[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 29 November 2020 07:32 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8AFD33A12D6 for <tls@ietfa.amsl.com>; Sat, 28 Nov 2020 23:32:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=o0vUm/+t; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=lhyUTmyH
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GPJEUfCXhEK5 for <tls@ietfa.amsl.com>; Sat, 28 Nov 2020 23:32:42 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC5B13A12AB for <tls@ietf.org>; Sat, 28 Nov 2020 23:32:41 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 1AB025C00E5 for <tls@ietf.org>; Sun, 29 Nov 2020 02:32:41 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 29 Nov 2020 02:32:41 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=Fn08i1dSU+kanzGeGXJ+Cq66DEuPP/0v60bAwR8HOmA=; b=o0vUm/+t lQUkcFk9KCiDcgzQ3xXeVYoLP2BYXQB7LKPILqiMY9ysI0Jc9+WI3MIyT/nON99U Mty6fKq7Nzyn3opKa3ccdjYMjpVVcrFr93r2c9PLRm7Hsx0vZZSVqKQfl7ifI1od u16nfs8Wi04j4+fnbpx79YllGaRi28D19GzCYoCi+heQnHnnDU6895pfipm3Sn/v tX1gcTxLd3LeoJkXQv89M1vQ/VTVRVV6vroggnSKi/GjPF4+5DSnyxfzaWGnPUSb du0I83Bobk9diuE0ECGS+l9W7jIXm5YuPQ7Z7HLToVTU75OhYB3qzOekuKdf7g2P 7gU6QML1JPPaRA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=Fn08i1dSU+kanzGeGXJ+Cq66DEuPP /0v60bAwR8HOmA=; b=lhyUTmyHrzz/adkYy9D/4NdSw8qmZeDiO7zYCg22VWd7/ TH3isnFfhREloK4VMdFib7L3/jv8JhBFszReZT6VbQfsb32GWxH9IJGLw27BXAVi 14Q8uTXW2tXd89JBJ1c1jbIG1DXA79y60pA9UU+fTzb14iVrfV9lRtumfp9U444g b2ML70TLKNA/F+sPQOllXAAwsMImrwaOU410xx24DMea5k9LVQYkG762YxeGpana BTBFuZpJTcO5xny0f6lmDFyuahYGI6aJLgKyXhTTlr6azQ4ZE2e3gdKQUUshuYlT o3GGA4S2/yb0ZyxSjKcfOx3wpAYKhIP5gxMTGE3Cw==
X-ME-Sender: <xms:mU7DX5nJo-AqdQb9lEWVaMbqbPGzaooaAlo6wrwL8w-G0e_UxWgD0Q> <xme:mU7DX01o3psFWJBe5LGAAsP2x3o9Rxs5SxIU_CYEMsG828AiF0XBTMfabE8Zjb-K6 L8NwYo9QPAaosd2rA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrudehjedguddtlecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrjedtrdejuddrud ekkeenucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:mU7DX_ruwxO4pHICVOoZGJi8hpVR27Ck77b_uKf6BqiN7Rt7AJeXUg> <xmx:mU7DX5nIfNJ-nln0FzsevU_UeMZ13fB9WaNVE6t59RrNJJQSx4O5Yg> <xmx:mU7DX32jqpKpp0Y33tw8BA-Cpw8Qvx189ApbIuK9mlcskSIqRq_X5w> <xmx:mU7DXw_uIMPKo6phQbTKDtF8i4cfUWW18QJloROA-A5txhylhB_FUQ>
Received: from fv-az184-108.internal.cloudapp.net (unknown [40.70.71.188]) by mail.messagingengine.com (Postfix) with ESMTPA id E58113064AA6 for <tls@ietf.org>; Sun, 29 Nov 2020 02:32:40 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============6255932502871141370=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20201129073240.E58113064AA6@mailuser.nyi.internal>
Date: Sun, 29 Nov 2020 02:32:40 -0500 (EST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Gik39Q03Ph2DflIZ5LGIq6jo7Zk>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Nov 2020 07:32:52 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬2)
  1 issues created:
  - Potential SNI leak via cross-ECH resumption (by kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/369 

  2 issues received 2 new comments:
  - #369 Potential SNI leak via cross-ECH resumption (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/369 
  - #354 "Don't stick out" considerations for ECH (1 by kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/354 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+3/-4/πŸ’¬1)
  3 pull requests submitted:
  - Fix ClientHelloOuterAAD.outer_hello length (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/368 
  - Specify the backend server's behavior when "ech_is_inner" is not empty (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/367 
  - Editorial pass and advance ECHConfig.version to ECH-09 (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/366 

  1 pull requests received 1 new comments:
  - #368 Fix ClientHelloOuterAAD.outer_hello length (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/368 

  4 pull requests merged:
  - Fix ClientHelloOuterAAD.outer_hello length
    https://github.com/tlswg/draft-ietf-tls-esni/pull/368 
  - Quick editorial pass.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/365 
  - Specify the backend server's behavior when "ech_is_inner" is not empty
    https://github.com/tlswg/draft-ietf-tls-esni/pull/367 
  - Editorial pass and advance ECHConfig.version to ECH-09
    https://github.com/tlswg/draft-ietf-tls-esni/pull/366 

* tlswg/dtls-conn-id (+1/-0/πŸ’¬12)
  1 pull requests submitted:
  - Update to new (hopefully) injective MAC structure as discussed in the meeting and on-list (by ekr)
    https://github.com/tlswg/dtls-conn-id/pull/77 

  1 pull requests received 12 new comments:
  - #77 Update to new (hopefully) injective MAC structure as discussed in the meeting and on-list (12 by boaks, ekr, kaduk, thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/pull/77 

* tlswg/tls-subcerts (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - It should verify for client and server auth (by claucece)
    https://github.com/tlswg/tls-subcerts/pull/82 

* tlswg/tls-exported-authenticator (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Grammar fixes (by claucece)
    https://github.com/tlswg/tls-exported-authenticator/pull/67 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team