Opened 15 years ago

Closed 15 years ago

#23 closed editorial (fixed)

RFC editor changes in RFC4346, sections 7-

Reported by: pasi.eronen@… Owned by:
Priority: minor Milestone: milestone1
Component: draft-ietf-tls-rfc4346-bis Version: 02
Severity: Keywords:
Cc:

Description (last modified by ekr@…)

7 "three subprotocols which" -> "three subprotocols that"
7 "layer, authenticate themselves, instantiate" -> 
   "layer, to authenticate themselves, to instantiate"
7 "parameters, and report" -> "parameters, and to report"
7 "formal definition)" -> "formal definition.)"

7.1 "Change cipher spec protocol" -> "Change Cipher Spec Protocol"
7.1 "the client and server" -> "the client and the server"
7.1 "See section 6.1" -> "See Section 6.1"
7.1 "See section 7.4.9" -> "See Section 7.4.9"
7.1 "Note: if" -> "Note: If"
7.1 "e.g. if" -> "e.g., if"
7.1 "time during" -> "time, during"
7.1 "the data MAY exist" -> "the data, MAY exist"

7.2 "Alert protocol" -> "Alert Protocol"
7.2.1 "Closure alerts" -> "Closure Alerts"
7.2.2 "Error alerts" -> "Error Alerts"
7.2.2 "party. Upon" -> "party.  Upon"
7.2.2 "an fatal alert" -> "a fatal alert"
7.2.2 "was received which had" -> "was received that had"
7.2.2 "input (e.g. data" -> "input (e.g., data"
7.2.2 "recognized, but not" -> "recognized but not"
7.2.2 "makes it impossible to continue (such as a memory
   allocation failure)" -> "(such as a memory allocation failure) 
   makes it impossible to continue."
7.2.2 "alert; at that point" -> "alert.  At that point"
7.2.2 "appropriate would be where" -> "appropriate is where"
7.2.2 "not. However, all messages which" -> 
   "not.  However, all messages that"
7.2.2 "New alerts values" -> "New alert values"
7.2.2 "Action. See" -> "Action.  See"

7.3 "Handshake Protocol overview" -> 
   "Handshake Protocol Overview"
7.3 "reliant on TLS always negotiating" -> 
   "reliant on whether TLS always negotiates"
7.3 "two peers: there" -> "two peers.  There"
7.3 "number of ways a man in the middle"  ->
   "number of ways in which a man-in-the-middle"
7.3 "secure, in that" -> "secure in that"
7.3 "However, you SHOULD" -> "However, one SHOULD"
7.3 "40 bit" -> "40-bit"
7.3 "unless you feel" -> "unless one feels"
7.3 "messages and defining" -> "messages and by defining "
7.3 "secrets which range" -> "secrets that range"
7.3 "e.g. if their" -> "e.g., if their"
7.3 "Now the server" -> "Next, the server"
7.3 "is complete and" -> "is complete, and"
7.3 "Fig. 1 - Message" -> "Fig. 1. Message"
7.3 "parameters) the message" -> "parameters), the message"
7.3 "Fig. 2 - Message" -> "Fig. 2. Message"

7.4 "Handshake protocol" -> "Handshake Protocol"
7.4 "defined higher level" -> "defined higher-level"
7.4 "message which is not bound" -> 
   "message that is not bound"
7.4.1 "Hello messages" -> "Hello Messages"
7.4.1.1 "Hello request" -> "Hello Request"
7.4.1.1 "hashes which are" -> "hashes that are"
7.4.1.2 "Client hello" -> "Client Hello"
7.4.1.2 "higher level" -> "higher-level"
7.4.1.2 "variable length" -> "variable-length"
7.4.1.2 "this connection, or another" -> 
   "from this connection, or from another"
7.4.1.2 "connection, while the third" -> 
   "connection, and the third"
7.4.1.2 "persists until removed" -> 
   "persists until it is removed"
7.4.1.2 "algorithm. The" -> "algorithm.  The"
7.4.1.2 "3.2 (See" -> "3.2.  (See"
7.4.1.2 "compatibility)." -> "compatibility.)"
7.4.1.2 "available or the" -> "available or if the"

