[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 23 October 2022 07:47 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A918C14CE20 for <tls@ietfa.amsl.com>; Sun, 23 Oct 2022 00:47:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.704
X-Spam-Level:
X-Spam-Status: No, score=-1.704 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=teR/BLgP; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=UWJxcd2v
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bTZZ2MZbfyD6 for <tls@ietfa.amsl.com>; Sun, 23 Oct 2022 00:46:59 -0700 (PDT)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76C20C14CF14 for <tls@ietf.org>; Sun, 23 Oct 2022 00:46:29 -0700 (PDT)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id C11FA5C00AD for <tls@ietf.org>; Sun, 23 Oct 2022 03:46:28 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Sun, 23 Oct 2022 03:46:28 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm1; t=1666511188; x= 1666597588; bh=ZkL3QVgbENZtXEPVZLa97Jo4ppDF2XOLIC6d0yFPvBs=; b=t eR/BLgPhnXdoj9Y23nNYUKsZRHmbAnFolcuX/k1uNJGstZZ4w3UCZ9lkty4SKxcw zibHQvXga65dO8iCU8L60jZuTP2aT4XVfnOh90gNYklxzU7wTT3PyqB3z+y+NVWB 5b7sbD3ueCAJf50VgiiWaMiue8+DNVZdjCu+Hbao7hk9igQVMfc9QFWGWlfBSy28 kQ49vBD/uk6qSzLp5VVXB+io9Wlxmu/OPRqiAaEJ4ywi3pG3rUfy7ZP3i4iJRYjS 7+og9yr2Z4V/SLtKiXEXiR3eoBjmYMUJpzLoWLuwCPJ/dGpg4Zb2M9Wj+AUdm2y5 gPD6wd03bzut1KHvh4LFQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:feedback-id :feedback-id:from:from:in-reply-to:mime-version:reply-to:sender :subject:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; t=1666511188; x=1666597588; bh=Z kL3QVgbENZtXEPVZLa97Jo4ppDF2XOLIC6d0yFPvBs=; b=UWJxcd2v4KHhBYch4 Jko7BpjUzI6AK44m7RceqJ8/3wgPMdPqHUxIs8YqRwRrI4x/uzxk4Ds4ggWDXJ29 tufS+N2NBVgzaB03NlKz1zBcZej3o1TDbI1GSAje2eYvX5Ux8BuSmMgdw538MYkX 6cw1leed2A+A6kagdRwGQ7rRKTbHQLAlW1Kdvy1M/VL3SXuLWCevVDD2wXezEA2C +booTQTnXbggTeBtUofIT8i+AJjE7F0mug7Y5D3hyU6dqJ/qBukmSbLTBkdKi+A7 kykwrg+IXRm93ubNo6rRGNY7E9W1DIz5WpxZH+qlo00n/mTrAQYzaZAQNDBSxVCq /89PQ==
X-ME-Sender: <xms:VPFUY1M99nHX-NL1cBEx_WlV-xyV3Khrpx6ZFtJAbGi8AfxQueC_xA> <xme:VPFUY3_Kaot2bKOun3-GOwHTKMBmyK4-64GPYzXblQePUsVcuKFQq_IWXODdKXbdK bS2TEKKr279m3hphg>
X-ME-Received: <xmr:VPFUY0Sq2hSifYO0LhikEThYeouiYTbfiUYiuNYBDsZ14b9-zQ1iBqRFKuoN0vSlUL1nrLiQyulbMmWLWXKsVMniupQyqJZ5X24eZXLh0tOEAiIeDY9F1NY92nqxvgSxZzU>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvfedrgedtuddguddulecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmne cujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhih ucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhi esmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeu gfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrd gtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:VPFUYxsDp4mi2DQraZTZPzwecaDmc-TePlldVmGJdZpUHXu7y9zPAw> <xmx:VPFUY9dYDizB7Q6D4oS0T-o031Y5apR-LaIj9nQmXBMy6l1uFEkt7Q> <xmx:VPFUY92ZB3_s3S6d0HJovX6PhYNwcCKYwClaL7o7DSNb8w4d2D68Vw> <xmx:VPFUYzouqOFM_JX1OWLNx_19Y2bnBzM57duzrGebNcVIVmKmnXdFnQ>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 23 Oct 2022 03:46:28 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1819791576220645356=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20221023074629.76C20C14CF14@ietfa.amsl.com>
Date: Sun, 23 Oct 2022 00:46:29 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/L7KfcGN4KySzbXTm28QFJEJ6xOo>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Oct 2022 07:47:03 -0000



