[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 18 July 2021 07:34 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D5F53A12AF for <tls@ietfa.amsl.com>; Sun, 18 Jul 2021 00:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=TZFxLtMZ; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=WvbwGeox
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3T59pCHLg8wi for <tls@ietfa.amsl.com>; Sun, 18 Jul 2021 00:34:07 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 144533A1297 for <tls@ietf.org>; Sun, 18 Jul 2021 00:34:06 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 417865C0102 for <tls@ietf.org>; Sun, 18 Jul 2021 03:34:06 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 18 Jul 2021 03:34:06 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm3; bh=KRINZMQROab 5+U8PyHXD1WVBQNZhJ371wYFwhoCA/ls=; b=TZFxLtMZ8BmnzKn3Bs/wOfHddAc ocwBdp5mr51iXlAIsvBE5Dgha4hXSO2OaZ8IHzf//mpeSV758p5ofOZ/aXJske4v 3G3XXeVsMl34EdzGNxNYjxgTLFBkdd3eZkd6PQO620bjU/Fk3FSYIlM89fyncT1P vI+JYNSoUBPj5HaDk4rJVR4qb6H6qS6nHhNjOsQ6oz78gZtUxmN4p0J9iduhQp0p xdRWtlFeap+aBXzPTEKr5PIbuiqtAJvK9gFxsOKbRBZsnf8vxwyYjQHTLygO5op+ 94KcRRvDjvU7yYDAEylw8WwJBwvlWRvMF2g9mk0/RSHuI4QExcCEcLTdvtA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=KRINZMQROab5+U8PyHXD1WVBQNZhJ371wYFwhoCA/ls=; b=WvbwGeox ei7G2stOaj1BEWHR493BoDALk4ocDvfL6eN3QN1u6WqbTbFg9xCqKvXWn2eMUjLD Whrf+LNYChX6noi/oSPRRttO4ujC40S9VNvJb2sU9KTjGyuhZKuRzuc1mFDB3wCO w0UCA39h0JIGNlAyUT7j1Q6mFmVEu4aqoKyfDlymjqSCcEx5y2ZnYWyl3V4FnOL9 32GTstsTD3IRx2wCRE6dgfAKkeVrTS/Y+mnLl3k3OrXOs3OvSnLB2+bryyVOU4Zt FJucALMbRqoTqtSrv9fxmmuNC2Nx8X9RmrOhziRBk6TP+1T0MLn1fVsc5bm7RMmo Dc7srTRKd+lfvg==
X-ME-Sender: <xms:btnzYNUHmzHPc5ZF4Zga9aXtchkugZx-0sCG0fEFeivluyczoxXJAw> <xme:btnzYNnPXZ4JGULAw-rOuY9jw2nwZ0TOOd_UdqGtZP2aEmOdrJECxQBuem2c9tQM7 eqTaXzyRyVPhB_l3w>
X-ME-Received: <xmr:btnzYJbNGnhsZgLruoMvr50QJ6jwX_gikXbGYffK5CxTyK_Z66lpU8IAYJDJrNIlyJMXwHbGf8P6h04c8rQlv1Ho0mVfQM_9jWz8GL9-i4s9CsFZx2SGmetmTFPPOP_ZxWyQLA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddrvdejgdduudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmnecujf gurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhihucet tghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhiesmh hnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeugfef hfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrdgtoh hmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:btnzYAW5SRebrj-RyeEwIH5aQrH4UnCX0hCJX_eoUaUuhUCdDnmRzw> <xmx:btnzYHkJfknkrO_31zpHjmHQNHhvIvZioAn28Y-7JM27YA_vgqEYKA> <xmx:btnzYNdan7HXeceR4IV8LA6jhFV1HbmqHJ45ixRyHTT_1cNxtQxk4g> <xmx:btnzYMxsaQPiGsTq6CUDTuAc7P-8CDUOrcXY7FubTEZk1anT2wllgw>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 18 Jul 2021 03:34:06 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1700293868591019028=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210718073407.144533A1297@ietfa.amsl.com>
Date: Sun, 18 Jul 2021 00:34:06 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/7mWLPkV8ixTAyhQSbjdtwnJPzqM>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Jul 2021 07:34:15 -0000