7.4.1.2 "must include the compression_method" -> 
   "MUST include the compression_method" 
7.4.1.2 "vector must contain" -> "vector MUST contain"
7.4.1.2 "all implementations must support" ->
  "all implementations MUST support"
7.4.1.3 "Server hello" -> "Server Hello"
7.4.1.3 "When this message will be sent:" -> ""
7.4.1.3 "3.2 (See" -> "3.2.  (See"
7.4.1.3 "compatibility)." -> "compatibility.)" 
7.4.1.3 "resumed sessions this field" -> 
   "resumed sessions, this field"
7.4.2 "Server certificate" -> "Server Certificate"
7.4.2 "certificate. It MUST contain a key which" ->
  "certificate. It MUST contain a key that"
7.4.2 "public key which can" -> "public key that can"
7.4.2 "profiles, key" -> "profiles, and key"
7.4.2 "CipherSuites which specify" -> 
   "CipherSuites that specify"
7.4.2 "certificate which specifies"- > 
   "certificate that specifies"
7.4.2 "Also PKCS #7" -> "Also, PKCS #7"

7.4.3 "Server key exchange message" ->
   "Server Key Exchange Message"
7.4.3 "key to encrypt" -> "key with which to encrypt"
7.4.3 "for TLS which include" -> "for TLS that include"
7.4.5 "Certificate request" -> "Certificate Request"
7.4.5 "sending this message the server" -> 
   "sending this message, the server"
7.4.5 "hello done message the client" ->
   "hello done message, the client"
7.4.5 "valid certificate if" -> "valid certificate, if"
7.4.7 "Client certificate" -> "Client Certificate"
7.4.9 "Client key exchange message" -> 
   "Client Key Exchange Message"
7.4.9 "Diffie-Hellman parameters which" ->
   "Diffie-Hellman parameters that" ->
7.4.9 "certificate which contained" ->
   "certificate that contained"
7.4.9.1 "RSA encrypted premaster secret message" -> 
   "RSA Encrypted Premaster Secret Message"
7.4.9.1 "message, not a" -> "message and is not a"

(omitted Bleichenbacher text as we're rewriting it anyway)

7.4.9.1 "Note: public-key-encrypted" ->
   "Note: Public-key-encrypted "
7.4.9.1 "see section 4.7" -> "see Section 4.7"
7.4.9.1 "Thus the" -> "Thus, the"
7.4.9.1 "public-key-encrypted data and therefore" ->
   "public-key-encrypted data, and therefore"
7.4.9.1 "implementations which use static RSA" ->   
   "implementations that use static RSA"
7.4.9.2  "Client Diffie-Hellman public value" ->
   "Client Diffie-Hellman Public Value"
7.4.9.2 "exchange message, not a" ->
   "exchange message and not a"
7.4.9.2 "but MUST be empty" -> "but it MUST be empty"
 
There are two sections numbered 7.4.10!

7.4.10 "Handshake structures as defined in 7.4 exchanged" -> 
   "Handshake structures, as defined in 7.4, exchanged"
7.4.10 "the one which is sent" -> "the one that is sent"
7.4.10 "messages, alerts and" -> "messages, alerts, and"

8 "Cryptographic computations" -> "Cryptographic Computations"
8.1 "Computing the master secret" -> 
   "Computing the Master Secret"
8.1.2 "by the server, and may" -> "by the server and may"
10 "Application data protocol" -> "Application Data Protocol"

Add new section (between current sections 10 and 11):

   "11. Security Considerations

   Security issues are discussed throughout this memo, 
   especially in Appendices D, E, and F."

(Section 11 omitted since we need to rewrite it anyway.)

Change History (2)

comment:1 Changed 15 years ago by pasi.eronen@…

  • Milestone set to milestone1

comment:2 Changed 15 years ago by ekr@…

  • Description modified (diff)
  • Resolution set to fixed
  • Status changed from new to closed

Note: See TracTickets for help on using tickets.