Issues
------
* tlswg/tls13-spec (+2/-5/πŸ’¬8)
  2 issues created:
  - token_binding does not have TLS 1.3 extension markers in IANA (by ekr)
    https://github.com/tlswg/tls13-spec/issues/1278 
  - Add a changelog from RFC 8446 (by ekr)
    https://github.com/tlswg/tls13-spec/issues/1274 

  7 issues received 8 new comments:
  - #1278 token_binding does not have TLS 1.3 extension markers in IANA (1 by davidben)
    https://github.com/tlswg/tls13-spec/issues/1278 
  - #1256 AEAD limits for early data (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1256 
  - #1247 Lifetime, expiry, and validity of certificates and PSKs (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1247 [PR Pending] 
  - #1225 Cache timing warning (2 by davidben, ekr)
    https://github.com/tlswg/tls13-spec/issues/1225 [New PR needed] 
  - #1224 HRR server behavior is underspecified (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1224 
  - #1216 Double check issues filed in ekr/ repo. (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1216 [Editor Ready] 
  - #1207 Clarify requirements for HkdfLabel  (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1207 [propose-close] 

  5 issues closed:
  - Lifetime, expiry, and validity of certificates and PSKs https://github.com/tlswg/tls13-spec/issues/1247 [PR Pending] 
  - Double check issues filed in ekr/ repo. https://github.com/tlswg/tls13-spec/issues/1216 [Editor Ready] 
  - AEAD limits for early data https://github.com/tlswg/tls13-spec/issues/1256 
  - Clarify requirements for HkdfLabel  https://github.com/tlswg/tls13-spec/issues/1207 [propose-close] 
  - losonszky91@gmail.com https://github.com/tlswg/tls13-spec/issues/1268 

* tlswg/draft-ietf-tls-ctls (+0/-2/πŸ’¬0)
  2 issues closed:
  - Discuss handling of untrusted profiles https://github.com/tlswg/draft-ietf-tls-ctls/issues/56 
  - Omitting empty messages seems unlikely to be safe https://github.com/tlswg/draft-ietf-tls-ctls/issues/73 



Pull requests
-------------
* tlswg/tls13-spec (+8/-1/πŸ’¬2)
  8 pull requests submitted:
  - Update extension table. Fixes #1241 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1277 
  - Clarify 0-RTT cache further. Fixes #1225 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1276 
  - Clarify unsolicited (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1275 
  - Attempt to clarify user_canceled. Fixes #1208 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1273 
  - Reduce emphasis on timing in the 0-RTT cache attack (by bemasc)
    https://github.com/tlswg/tls13-spec/pull/1272 
  - Clarify how message reinjection is done. Fixes #1227 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1271 
  - Update KeyUpdate limits with text from RFC 9147. Fixed #1257 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1270 
  - Errors for bogus tickets. Fixes #1247 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1269 

  2 pull requests received 2 new comments:
  - #1276 Clarify 0-RTT cache further. Fixes #1225 (1 by ekr)
    https://github.com/tlswg/tls13-spec/pull/1276 
  - #1269 Errors for bogus tickets. Fixes #1247 (1 by ekr)
    https://github.com/tlswg/tls13-spec/pull/1269 

  1 pull requests merged:
  - Reduce emphasis on timing in the 0-RTT cache attack
    https://github.com/tlswg/tls13-spec/pull/1272 

* tlswg/draft-ietf-tls-ctls (+2/-2/πŸ’¬1)
  2 pull requests submitted:
  - Discuss handling of templates received over untrusted channels (by bemasc)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/76 
  - Remove discussion of omitting empty messages (by bemasc)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/75 

  1 pull requests received 1 new comments:
  - #76 Discuss handling of templates received over untrusted channels (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/76 

  2 pull requests merged:
  - Discuss handling of templates received over untrusted channels
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/76 
  - Remove discussion of omitting empty messages
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/75 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team