First, I think this is editorial.  After all these years, I’m not really sure 
it’s an interop problem.

Second, if I were making this I would have placed the errata against RFC2712 
where the values were assigned.  It’s not really TLS1.2’s place to clear this 
up.

spt

> On Jun 26, 2018, at 08:28, RFC Errata System <rfc-edi...@rfc-editor.org> 
> wrote:
> 
> The following errata report has been submitted for RFC5246,
> "The Transport Layer Security (TLS) Protocol Version 1.2".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata/eid5409
> 
> --------------------------------------
> Type: Technical
> Reported by: Eugene Adell <eugene.ad...@gmail.com>
> 
> Section: Appendix A.5
> 
> Original Text
> -------------
>   Note: The cipher suite values { 0x00, 0x1C } and { 0x00, 0x1D } are
>   reserved to avoid collision with Fortezza-based cipher suites in
>   SSL 3.
> 
> Corrected Text
> --------------
>   Note: The cipher suite values { 0x00, 0x1C } and { 0x00, 0x1D } are
>   reserved to avoid collision with Fortezza-based cipher suites in
>   SSL 3. The cipher suite value { 0x00, 0x1E } firstly also assigned to
>   Fortezza has been released and has since been be reassigned. 
> 
> Notes
> -----
> RFC 2712 (Addition of Kerberos Cipher Suites to Transport Layer Security) in 
> its Draft 01 version introduces three new cipher suites colliding with the 
> three Fortezza ones. The Draft 02 version partially corrects that, by moving 
> the Kerberos cipher suites values by two.
> This omission of the third cipher suite has never been corrected, and this 
> remains in the same state in the final RFC 2712, RFC 2246 and its successors 
> including this one.
> 
> Changing the first Kerberos cipher suite value, or moving all of them, would 
> now not make any sense. Enhancing the note as suggested is probably enough to 
> mention how one Fortezza cipher suite disappeared.
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC5246 (draft-ietf-tls-rfc4346-bis-10)
> --------------------------------------
> Title               : The Transport Layer Security (TLS) Protocol Version 1.2
> Publication Date    : August 2008
> Author(s)           : T. Dierks, E. Rescorla
> Category            : PROPOSED STANDARD
> Source              : Transport Layer Security
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to