[websec] [Errata Verified] RFC7469 (4658)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 08 April 2016 11:34 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28FD712D6B3; Fri, 8 Apr 2016 04:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.912
X-Spam-Level:
X-Spam-Status: No, score=-106.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KZSXZfdnunkc; Fri, 8 Apr 2016 04:34:50 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93F7C12D550; Fri, 8 Apr 2016 04:34:50 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id B0416180094; Fri, 8 Apr 2016 04:33:51 -0700 (PDT)
To: block.rxckin.beats@gmail.com, cevans@google.com, palmer@google.com, sleevi@google.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Message-Id: <20160408113351.B0416180094@rfc-editor.org>
Date: Fri, 08 Apr 2016 04:33:51 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/websec/b2ezRlUlo9tqA17RLbHp0kLi13k>
Cc: barryleiba@computer.org, websec@ietf.org, iesg@ietf.org, rfc-editor@rfc-editor.org
Subject: [websec] [Errata Verified] RFC7469 (4658)
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/websec/>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Apr 2016 11:34:52 -0000

The following errata report has been verified for RFC7469,
"Public Key Pinning Extension for HTTP". 

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=7469&eid=4658

--------------------------------------
Status: Verified
Type: Editorial

Reported by: Jxck <block.rxckin.beats@gmail.com>
Date Reported: 2016-04-08
Verified by: Barry Leiba (IESG)

Section: 3.  Reporting Pin Validation Failure

Original Text
-------------
  {
    "date-time": "2014-04-06T13:00:50Z",
    "hostname": "www.example.com",
    "port": 443,
    "effective-expiration-date": "2014-05-01T12:40:50Z"


Corrected Text
--------------
  {
    "date-time": "2014-04-06T13:00:50Z",
    "hostname": "www.example.com",
    "port": 443,
    "effective-expiration-date": "2014-05-01T12:40:50Z",
 

Notes
-----
Missing comma after "effective-expiration-date": "2014-05-01T12:40:50Z" in JSON at              Figure 8: Pin Validation Failure Report Example

--------------------------------------
RFC7469 (draft-ietf-websec-key-pinning-21)
--------------------------------------
Title               : Public Key Pinning Extension for HTTP
Publication Date    : April 2015
Author(s)           : C. Evans, C. Palmer, R. Sleevi
Category            : PROPOSED STANDARD
Source              : Web Security
Area                : Applications
Stream              : IETF
Verifying Party     : IESG