The following errata report has been submitted for RFC5216,
"The EAP-TLS Authentication Protocol".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid6357

--------------------------------------
Type: Editorial
Reported by: Benjamin Kaduk <ka...@mit.edu>

Section: 5.1

Original Text
-------------
   [3] Section 5 of BCP 86 [RFC3766] offers advice on the required RSA
   or Diffie-Hellman (DH) module and Digital Signature Algorithm (DSA)
   subgroup size in bits, for a given level of attack resistance in
   bits.  For example, a 2048-bit RSA key is recommended to provide
   128-bit equivalent key strength.  The National Institute of Standards
   and Technology (NIST) also offers advice on appropriate key sizes in
   [SP800-57].

Corrected Text
--------------
   [3] Section 5 of BCP 86 [RFC3766] offers advice on the required RSA
   or Diffie-Hellman (DH) modulus and Digital Signature Algorithm (DSA)
   subgroup size in bits, for a given level of attack resistance in
   bits.  For example, a 2048-bit RSA key is recommended to provide
   128-bit equivalent key strength.  The National Institute of Standards
   and Technology (NIST) also offers advice on appropriate key sizes in
   [SP800-57].

Notes
-----
RSA and DH computations are parameterized by their moduli, with singular 
"modulus" (not "module").

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC5216 (draft-simon-emu-rfc2716bis-13)
--------------------------------------
Title               : The EAP-TLS Authentication Protocol
Publication Date    : March 2008
Author(s)           : D. Simon, B. Aboba, R. Hurst
Category            : PROPOSED STANDARD
Source              : EAP Method Update
Area                : Security
Stream              : IETF
Verifying Party     : IESG

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to