The following errata report has been verified for RFC9250, "DNS over Dedicated QUIC Connections".
-------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7883 -------------------------------------- Status: Verified Type: Technical Reported by: Lyra Naeseth <[email protected]> Date Reported: 2024-04-05 Verified by: Eric Vyncke (IESG) Section: 7.5 Original Text ------------- Implementations SHOULD use the mechanisms defined in Section 5.4 to mitigate this attack. Corrected Text -------------- Implementations MUST use the padding mechanisms defined in Section 5.4 to mitigate this attack. Notes ----- Section 5.4 states that "[i]mplementations MUST protect against the traffic analysis attacks described in Section 7.5", but Section 7.5 describes that obligation as a "SHOULD". "MUST" is correct, and the inconsistent "SHOULD" in Section 7.5 is an error. -- Verifier (Eric Vyncke) note -- The short discussion on the DPRIVE WG list has indicated that 2 authors are in favour of verifying this errata. -------------------------------------- RFC9250 (draft-ietf-dprive-dnsoquic-12) -------------------------------------- Title : DNS over Dedicated QUIC Connections Publication Date : May 2022 Author(s) : C. Huitema, S. Dickinson, A. Mankin Category : PROPOSED STANDARD Source : DNS PRIVate Exchange Stream : IETF Verifying Party : IESG _______________________________________________ dns-privacy mailing list [email protected] https://www.ietf.org/mailman/listinfo/dns-privacy
