W3C home > Mailing lists > Public > ietf-http-wg@w3.org > October to December 2017

[Errata Held for Document Update] RFC8164 (5023)

From: RFC Errata System <rfc-editor@rfc-editor.org>
Date: Wed, 18 Oct 2017 07:40:15 -0700 (PDT)
To: xiaoyin.l@outlook.com, mnot@mnot.net, martin.thomson@gmail.com
Cc: aamelnikov@fastmail.fm, iesg@ietf.org, ietf-http-wg@w3.org, rfc-editor@rfc-editor.org
Message-Id: <20171018144015.056FCB81845@rfc-editor.org>
The following errata report has been held for document update 
for RFC8164, "Opportunistic Security for HTTP/2". 

You may review the report below and at:

Status: Held for Document Update
Type: Editorial

Reported by: Xiaoyin Liu <xiaoyin.l@outlook.com>
Date Reported: 2017-05-19
Held by: Alexey Melnikov (IESG)

Section: Abstract

Original Text
This mechanism not a replacement for "https"
URIs; it is vulnerable to active attacks.

Corrected Text
This mechanism is not a replacement for "https"
URIs; it is vulnerable to active attacks.

This sentence is in the Abstract. It misses the verb "is".

Alexey: This is correct, but it is unlikely to confuse readers.

RFC8164 (draft-ietf-httpbis-http2-encryption-11)
Title               : Opportunistic Security for HTTP/2
Publication Date    : May 2017
Author(s)           : M. Nottingham, M. Thomson
Category            : EXPERIMENTAL
Source              : Hypertext Transfer Protocol Bis
Area                : Applications and Real-Time
Stream              : IETF
Verifying Party     : IESG
Received on Wednesday, 18 October 2017 14:41:00 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 8 November 2017 00:14:14 UTC