[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 28 February 2021 07:37 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C87C3A0C59 for <tls@ietfa.amsl.com>; Sat, 27 Feb 2021 23:37:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.919
X-Spam-Level:
X-Spam-Status: No, score=-0.919 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=Fz2V0NrD; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=aaSjAClf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7SDuuqD8t86H for <tls@ietfa.amsl.com>; Sat, 27 Feb 2021 23:37:38 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E99F3A0BF3 for <tls@ietf.org>; Sat, 27 Feb 2021 23:37:38 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id D34F15C0074 for <tls@ietf.org>; Sun, 28 Feb 2021 02:37:37 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 28 Feb 2021 02:37:37 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=aJuv4XiII7D2lMFC9AVMlRb4RS0IpsbTM/v6HU6cNh8=; b=Fz2V0NrD OSbor3rpMvbdcrWKpgTazHMSQ9JLuvzj7NmhCXqvwOY+BBQFoURzxvkz2ODjjdLd H0qpNrcSrhz+0PSqbpD9YNMU33cxqKdZO37aOBmp9inRYrZV80rdFmOlbPQM5E9D oyXixQkeL25F3Neluo2wfMqBBqldc0K0HoJbYhzdCLwVTiVbOXeX3OM+Bpv4uL4r yad2J4CsSMP9kDpWzFHVJ9MGzVTWfAPZ0M5o7zOEEH3eR/1IGgxL5WkDowvGElS/ zycY1Xt+n+wLfEU68id7kJ27TDZWmFPiJc5CAgaHf6cqEwnP9tfUAgNzBNzBQnG3 DLVuExMXj1VbZg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=aJuv4XiII7D2lMFC9AVMlRb4RS0Ip sbTM/v6HU6cNh8=; b=aaSjAClfZYUQ0POcwK+wbGmPvnTd0i/NljV77x9rMeW/h ESgydYjNW99a1yMFRnNOnDFxcORo2mcSEHJsDV3wx5RBydVL7MBQhFroYo9wCYEM PLX1C+RIbmb58k+NFDT3eM/UjR64qiU5Y32sHwlTclV13nTm/cq6xcj+ewUBUL6E Czw2u3CXXDMiNwKRb9MscE5vhgW/65hL7XElG98Y0oarbEi+vppAUTvuQZoA8o0I Ev75oUCYDdJ+rugowlGMu8A+51165rESR4lYGrhnlKcvjjV9qJvWla9OY33gHBzC 6FI4loL9GYg34Z/BYyJRN2iJ5s9GcYIi5x+IkKCFA==
X-ME-Sender: <xms:QUg7YFvlElxiGSSUB8ipRx6VgCjurbJqz45R3jlmTjwveCm4BBfmCw> <xme:QUg7YOeF9c_OHVh2uQo4AwqGX-fqyybleYOKCt1nWq7FkDg6gstRDmi_079JguhI- QSJ3f8GPTdEu_h2fA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrleehgddugecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrh hnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteen ucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrjedtrddvtdejrdduie ehnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:QUg7YIzlK9wKaR7ixjwrAEi7OQzSEXC3BVt6l-PJSxB01tVsvdhRMg> <xmx:QUg7YMPw33jiHPdJ_uLBv5D_P6m_QfAC7ZR-DoNQJw9Wk8C0Za1bog> <xmx:QUg7YF95sPPLB-8JlcB_-lHa8EIX1vW7ZAkpJjXC4UB8KHwt0gg_4A> <xmx:QUg7YHkx7a8GeTEct0lsS1_kZ2o8ZDHgu4YPM_8q2mnhOloqUeROQg>
Received: from fv-az184-358.internal.cloudapp.net (unknown [40.70.207.165]) by mail.messagingengine.com (Postfix) with ESMTPA id 98D6024005C for <tls@ietf.org>; Sun, 28 Feb 2021 02:37:37 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============4132133639911147222=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210228073737.98D6024005C@mailuser.nyi.internal>
Date: Sun, 28 Feb 2021 02:37:37 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/EqImMfdL6LGO7X6SVcywz6LaNf0>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Feb 2021 07:37:44 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+2/-2/💬9) 2 issues created: - Public name rewriting (by martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/issues/389 - Include changelog going forward (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/388 4 issues received 9 new comments: - #389 Public name rewriting (3 by chris-wood, davidben, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/389 - #384 PSK usage sticks out (2 by chris-wood, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/384 - #378 Naive outer_extensions decoding is a DoS risk (3 by cbartle891, chris-wood, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/378 - #374 Proposal: Introduce HelloRetryRequestOuter/Inner (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/374 2 issues closed: - Update to HPKE-08 https://github.com/tlswg/draft-ietf-tls-esni/issues/387 [ready-for-text] - Naive outer_extensions decoding is a DoS risk https://github.com/tlswg/draft-ietf-tls-esni/issues/378 * tlswg/draft-ietf-tls-external-psk-importer (+1/-0/💬0) 1 issues created: - Address Ben's reviews (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/42 * tlswg/tls13-spec (+1/-0/💬10) 1 issues created: - Self-encoded lengths that don't match (by martinduke) https://github.com/tlswg/tls13-spec/issues/1219 2 issues received 10 new comments: - #1219 Self-encoded lengths that don't match (8 by davidben, ekr, martinduke, richsalz) https://github.com/tlswg/tls13-spec/issues/1219 - #1214 Implication of Recommended/Not Recommended (2 by ekr, kaduk) https://github.com/tlswg/tls13-spec/issues/1214 * tlswg/tls-exported-authenticator (+1/-0/💬0) 1 issues created: - exporter entry is missing? (by armfazh) https://github.com/tlswg/tls-exported-authenticator/issues/72 Pull requests ------------- * tlswg/draft-ietf-tls-esni (+2/-2/💬5) 2 pull requests submitted: - s/ECHConfigs/ECHConfigList, for clarity. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/391 - Update HPKE (and ECH) versions. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/390 2 pull requests received 5 new comments: - #391 s/ECHConfigs/ECHConfigList, for clarity. (4 by chris-wood, davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/391 - #385 Add note about denial-of-service vulnerability (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/385 2 pull requests merged: - Update HPKE (and ECH) versions. https://github.com/tlswg/draft-ietf-tls-esni/pull/390 - Add note about denial-of-service vulnerability https://github.com/tlswg/draft-ietf-tls-esni/pull/385 * tlswg/draft-ietf-tls-external-psk-importer (+1/-0/💬0) 1 pull requests submitted: - Proposed text to address Martin Duke's DISCUSS (by martinduke) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/41 * tlswg/tls13-spec (+3/-0/💬15) 3 pull requests submitted: - Clarify that trailing data in extensions is forbidden. (by davidben) https://github.com/tlswg/tls13-spec/pull/1220 - Recommending deterministic ECDSA for IoT devices without any security… (by emanjon) https://github.com/tlswg/tls13-spec/pull/1218 - Random Number Generation and Seeding (by emanjon) https://github.com/tlswg/tls13-spec/pull/1217 3 pull requests received 15 new comments: - #1220 Clarify that trailing data in extensions is forbidden. (8 by briansmith, davidben, kaduk, martinduke, martinthomson, tomato42) https://github.com/tlswg/tls13-spec/pull/1220 - #1218 Recommending deterministic ECDSA for IoT devices without any security… (3 by emanjon, tomato42) https://github.com/tlswg/tls13-spec/pull/1218 - #1217 Random Number Generation and Seeding (4 by davidben, emanjon, tomato42) https://github.com/tlswg/tls13-spec/pull/1217 * tlswg/dtls-conn-id (+1/-5/💬2) 1 pull requests submitted: - Clarification after landing PR#84 (by ekr) https://github.com/tlswg/dtls-conn-id/pull/87 2 pull requests received 2 new comments: - #87 Clarification after landing PR#84 (1 by ekr) https://github.com/tlswg/dtls-conn-id/pull/87 - #82 Changed DTLSCiphertext to DTLSCIDCiphertext for easier readability (1 by ekr) https://github.com/tlswg/dtls-conn-id/pull/82 5 pull requests merged: - Clarification after landing PR#84 https://github.com/tlswg/dtls-conn-id/pull/87 - Change history https://github.com/tlswg/dtls-conn-id/pull/85 - Updated text in Security Consideration Section https://github.com/tlswg/dtls-conn-id/pull/84 - Corrected statement about multi-homing and CID changes https://github.com/tlswg/dtls-conn-id/pull/81 - Add Achim Kraus to authors. https://github.com/tlswg/dtls-conn-id/pull/86 * tlswg/tls-exported-authenticator (+1/-0/💬0) 1 pull requests submitted: - "as its" repeated (by armfazh) https://github.com/tlswg/tls-exported-authenticator/pull/71 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra… Repository Activity Summary Bot