[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 28 February 2021 07:37 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C87C3A0C59 for <tls@ietfa.amsl.com>; Sat, 27 Feb 2021 23:37:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.919
X-Spam-Level:
X-Spam-Status: No, score=-0.919 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=Fz2V0NrD; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=aaSjAClf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7SDuuqD8t86H for <tls@ietfa.amsl.com>; Sat, 27 Feb 2021 23:37:38 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E99F3A0BF3 for <tls@ietf.org>; Sat, 27 Feb 2021 23:37:38 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id D34F15C0074 for <tls@ietf.org>; Sun, 28 Feb 2021 02:37:37 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 28 Feb 2021 02:37:37 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=aJuv4XiII7D2lMFC9AVMlRb4RS0IpsbTM/v6HU6cNh8=; b=Fz2V0NrD OSbor3rpMvbdcrWKpgTazHMSQ9JLuvzj7NmhCXqvwOY+BBQFoURzxvkz2ODjjdLd H0qpNrcSrhz+0PSqbpD9YNMU33cxqKdZO37aOBmp9inRYrZV80rdFmOlbPQM5E9D oyXixQkeL25F3Neluo2wfMqBBqldc0K0HoJbYhzdCLwVTiVbOXeX3OM+Bpv4uL4r yad2J4CsSMP9kDpWzFHVJ9MGzVTWfAPZ0M5o7zOEEH3eR/1IGgxL5WkDowvGElS/ zycY1Xt+n+wLfEU68id7kJ27TDZWmFPiJc5CAgaHf6cqEwnP9tfUAgNzBNzBQnG3 DLVuExMXj1VbZg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=aJuv4XiII7D2lMFC9AVMlRb4RS0Ip sbTM/v6HU6cNh8=; b=aaSjAClfZYUQ0POcwK+wbGmPvnTd0i/NljV77x9rMeW/h ESgydYjNW99a1yMFRnNOnDFxcORo2mcSEHJsDV3wx5RBydVL7MBQhFroYo9wCYEM PLX1C+RIbmb58k+NFDT3eM/UjR64qiU5Y32sHwlTclV13nTm/cq6xcj+ewUBUL6E Czw2u3CXXDMiNwKRb9MscE5vhgW/65hL7XElG98Y0oarbEi+vppAUTvuQZoA8o0I Ev75oUCYDdJ+rugowlGMu8A+51165rESR4lYGrhnlKcvjjV9qJvWla9OY33gHBzC 6FI4loL9GYg34Z/BYyJRN2iJ5s9GcYIi5x+IkKCFA==
X-ME-Sender: <xms:QUg7YFvlElxiGSSUB8ipRx6VgCjurbJqz45R3jlmTjwveCm4BBfmCw> <xme:QUg7YOeF9c_OHVh2uQo4AwqGX-fqyybleYOKCt1nWq7FkDg6gstRDmi_079JguhI- QSJ3f8GPTdEu_h2fA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrleehgddugecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrh hnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteen ucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrjedtrddvtdejrdduie ehnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:QUg7YIzlK9wKaR7ixjwrAEi7OQzSEXC3BVt6l-PJSxB01tVsvdhRMg> <xmx:QUg7YMPw33jiHPdJ_uLBv5D_P6m_QfAC7ZR-DoNQJw9Wk8C0Za1bog> <xmx:QUg7YF95sPPLB-8JlcB_-lHa8EIX1vW7ZAkpJjXC4UB8KHwt0gg_4A> <xmx:QUg7YHkx7a8GeTEct0lsS1_kZ2o8ZDHgu4YPM_8q2mnhOloqUeROQg>
Received: from fv-az184-358.internal.cloudapp.net (unknown [40.70.207.165]) by mail.messagingengine.com (Postfix) with ESMTPA id 98D6024005C for <tls@ietf.org>; Sun, 28 Feb 2021 02:37:37 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============4132133639911147222=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210228073737.98D6024005C@mailuser.nyi.internal>
Date: Sun, 28 Feb 2021 02:37:37 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/EqImMfdL6LGO7X6SVcywz6LaNf0>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Feb 2021 07:37:44 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+2/-2/💬9)
  2 issues created:
  - Public name rewriting (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/389 
  - Include changelog going forward (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/388 

  4 issues received 9 new comments:
  - #389 Public name rewriting (3 by chris-wood, davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/389 
  - #384 PSK usage sticks out (2 by chris-wood, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/384 
  - #378 Naive outer_extensions decoding is a DoS risk (3 by cbartle891, chris-wood, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/378 
  - #374 Proposal: Introduce HelloRetryRequestOuter/Inner (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/374 

