[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 14 March 2021 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DA6C3A1EA9 for <tls@ietfa.amsl.com>; Sat, 13 Mar 2021 23:38:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=XHXV1mMr; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=O6tltaHn
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mmdOgSWeUtGo for <tls@ietfa.amsl.com>; Sat, 13 Mar 2021 23:38:38 -0800 (PST)
Received: from wout4-smtp.messagingengine.com (wout4-smtp.messagingengine.com [64.147.123.20]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BFCA3A1D53 for <tls@ietf.org>; Sat, 13 Mar 2021 23:38:38 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id 92B7217CA for <tls@ietf.org>; Sun, 14 Mar 2021 03:38:37 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 14 Mar 2021 03:38:37 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=eXJstVNAjDEuy4oeKGXAKUyhv5ZDXWU3pHf0pYlnOKo=; b=XHXV1mMr Z66SXejsclJmfikLWfYdNHkWZBzAMN08SSxa6MAjfXAKA+6Qkhn22aMqSm3tqTy9 QhnLazknIw0kPjDXR1nIqgvOT/TM4qrglPANtDxMVbSHb7eAtJG8zM/GOXxAhrGx Kni/mLLp1x+h1SoX3aFa2QA45xCX6Di1cWdDmPaeSMs9dmhjs3RICrf9MfAuHLwh 0MiNwB2VeWnpzN10nRVamuaX4yt8jgft9gVqSLmlpanZPnat9S4tTtB1dEs1FSys pmsnRZ6mfs5+1SmoKEIDR7ErI+XOVeL1cw1ax664UDyE/seG5ASCUaw5MWLNfoWM ugCMXoU33Cfx6Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=eXJstVNAjDEuy4oeKGXAKUyhv5ZDX WU3pHf0pYlnOKo=; b=O6tltaHn7sKpXxKqTT2WLXra0PKNBCmeeQlho9/krhU49 XzfranbEsJASe7zShKpGOuvEbmj9CCcF9WgltYf6Ir7M31ia12O3ZGustINx/YFW nC7yaRrC1rFlsnpTU9DLCl/DKn2IgShHx9i6bGFxctPMYU3b4pV1ymW1P3IrNINA QYUsUOA7vsGyZOoOT7fCN1NMMtHz2j4fuVIAwiNq6h9gccWs9G48BZdXA9mfTPUX 8kinr/0xi1rVkBeqEuFILqYGjC5oMyQcxLdsjC8vsQI6/dAVR4Bt6tkiTutR1TKf pdwQbfY0s1M+MoIHS8vLiTQccZEyOW2LmOYF+cP5A==
X-ME-Sender: <xms:fb1NYDS-k55rxyDpRDpP24OJInAzrO_UenTV9QFQzU8e6aY25r-mjg> <xme:fb1NYEzQsPlARe-CmwyO1piAfdoqEs_ptkYiyp3LynBEbfeNzM9ViYXHyyB6lqbB4 G7n6b2EC1HKfCmjLQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledruddvhedgkeeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpegtggfhvffusegrtddtredttdejne cuhfhrohhmpeftvghpohhsihhtohhrhicutegtthhivhhithihucfuuhhmmhgrrhihuceu ohhtuceoughopghnohhtpghrvghplhihsehmnhhothdrnhgvtheqnecuggftrfgrthhtvg hrnhepkeefvdduteejvdefkeehieevuefgfefhteetveegffekffefteffvdelheduieet necuffhomhgrihhnpehgihhthhhusgdrtghomhenucfkphepvdefrddutddurddugeehrd dujedunecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:fb1NYI1Q3RDbqoX8gU6eyz7exQY4YrjdvVAKId7AbHAaXMXPyguKJg> <xmx:fb1NYDBmedGc4K71ejCAzeafDFm_KTxoSvg1X28OpxV1NTgml21OCA> <xmx:fb1NYMhmA1Njnn0dIa0qTXopN27QASFgkn4yJqBbW6My-YMFojFCUQ> <xmx:fb1NYIYHZRfDhT-i_AenbD7ZqAAsMlk8iuMabxdC5tKrlKjwbq2ayQ>
Received: from fv-az207-156.internal.cloudapp.net (unknown [23.101.145.171]) by mail.messagingengine.com (Postfix) with ESMTPA id 02FC324005A for <tls@ietf.org>; Sun, 14 Mar 2021 03:38:36 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============4724813980977934292=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210314073837.02FC324005A@mailuser.nyi.internal>
Date: Sun, 14 Mar 2021 03:38:36 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/MJAXWVWG6BduxW_2krNhlVA3q9M>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Mar 2021 07:38:47 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+7/-2/πŸ’¬22)
  7 issues created:
  - ECH complexity (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/401 
  - Hard to imagine ECH handling in constant time - ponder and document? (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/400 
  - The serverhello.random trick is ugly and might interact with ticket handling... (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/399 
  - Is the outer compression really worthwhile? (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/398 
  - Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/397 
  - A MUST for inclusion of public_name in outer SNI seems wrong (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/396 
  - (Editorial) Add some more structure to "Offering ECH" (by sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/395 