Issues
------
* tlswg/draft-ietf-tls-semistatic-dh (+1/-0/πŸ’¬0)
  1 issues created:
  - Description of key derivation for client authentication (by thomwiggers)
    https://github.com/tlswg/draft-ietf-tls-semistatic-dh/issues/10 

* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬6)
  1 issues created:
  - Clarification of section 8.2. Middleboxes (by mosterdt)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/474 

  2 issues received 6 new comments:
  - #474 Clarification of section 8.2. Middleboxes (4 by davidben, mosterdt)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/474 
  - #441 Reconsider non-HRR ECH acceptance signal (2 by davidben, martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/441 

* tlswg/tls13-spec (+0/-0/πŸ’¬1)
  1 issues received 1 new comments:
  - #1226 Timing of sending NST from the server (1 by ueno)
    https://github.com/tlswg/tls13-spec/issues/1226 

* tlswg/dtls13-spec (+3/-0/πŸ’¬11)
  3 issues created:
  - Rekeying in (D)TLS 1.3 does not update the exporter_secret (by emanjon)
    https://github.com/tlswg/dtls13-spec/issues/253 
  - Establishing New Associations with Existing Parameters - SHOULD / please add description of the alternatives (by boaks)
    https://github.com/tlswg/dtls13-spec/issues/251 
  - DTLS 1.3 limits the number of packets that can be encrypted with AES-GCM to 2^40.5 (by emanjon)
    https://github.com/tlswg/dtls13-spec/issues/249 

  3 issues received 11 new comments:
  - #253 Rekeying in (D)TLS 1.3 does not update the exporter_secret (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/253 
  - #249 DTLS 1.3 limits the number of packets that can be encrypted with AES-GCM to 2^40.5 (8 by ekr, emanjon, gloinul, kaduk, seanturner)
    https://github.com/tlswg/dtls13-spec/issues/249 
  - #248 Should the protocol specify a mechanism to ensure that the link is disconnected if the peer is restarted or some reason? (2 by ekr, seanturner)
    https://github.com/tlswg/dtls13-spec/issues/248 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+2/-0/πŸ’¬1)
  2 pull requests submitted:
  - Revise middlebox section. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/475 
  - Use the encrypted_client_hello extension to signal acceptance in SH and HRR (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/473 

  1 pull requests received 1 new comments:
  - #475 Revise middlebox section. (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/475 

* tlswg/tls-flags (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Update sender and receiver text. (by chris-wood)
    https://github.com/tlswg/tls-flags/pull/6 

* tlswg/dtls13-spec (+2/-0/πŸ’¬1)
  2 pull requests submitted:
  - More epochs per connection (epoch wrap) (by emanjon)
    https://github.com/tlswg/dtls13-spec/pull/252 
  - Larger epochs (by emanjon)
    https://github.com/tlswg/dtls13-spec/pull/250 

  1 pull requests received 1 new comments:
  - #252 More epochs per connection (epoch wrap) (1 by gloinul)
    https://github.com/tlswg/dtls13-spec/pull/252 

* tlswg/draft-ietf-tls-ctls (+3/-3/πŸ’¬1)
  3 pull requests submitted:
  - Buggy reference fixed (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/34 
  - Editorial Bugfix (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/33 
  - * Clarify mutualaAuth (by ekr)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/32 

  1 pull requests received 1 new comments:
  - #32 * Clarify mutualaAuth (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/32 

  3 pull requests merged:
  - Editorial Bugfix
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/33 
  - * Clarify mutualaAuth
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/32 
  - Revised version of cTLS
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/29 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team