RFC Errata
RFC 8777, "DNS Reverse IP Automatic Multicast Tunneling (AMT) Discovery", April 2020
Source of RFC: mboned (ops)See Also: RFC 8777 w/ inline errata
Errata ID: 6155
Status: Verified
Type: Editorial
Publication Format(s) : TEXT, PDF, HTML
Reported By: Jake Holland
Date Reported: 2020-05-01
Verifier Name: Warren Kumari (Ops AD)
Date Verified: 2021-04-27
Section Appendix A says:
<CODE BEGINS>
$ cat translate.py
#!/usr/bin/env python3
import sys
name=sys.argv[1]
wire=''
for dn in name.split('.'):
if len(dn) > 0:
wire += ('%02x' % len(dn))
wire += (''.join('%02x'%ord(x) for x in dn))
print(len(wire)//2) + 2
print(wire)
$ ./translate.py amtrelays.example.com
24
09616d7472656c617973076578616d706c6503636f6d
<CODE ENDS>
It should say:
<CODE BEGINS>
$ cat translate.py
#!/usr/bin/env python3
import sys
name=sys.argv[1]
wire=''
for dn in name.split('.'):
if len(dn) > 0:
wire += ('%02x' % len(dn))
wire += (''.join('%02x'%ord(x) for x in dn))
print(len(wire)//2 + 2)
print(wire)
$ ./translate.py amtrelays.example.com
24
09616d7472656c617973076578616d706c6503636f6d
<CODE ENDS>
Notes:
The original sample code gives a runtime error when executed. The +2 should have been inside the parenthesis for the print function.
