[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 03 May 2020 07:32 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD19B3A16DA for <tls@ietfa.amsl.com>; Sun, 3 May 2020 00:32:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=zM+mI1Bz; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=cSkIwpEk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eFbLCMhsxSJd for <tls@ietfa.amsl.com>; Sun, 3 May 2020 00:32:27 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 966AD3A16CB for <tls@ietf.org>; Sun, 3 May 2020 00:32:27 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id DC56E5C02F3 for <tls@ietf.org>; Sun, 3 May 2020 03:32:26 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 03 May 2020 03:32:26 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=SYvWuih3mQxgDVGhmXMffoF8SMk8l7v5UZExkt4T8iQ=; b=zM+mI1Bz mvRT6BvfU4KRO/I25u+sJCesRXSDUBqEOCQdHoLWyi+Y4BXV2tlQ2RHB5Oqa/qwn kSx8WWRXPb2PuVES6AXglje/qlfZK2Hd7elPbmtcyvqE4i1zAZhNpc3Ixvd2Ue48 q0dl6zx5QHGf7Fq4bokTI+9/Z5pYk2TH3c95P6Ndh9/r+NmY7o3gcofPWOHJ0bht mfXcrlbfdftfA5M6ZziVttJcXKRZfEQoSzry+2eMnnwuiQl00wqNDx96xjVt4a1K leQYIDC+eZgXNMhN8o5meCBRoc9L1OakW+xG0MoSVZNLQrdEGKfUtBQKun99bSxn AJ6IMfRw0p9YsQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=SYvWuih3mQxgDVGhmXMffoF8SMk8l 7v5UZExkt4T8iQ=; b=cSkIwpEkkBB8+gG7l4GuMX7gV+pLtUmqXy8pwCkntl0JJ tDcOdzcdsXoOtb6CyAda6SR+NrYrQ9abktOm1xcPY6Sw3/KJWFislwzliI3uUEnh aSphBxpldTPAyggPNOCM2skfItGmVoMwT/vGYNquRp4CsXkRC1HEkcquODvt0FFK 1HSvPnrkng8GMSK51GDhQjQE1bjWSYVhLGgPmRpMHRwgeXkgZtKc1tv8yoc2hxWS Z+YLBxDGarg7hSAB3s4+W/sexzJCtskJdI/rO1IUtEBaAmKyGqXkS1+bYW7X1pRt yaf7q0fh5Ppb3SfNEu/oZZt9c7Fn0/5rJcVfXkJww==
X-ME-Sender: <xms:inOuXl2vcIXCRY4-f1X6HWat-IO9M_mgeqV_S66gODqX9w8H6td-qw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrjedugddvudcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrh hnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteen ucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeehvddrudejjedrudejrddvge dvnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:inOuXucCZibZMPKJMTB6e38eo2TpFRm0E3qq3STaJfH5LpJ0s1d-ww> <xmx:inOuXgchY9K6uOGdzUcYHtr9GqP53hvi2jZTJqSTx7Dpu86aG_wIyA> <xmx:inOuXtW8v688ZwJtXJLakw0NFuy_2CvbnOc1mJix_t_IHohVG7m4cg> <xmx:inOuXtPaQT2gfL7qJwBquXqs7z2WprEf8Xi8m4B8Fi4_xEW73Ct6Cw>
Received: from fv-az59.internal.cloudapp.net (unknown [52.177.17.242]) by mail.messagingengine.com (Postfix) with ESMTPA id A12E13280066 for <tls@ietf.org>; Sun, 3 May 2020 03:32:26 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5889009263509445092=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200503073226.A12E13280066@mailuser.nyi.internal>
Date: Sun, 03 May 2020 03:32:26 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/I9XL1qsErnyT6kAYtRw3V7m9MoQ>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 May 2020 07:32:35 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-7/πŸ’¬16)
  1 issues created:
  - Describe HRR cut-and-paste 1 in Security Considerations. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/229 

  10 issues received 16 new comments:
  - #223 Restrict ECHO inner/outer variance for interop purposes (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/223 
  - #219 cardinality of ECHOConfig vs. HTTPSSVC (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/219 
  - #218 HPKE code points vs. TLS ciphersuites (2 by chris-wood, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/218 
  - #217 ECHOConfigContents.extensions is not needed (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/217 
  - #216 where servers put CH details/hints: ECHOConfig or HTTPSSVC?  (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/216 
  - #214 Clarify 1.2 connection support (don't break connections, but also don't protect the certificate) (6 by bemasc, chris-wood, kazuho, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/214 
  - #206 Suggestion to support user@domain.name (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/206 
  - #204 Anonymity sets (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/204 
  - #182 Consider disabling server tickets if tickets are not uniform across the ESNI anonymity set (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/182 
  - #177 GREASE ESNI extensions are easily distinguished from real ones (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/177 

  7 issues closed:
  - Use HPKE codepoints for all HPKE-relevant operations https://github.com/tlswg/draft-ietf-tls-esni/issues/218 
  - Consider disabling server tickets if tickets are not uniform across the ESNI anonymity set https://github.com/tlswg/draft-ietf-tls-esni/issues/182 
  - Anonymity sets https://github.com/tlswg/draft-ietf-tls-esni/issues/204 
  - Suggestion to support user@domain.name https://github.com/tlswg/draft-ietf-tls-esni/issues/206 
  - ECHOConfigContents.extensions is not needed https://github.com/tlswg/draft-ietf-tls-esni/issues/217 
  - cardinality of ECHOConfig vs. HTTPSSVC https://github.com/tlswg/draft-ietf-tls-esni/issues/219 
  - Restrict ECHO inner/outer variance for interop purposes https://github.com/tlswg/draft-ietf-tls-esni/issues/223 

* tlswg/dtls13-spec (+1/-0/πŸ’¬0)
  1 issues created:
  - Integrity bounds (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/145 

* tlswg/tls-subcerts (+2/-0/πŸ’¬4)
  2 issues created:
  - A propose of signature context string (by william-zk)
    https://github.com/tlswg/tls-subcerts/issues/63 
  - Will the next version of draft define how to store delegated credential as file? (by william-zk)
    https://github.com/tlswg/tls-subcerts/issues/62 

  1 issues received 4 new comments:
  - #63 A propose of signature context string (4 by jhoyla, william-zk)
    https://github.com/tlswg/tls-subcerts/issues/63 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+6/-1/πŸ’¬3)
  6 pull requests submitted:
  - Add information about per-client tracking via unique ECHOConfig structures (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/230 
  - Clarify need for optional record digests. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/228 
  - Clarify "do not stick out" signals. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/227 
  - Provide guidance on ECHOConfig extension usage. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/226 
  - Deterministic padding (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/225 
  - Replace ECHOConfig TLS ciphersuites with HPKE code points. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/224 

  3 pull requests received 3 new comments:
  - #224 Replace ECHOConfig TLS ciphersuites with HPKE code points. (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/224 
  - #209 padding scheme text (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/209 
  - #122 Add CertificateVerify to padding recommendation (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/122 

  1 pull requests merged:
  - Replace ECHOConfig TLS ciphersuites with HPKE code points.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/224 

* tlswg/draft-ietf-tls-ticketrequest (+0/-0/πŸ’¬1)
  1 pull requests received 1 new comments:
  - #20 Declining new tickets requires both counters == 0 (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/20 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease