RFC Errata


Errata Search

 
Source of RFC  
Summary Table Full Records

Found 1 record.

Status: Held for Document Update (1)

RFC 4957, "Link-Layer Event Notifications for Detecting Network Attachments", August 2007

Source of RFC: dna (int)

Errata ID: 1052
Status: Held for Document Update
Type: Editorial
Publication Format(s) : TEXT

Reported By: Alfred Hoenes
Date Reported: 2007-08-20
Held for Document Update by: Brian Haberman

 

(1)  Section 3

Within Section 3, the second paragraph on page 6 says:

                               [...].  Therefore, there exist cases
|  where IP-layer configuration may have to change even without the IP
   layer receiving a link up notification.  [...]

It should perhaps better say, adding the article:

                               [...].  Therefore, there exist cases
|  where the IP-layer configuration may have to change even without the
   IP layer receiving a link up notification.  [...]

The last paragraph of Section 3 says:
                                                     vvvvvv
|  The link-layer process leading to a link up event depend on the link
   technology.  [...]

It should better say:
                                                     vvvvvvv
|  The link-layer process leading to a link up event depends on the link
   technology.  [...]


(2)  Section 4

In the first paragraph of Section 4 (on page 13), the RFC says:

                                      [...].  In addition, wireless
   networks such as 802.11 are susceptible to an attack called the "Evil
   Twin" attack where an attacker sets up an Access Point with the same
|  SSID as a legitimate one and gets the use to connect to the fake
   access point instead of the real one.  [...]
                                         ^^^
The tagged word 'use' apparently should be 'user' :

                                      [...].  In addition, wireless
   networks such as 802.11 are susceptible to an attack called the "Evil
   Twin" attack where an attacker sets up an Access Point with the same
|  SSID as a legitimate one and gets the user to connect to the fake
   access point instead of the real one.  [...]
                                         ^^^^

(3)  Section 7.1

- In Section 7.1 (on page 14), the first entry is apparently
  truncated:

                                                          vvvv
|  [CDMA2K]        "cdma2000 Wireless IP Network Standard",  ,
                   December 2000.

Report New Errata



Advanced Search