The following errata report has been submitted for RFC8945, "Secret Key Transaction Authentication for DNS (TSIG)".
-------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7983 -------------------------------------- Type: Editorial Reported by: Terts Diepraam <te...@nlnetlabs.nl> Section: 5.2 Original Text ------------- If the TSIG RR cannot be interpreted, the server MUST regard the message as corrupt and return a FORMERR to the server. Corrected Text -------------- If the TSIG RR cannot be interpreted, the server MUST regard the message as corrupt and return a FORMERR to the client. Notes ----- Server send an error to the client, not to itself. Instructions: ------------- This erratum is currently posted as "Reported". (If it is spam, it will be removed shortly by the RFC Production Center.) Please use "Reply All" to discuss whether it should be verified or rejected. When a decision is reached, the verifying party will log in to change the status and edit the report, if necessary. -------------------------------------- RFC8945 (draft-ietf-dnsop-rfc2845bis-09) -------------------------------------- Title : Secret Key Transaction Authentication for DNS (TSIG) Publication Date : November 2020 Author(s) : F. Dupont, S. Morris, P. Vixie, D. Eastlake 3rd, O. Gudmundsson, B. Wellington Category : INTERNET STANDARD Source : Domain Name System Operations Stream : IETF Verifying Party : IESG _______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org