  8 issues received 22 new comments:
  - #399 The serverhello.random trick is ugly and might interact with ticket handling... (2 by davidben, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/399 
  - #398 Is the outer compression really worthwhile? (2 by davidben, sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/398 
  - #397 Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API (2 by davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/397 
  - #396 A MUST for inclusion of public_name in outer SNI seems wrong (11 by cbartle891, chris-wood, davidben, dmcardle, ekr, sayrer, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/396 
  - #386 Fixed-length values should probably be fixed-length (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/386 
  - #384 PSK usage sticks out (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/384 
  - #379 Consider a shorter config ID length (2 by chris-wood, enygren)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/379 
  - #378 Naive outer_extensions decoding is a DoS risk (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/378 

  2 issues closed:
  - Include changelog going forward https://github.com/tlswg/draft-ietf-tls-esni/issues/388 
  - Fixed-length values should probably be fixed-length https://github.com/tlswg/draft-ietf-tls-esni/issues/386 

* tlswg/tls13-spec (+2/-1/πŸ’¬18)
  2 issues created:
  - HRR server behavior is underspecified (by davidben)
    https://github.com/tlswg/tls13-spec/issues/1224 
  - HRR consistency requirements are too strict (by davidben)
    https://github.com/tlswg/tls13-spec/issues/1223 

  6 issues received 18 new comments:
  - #1224 HRR server behavior is underspecified (1 by davidben)
    https://github.com/tlswg/tls13-spec/issues/1224 
  - #1223 HRR consistency requirements are too strict (5 by davidben, martinthomson, richsalz, tomato42)
    https://github.com/tlswg/tls13-spec/issues/1223 
  - #1221 Unsolicited extensions (5 by ekr, jhoyla, richsalz)
    https://github.com/tlswg/tls13-spec/issues/1221 
  - #1214 Implication of Recommended/Not Recommended (5 by chris-wood, dkg, richsalz)
    https://github.com/tlswg/tls13-spec/issues/1214 
  - #1212 general alert (1 by chris-wood)
    https://github.com/tlswg/tls13-spec/issues/1212 
  - #1208 Contradition around user_cancelled (1 by chris-wood)
    https://github.com/tlswg/tls13-spec/issues/1208 

  1 issues closed:
  - Unsolicited extensions https://github.com/tlswg/tls13-spec/issues/1221 

* tlswg/dtls-conn-id (+4/-0/πŸ’¬4)
  4 issues created:
  - IANA section slight reorg (by thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/issues/91 
  - Assorted typos (by thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/issues/90 
  - Zero-length CID clarifications (by thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/issues/89 
  - Missing RFC 8174 boilerplate (by thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/issues/88 

  4 issues received 4 new comments:
  - #91 IANA section slight reorg (1 by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/issues/91 
  - #90 Assorted typos (1 by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/issues/90 
  - #89 Zero-length CID clarifications (1 by boaks)
    https://github.com/tlswg/dtls-conn-id/issues/89 
  - #88 Missing RFC 8174 boilerplate (1 by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/issues/88 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+1/-3/πŸ’¬1)
  1 pull requests submitted:
  - Retarget #384 (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/394 

  1 pull requests received 1 new comments:
  - #381 Truncate the config_id to a single byte. (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/381 

  3 pull requests merged:
  - Retarget #384
    https://github.com/tlswg/draft-ietf-tls-esni/pull/394 
  - Truncate the config_id to a single byte.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/381 
  - Add -09 to -10 change log.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/392 

* tlswg/tls13-spec (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Clarify that indications are just requests with no response. Fixes #1221 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1222 

  1 pull requests merged:
  - Clarify that indications are just requests with no response. Fixes #1221
    https://github.com/tlswg/tls13-spec/pull/1222 

* tlswg/dtls-conn-id (+4/-0/πŸ’¬0)
  4 pull requests submitted:
  - Added Acknowledgements (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/95 
  - Improved readability of the IANA Consideration Section (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/94 
  - Nits (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/93 
  - Adding reference to RFC 8174 (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/92 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team