The following errata report has been verified for RFC8945, "Secret Key Transaction Authentication for DNS (TSIG)".
-------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7983 -------------------------------------- Status: Verified Type: Editorial Reported by: Terts Diepraam <te...@nlnetlabs.nl> Date Reported: 2024-06-11 Verified by: Warren Kumari (Ops AD) (IESG) Section: 5.2 Original Text ------------- If the TSIG RR cannot be interpreted, the server MUST regard the message as corrupt and return a FORMERR to the server. Corrected Text -------------- If the TSIG RR cannot be interpreted, the server MUST regard the message as corrupt and return a FORMERR to the client. Notes ----- Server send an error to the client, not to itself. -------------------------------------- RFC8945 (draft-ietf-dnsop-rfc2845bis-09) -------------------------------------- Title : Secret Key Transaction Authentication for DNS (TSIG) Publication Date : November 2020 Author(s) : F. Dupont, S. Morris, P. Vixie, D. Eastlake 3rd, O. Gudmundsson, B. Wellington Category : INTERNET STANDARD Source : Domain Name System Operations Stream : IETF Verifying Party : IESG _______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org