The following errata report has been submitted for RFC9250, "DNS over Dedicated QUIC Connections".
-------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7883 -------------------------------------- Type: Technical Reported by: Lyra Naeseth <[email protected]> Section: 7.5 Original Text ------------- Implementations SHOULD use the mechanisms defined in Section 5.4 to mitigate this attack. Corrected Text -------------- Implementations MUST use the padding mechanisms defined in Section 5.4 to mitigate this attack. Notes ----- Section 5.4 states that "[i]mplementations MUST protect against the traffic analysis attacks described in Section 7.5", but Section 7.5 describes that obligation as a "SHOULD". "MUST" is correct, and the inconsistent "SHOULD" in Section 7.5 is an error. Instructions: ------------- This erratum is currently posted as "Reported". (If it is spam, it will be removed shortly by the RFC Production Center.) Please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party will log in to change the status and edit the report, if necessary. -------------------------------------- RFC9250 (draft-ietf-dprive-dnsoquic-12) -------------------------------------- Title : DNS over Dedicated QUIC Connections Publication Date : May 2022 Author(s) : C. Huitema, S. Dickinson, A. Mankin Category : PROPOSED STANDARD Source : DNS PRIVate Exchange Stream : IETF Verifying Party : IESG _______________________________________________ dns-privacy mailing list [email protected] https://www.ietf.org/mailman/listinfo/dns-privacy