  2 issues closed:
  - Update to HPKE-08 https://github.com/tlswg/draft-ietf-tls-esni/issues/387 [ready-for-text] 
  - Naive outer_extensions decoding is a DoS risk https://github.com/tlswg/draft-ietf-tls-esni/issues/378 

* tlswg/draft-ietf-tls-external-psk-importer (+1/-0/💬0)
  1 issues created:
  - Address Ben's reviews (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/42 

* tlswg/tls13-spec (+1/-0/💬10)
  1 issues created:
  - Self-encoded lengths that don't match (by martinduke)
    https://github.com/tlswg/tls13-spec/issues/1219 

  2 issues received 10 new comments:
  - #1219 Self-encoded lengths that don't match (8 by davidben, ekr, martinduke, richsalz)
    https://github.com/tlswg/tls13-spec/issues/1219 
  - #1214 Implication of Recommended/Not Recommended (2 by ekr, kaduk)
    https://github.com/tlswg/tls13-spec/issues/1214 

* tlswg/tls-exported-authenticator (+1/-0/💬0)
  1 issues created:
  - exporter entry is missing? (by armfazh)
    https://github.com/tlswg/tls-exported-authenticator/issues/72 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+2/-2/💬5)
  2 pull requests submitted:
  - s/ECHConfigs/ECHConfigList, for clarity. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/391 
  - Update HPKE (and ECH) versions. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/390 

  2 pull requests received 5 new comments:
  - #391 s/ECHConfigs/ECHConfigList, for clarity. (4 by chris-wood, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/391 
  - #385 Add note about denial-of-service vulnerability (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/385 

  2 pull requests merged:
  - Update HPKE (and ECH) versions.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/390 
  - Add note about denial-of-service vulnerability
    https://github.com/tlswg/draft-ietf-tls-esni/pull/385 

* tlswg/draft-ietf-tls-external-psk-importer (+1/-0/💬0)
  1 pull requests submitted:
  - Proposed text to address Martin Duke's DISCUSS (by martinduke)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/41 

* tlswg/tls13-spec (+3/-0/💬15)
  3 pull requests submitted:
  - Clarify that trailing data in extensions is forbidden. (by davidben)
    https://github.com/tlswg/tls13-spec/pull/1220 
  - Recommending deterministic ECDSA for IoT devices without any security… (by emanjon)
    https://github.com/tlswg/tls13-spec/pull/1218 
  - Random Number Generation and Seeding (by emanjon)
    https://github.com/tlswg/tls13-spec/pull/1217 

  3 pull requests received 15 new comments:
  - #1220 Clarify that trailing data in extensions is forbidden. (8 by briansmith, davidben, kaduk, martinduke, martinthomson, tomato42)
    https://github.com/tlswg/tls13-spec/pull/1220 
  - #1218 Recommending deterministic ECDSA for IoT devices without any security… (3 by emanjon, tomato42)
    https://github.com/tlswg/tls13-spec/pull/1218 
  - #1217 Random Number Generation and Seeding (4 by davidben, emanjon, tomato42)
    https://github.com/tlswg/tls13-spec/pull/1217 

* tlswg/dtls-conn-id (+1/-5/💬2)
  1 pull requests submitted:
  - Clarification after landing PR#84 (by ekr)
    https://github.com/tlswg/dtls-conn-id/pull/87 

  2 pull requests received 2 new comments:
  - #87 Clarification after landing PR#84 (1 by ekr)
    https://github.com/tlswg/dtls-conn-id/pull/87 
  - #82 Changed DTLSCiphertext to DTLSCIDCiphertext for easier readability (1 by ekr)
    https://github.com/tlswg/dtls-conn-id/pull/82 

  5 pull requests merged:
  - Clarification after landing PR#84
    https://github.com/tlswg/dtls-conn-id/pull/87 
  - Change history
    https://github.com/tlswg/dtls-conn-id/pull/85 
  - Updated text in Security Consideration Section
    https://github.com/tlswg/dtls-conn-id/pull/84 
  - Corrected statement about multi-homing and CID changes
    https://github.com/tlswg/dtls-conn-id/pull/81 
  - Add Achim Kraus to authors.
    https://github.com/tlswg/dtls-conn-id/pull/86 

* tlswg/tls-exported-authenticator (+1/-0/💬0)
  1 pull requests submitted:
  - "as its" repeated (by armfazh)
    https://github.com/tlswg/tls-exported-authenticator/pull/71 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team