[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 11 April 2021 07:42 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC0C53A30D6 for <tls@ietfa.amsl.com>; Sun, 11 Apr 2021 00:42:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=G96+BBBx; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=QCcZZozj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hv41kAtzrJyO for <tls@ietfa.amsl.com>; Sun, 11 Apr 2021 00:41:59 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A0063A30D7 for <tls@ietf.org>; Sun, 11 Apr 2021 00:41:59 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id DDF085C00D5 for <tls@ietf.org>; Sun, 11 Apr 2021 03:41:58 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 11 Apr 2021 03:41:58 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=JqKXy5NTt8L4VY3CANs8M3r0e9ENqYX3mUay+gyGzNU=; b=G96+BBBx cPdHobClxWa25tgi7G5KOZgPtczZ6uINcaDRjifNwXNJEmSMJBv2Lf76mS/Nwzg8 N9ODDMdyplJGaZrDEAbMnPM9Gw9k/+q/mhZD/Cte2aw/R3rDmDcFQIWuxnqM6AgB VUR3lSqOqp1dAndBUoGyrxHVb/c4zupMLDu1ua0STDN/G04gpSb8CR8ER6V4GOLK 5qUHC4sgvoWdG6dpm6/geDOGOnZf8NGUDZPfBIrOTMjjrEyGzgo3LC2TPVBqox2W 2+7jwx6s0fuzn+wVSsBz80bCp683j48py5epY5aH7sr3qxCBqYklB4+HapK4/tG2 myhOte7NtyL2ww==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=JqKXy5NTt8L4VY3CANs8M3r0e9ENq YX3mUay+gyGzNU=; b=QCcZZozjB8DsD3VDHjpsb6XjickC+NUPo3ELEHd5JgBJS XRl+5z/cQSia7uXrMBSDX/Lyd7Z1KKDnMWgR6ZS0Nu+XzoRKtbaDOtV0rrnob/nh Qj0L5V0WMqWrufgAxIOWz8mRnEQCuXcFd6nBhDLg3YN1Mli9pPUWn+vMOrfcJ8TC 6R4+KKRWApotCQgEaugbst/J2EOgPW2NwaZ5d/jsaSHpr52aV5ph+nAEylrZm2eD bl8xeRR8uVTQwgnITPmbdpXOdOetnce5QQ4IuGTy/406J0ZzM5JN66yXRhbiSz7H c0osGUdaQthOCZ9Xy0DQ1Ql0OYULsC9voAcFmdsHg==
X-ME-Sender: <xms:RqhyYCK0oSrX056K4PC8kKqlBWsUcjqFfV4gYUiVrCZPRt-SGgxomA> <xme:RqhyYKJa_kHPP3bAAomKZB-37hVq7AQiuNN1lbrzxMLsRTe1lNNOD2GfwJKoo-Sba NdOVnTapakrHGgaFA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrudekgedguddvfecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeehvddrudegjedrudejfe drledtnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:RqhyYCt7cp_nP_8JlZcaYpi71jyhWX6Gv2dlWmYvfevm10fvQwah9w> <xmx:RqhyYHZ_7tjKWSwH0LhEVfg5OIt8XmLcyw-t2uQqQRe40GuRsqpTvw> <xmx:RqhyYJYNHLWxrWCSxcEoA2BfaXvGGTfRILuc7h_4JW1ej715rqslBw> <xmx:RqhyYIzDTelSXuthxUCMrHV4v89cRgypwqD_XoF9n2VVnt1iNZUbEg>
Received: from fv-az266-924.internal.cloudapp.net (unknown [52.147.173.90]) by mail.messagingengine.com (Postfix) with ESMTPA id A56E11080054 for <tls@ietf.org>; Sun, 11 Apr 2021 03:41:58 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5994791294147779194=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210411074158.A56E11080054@mailuser.nyi.internal>
Date: Sun, 11 Apr 2021 03:41:58 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/-ScO3EtUYBQkuXgXAIGoZzQ8Mv4>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Apr 2021 07:42:06 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+0/-0/💬1)
  1 issues received 1 new comments:
  - #404 [Question] Is there any public-facing setups that currently support ECH? (1 by cujof)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/404 

* tlswg/dtls13-spec (+9/-0/💬10)
  9 issues created:
  - Remove ACK from flight table (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/237 
  - Retransmissions (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/236 
  - AEAD Limits (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/235 
  - Bernard Aboba Comments (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/231 
  - Martin Duke Comments (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/230 
  - Francesca Palombini Comments (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/229 
  - Erik Kline comments (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/228 
  - Feedback by Éric Vyncke  (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/225 
  - Invalid records and impact on timers (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/224 

  8 issues received 10 new comments:
  - #237 Remove ACK from flight table (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/237 
  - #236 Retransmissions (2 by ekr, hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/236 [propose-close] 
  - #235 AEAD Limits (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/235 
  - #231 Bernard Aboba Comments (1 by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/231 
  - #230 Martin Duke Comments (1 by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/230 
  - #229 Francesca Palombini Comments (1 by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/229 
  - #228 Erik Kline comments (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/228 
  - #224 Invalid records and impact on timers (2 by ekr, hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/224 [propose-close] 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+4/-0/💬1)
  4 pull requests submitted:
  - Grease and HRR leak (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/419 
  - Split-mode HRR is just hard  (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/418 
  - HRR applies to both (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/417 
  - Don't make a new handshake (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/416 

  1 pull requests received 1 new comments:
  - #416 Don't make a new handshake (1 by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/416 

* tlswg/dtls13-spec (+11/-7/💬1)
  11 pull requests submitted:
  - Clients SHOULD offer a connection ID (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/239 
  - Martin Duke's comments. Fixes #230 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/238 
  - Addressing feedback by Francesca Palombini (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/234 
  - Addressing review comments by Bernard Aboba (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/233 
  - Eric Kline editorial. Fixes #228 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/232 
  - Lars Eggert's comments (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/227 
  - Updates to address Martin Duke's DISCUSS (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/226 
  - Use of the term "Connection ID" (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/223 
  - Addressing review comments by  Zaheduzzaman Sarker (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/222 
  - Addressing review comments by John Scudder (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/221 
  - Addressing review comments by Robert Wilton (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/220 

  1 pull requests received 1 new comments:
  - #239 Clients SHOULD offer a connection ID (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/239 

  7 pull requests merged:
  - Updates to address Martin Duke's DISCUSS
    https://github.com/tlswg/dtls13-spec/pull/226 
  - Addressing review comments by Bernard Aboba
    https://github.com/tlswg/dtls13-spec/pull/233 
  - Addressing review comments by  Zaheduzzaman Sarker
    https://github.com/tlswg/dtls13-spec/pull/222 
  - Addressing review comments by John Scudder
    https://github.com/tlswg/dtls13-spec/pull/221 
  - Addressing review comments by Robert Wilton
    https://github.com/tlswg/dtls13-spec/pull/220 
  - Use of the term "Connection ID"
    https://github.com/tlswg/dtls13-spec/pull/223 
  - Error -> fatal
    https://github.com/tlswg/dtls13-spec/pull/219 

* tlswg/tls-exported-authenticator (+1/-0/💬0)
  1 pull requests submitted:
  - Editorial suggestions from Ben Kaduk's IESG review (by kaduk)
    https://github.com/tlswg/tls-exported-authenticator/pull/73 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team