The following errata report has been verified for RFC9250,
"DNS over Dedicated QUIC Connections". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7883

--------------------------------------
Status: Verified
Type: Technical

Reported by: Lyra Naeseth <[email protected]>
Date Reported: 2024-04-05
Verified by: Eric Vyncke (IESG)

Section: 7.5

Original Text
-------------
Implementations SHOULD use the mechanisms defined in Section 5.4 to
mitigate this attack.

Corrected Text
--------------
Implementations MUST use the padding mechanisms defined in Section 5.4
to mitigate this attack.

Notes
-----
Section 5.4 states that "[i]mplementations MUST protect against the traffic 
analysis attacks described in Section 7.5", but Section 7.5 describes that 
obligation as a "SHOULD". "MUST" is correct, and the inconsistent "SHOULD" in 
Section 7.5 is an error.

-- Verifier (Eric Vyncke) note --

The short discussion on the DPRIVE WG list has indicated that 2 authors are in 
favour of verifying this errata.

--------------------------------------
RFC9250 (draft-ietf-dprive-dnsoquic-12)
--------------------------------------
Title               : DNS over Dedicated QUIC Connections
Publication Date    : May 2022
Author(s)           : C. Huitema, S. Dickinson, A. Mankin
Category            : PROPOSED STANDARD
Source              : DNS PRIVate Exchange
Stream              : IETF
Verifying Party     : IESG

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to