RFC Errata
RFC 8777, "DNS Reverse IP Automatic Multicast Tunneling (AMT) Discovery", April 2020
Source of RFC: mboned (ops)See Also: RFC 8777 w/ inline errata
Errata ID: 6155
Status: Verified
Type: Editorial
Publication Format(s) : TEXT, PDF, HTML
Reported By: Jake Holland
Date Reported: 2020-05-01
Verifier Name: Warren Kumari (Ops AD)
Date Verified: 2021-04-27
Section Appendix A says:
<CODE BEGINS> $ cat translate.py #!/usr/bin/env python3 import sys name=sys.argv[1] wire='' for dn in name.split('.'): if len(dn) > 0: wire += ('%02x' % len(dn)) wire += (''.join('%02x'%ord(x) for x in dn)) print(len(wire)//2) + 2 print(wire) $ ./translate.py amtrelays.example.com 24 09616d7472656c617973076578616d706c6503636f6d <CODE ENDS>
It should say:
<CODE BEGINS> $ cat translate.py #!/usr/bin/env python3 import sys name=sys.argv[1] wire='' for dn in name.split('.'): if len(dn) > 0: wire += ('%02x' % len(dn)) wire += (''.join('%02x'%ord(x) for x in dn)) print(len(wire)//2 + 2) print(wire) $ ./translate.py amtrelays.example.com 24 09616d7472656c617973076578616d706c6503636f6d <CODE ENDS>
Notes:
The original sample code gives a runtime error when executed. The +2 should have been inside the parenthesis for the print function.