RFC7413 (8013)
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/zZEc4T3_s5b_i1kwuIvJPPGlrts>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

The following errata report has been submitted for RFC7413,
"TCP Fast Open".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8013

--------------------------------------
Type: Editorial
Reported by: Bart Overkamp <bart@bedrijfzondernaam.nl>

Section: 4.2

Original Text
-------------
   PendingFastOpenRequests: tracks the number of TFO connections in SYN-
      RCVD state.  If this variable goes over a preset system limit, the
      server MUST disable TFO for all new connection requests until
      PendingFastOpenRequests drops below the system limit.  This
      variable is used for defending some vulnerabilities discussed in
      the "Security Considerations" section (Section 5).

Corrected Text
--------------
   PendingFastOpenRequests: tracks the number of TFO connections in SYN-
      RCVD state.  If this variable goes over a preset system limit, the
      server MUST disable TFO for all new connection requests until
      PendingFastOpenRequests drops below the system limit.  This
      variable is used for defending against some vulnerabilities 
      discussed in the "Security Considerations" section (Section 5).

Notes
-----
The original text seems to suggest defending (the existence of) some vulnerabilities

Instructions:
-------------
This erratum is currently posted as "Reported". (If it is spam, it 
will be removed shortly by the RFC Production Center.) Please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
will log in to change the status and edit the report, if necessary.

--------------------------------------
RFC7413 (draft-ietf-tcpm-fastopen-10)
--------------------------------------
Title               : TCP Fast Open
Publication Date    : December 2014
Author(s)           : Y. Cheng, J. Chu, S. Radhakrishnan, A. Jain
Category            : EXPERIMENTAL
Source              : TCP Maintenance and Minor Extensions
Stream              : IETF
Verifying Party     : IESG