errata logo graphic

Found 2 records.

Status: Verified (1)

RFC5656, "Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer", December 2009

Source of RFC: IETF - NON WORKING GROUP
Area Assignment: sec

Errata ID: 1960

Status: Verified
Type: Technical

Reported By: Alfred Hoenes
Date Reported: 2009-12-17
Verifier Name: Sean Turner
Date Verified: 2010-07-30

Section 6.2,2nd para says:

|  For example, the method name for ECDH key exchange with ephemeral
|  keys generated on the nistp256 curve is "ecdsa-sha2-nistp256".

It should say:

                                    vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
|  For example, the method name for the SSH ECC public key algorithm
|  using the nistp256 curve is "ecdsa-sha2-nistp256".
   ^^^^^

Notes:

Rationale: The RFC text inadvertently mixes content appropriate for
Section 6.2 with content in Section 6.3; the current text would cause
a contradiction with 6.3, as can be seen from the 2nd para in 6.3.


Status: Held for Document Update (1)

RFC5656, "Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer", December 2009

Source of RFC: IETF - NON WORKING GROUP
Area Assignment: sec

Errata ID: 2710

Status: Held for Document Update
Type: Editorial

Reported By: Mattias Wadenstein
Date Reported: 2011-02-10
Held for Document Update by: Tim Polk
Date Held: 2011-03-09

Section 9 says:

The SHA2 family 
consists of four variants -- SHA-224, SHA-256, SHA-384, and SHA-521 
-- named after their digest lengths.

It should say:

The SHA2 family 
consists of four variants -- SHA-224, SHA-256, SHA-384, and SHA-512 
-- named after their digest lengths.

Notes:

The SHA2 family has a SHA-512 variant, not SHA-521.


Report New Errata