[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 14 March 2021 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DA6C3A1EA9 for <tls@ietfa.amsl.com>; Sat, 13 Mar 2021 23:38:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=XHXV1mMr; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=O6tltaHn
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mmdOgSWeUtGo for <tls@ietfa.amsl.com>; Sat, 13 Mar 2021 23:38:38 -0800 (PST)
Received: from wout4-smtp.messagingengine.com (wout4-smtp.messagingengine.com [64.147.123.20]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BFCA3A1D53 for <tls@ietf.org>; Sat, 13 Mar 2021 23:38:38 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id 92B7217CA for <tls@ietf.org>; Sun, 14 Mar 2021 03:38:37 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 14 Mar 2021 03:38:37 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=eXJstVNAjDEuy4oeKGXAKUyhv5ZDXWU3pHf0pYlnOKo=; b=XHXV1mMr Z66SXejsclJmfikLWfYdNHkWZBzAMN08SSxa6MAjfXAKA+6Qkhn22aMqSm3tqTy9 QhnLazknIw0kPjDXR1nIqgvOT/TM4qrglPANtDxMVbSHb7eAtJG8zM/GOXxAhrGx Kni/mLLp1x+h1SoX3aFa2QA45xCX6Di1cWdDmPaeSMs9dmhjs3RICrf9MfAuHLwh 0MiNwB2VeWnpzN10nRVamuaX4yt8jgft9gVqSLmlpanZPnat9S4tTtB1dEs1FSys pmsnRZ6mfs5+1SmoKEIDR7ErI+XOVeL1cw1ax664UDyE/seG5ASCUaw5MWLNfoWM ugCMXoU33Cfx6Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=eXJstVNAjDEuy4oeKGXAKUyhv5ZDX WU3pHf0pYlnOKo=; b=O6tltaHn7sKpXxKqTT2WLXra0PKNBCmeeQlho9/krhU49 XzfranbEsJASe7zShKpGOuvEbmj9CCcF9WgltYf6Ir7M31ia12O3ZGustINx/YFW nC7yaRrC1rFlsnpTU9DLCl/DKn2IgShHx9i6bGFxctPMYU3b4pV1ymW1P3IrNINA QYUsUOA7vsGyZOoOT7fCN1NMMtHz2j4fuVIAwiNq6h9gccWs9G48BZdXA9mfTPUX 8kinr/0xi1rVkBeqEuFILqYGjC5oMyQcxLdsjC8vsQI6/dAVR4Bt6tkiTutR1TKf pdwQbfY0s1M+MoIHS8vLiTQccZEyOW2LmOYF+cP5A==
X-ME-Sender: <xms:fb1NYDS-k55rxyDpRDpP24OJInAzrO_UenTV9QFQzU8e6aY25r-mjg> <xme:fb1NYEzQsPlARe-CmwyO1piAfdoqEs_ptkYiyp3LynBEbfeNzM9ViYXHyyB6lqbB4 G7n6b2EC1HKfCmjLQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledruddvhedgkeeiucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpegtggfhvffusegrtddtredttdejne cuhfhrohhmpeftvghpohhsihhtohhrhicutegtthhivhhithihucfuuhhmmhgrrhihuceu ohhtuceoughopghnohhtpghrvghplhihsehmnhhothdrnhgvtheqnecuggftrfgrthhtvg hrnhepkeefvdduteejvdefkeehieevuefgfefhteetveegffekffefteffvdelheduieet necuffhomhgrihhnpehgihhthhhusgdrtghomhenucfkphepvdefrddutddurddugeehrd dujedunecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:fb1NYI1Q3RDbqoX8gU6eyz7exQY4YrjdvVAKId7AbHAaXMXPyguKJg> <xmx:fb1NYDBmedGc4K71ejCAzeafDFm_KTxoSvg1X28OpxV1NTgml21OCA> <xmx:fb1NYMhmA1Njnn0dIa0qTXopN27QASFgkn4yJqBbW6My-YMFojFCUQ> <xmx:fb1NYIYHZRfDhT-i_AenbD7ZqAAsMlk8iuMabxdC5tKrlKjwbq2ayQ>
Received: from fv-az207-156.internal.cloudapp.net (unknown [23.101.145.171]) by mail.messagingengine.com (Postfix) with ESMTPA id 02FC324005A for <tls@ietf.org>; Sun, 14 Mar 2021 03:38:36 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============4724813980977934292=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210314073837.02FC324005A@mailuser.nyi.internal>
Date: Sun, 14 Mar 2021 03:38:36 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/MJAXWVWG6BduxW_2krNhlVA3q9M>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Mar 2021 07:38:47 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+7/-2/π¬22) 7 issues created: - ECH complexity (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/401 - Hard to imagine ECH handling in constant time - ponder and document? (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/400 - The serverhello.random trick is ugly and might interact with ticket handling... (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/399 - Is the outer compression really worthwhile? (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/398 - Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/397 - A MUST for inclusion of public_name in outer SNI seems wrong (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/396 - (Editorial) Add some more structure to "Offering ECH" (by sayrer) https://github.com/tlswg/draft-ietf-tls-esni/issues/395 8 issues received 22 new comments: - #399 The serverhello.random trick is ugly and might interact with ticket handling... (2 by davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/399 - #398 Is the outer compression really worthwhile? (2 by davidben, sayrer) https://github.com/tlswg/draft-ietf-tls-esni/issues/398 - #397 Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API (2 by davidben, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/397 - #396 A MUST for inclusion of public_name in outer SNI seems wrong (11 by cbartle891, chris-wood, davidben, dmcardle, ekr, sayrer, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/396 - #386 Fixed-length values should probably be fixed-length (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/386 - #384 PSK usage sticks out (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/384 - #379 Consider a shorter config ID length (2 by chris-wood, enygren) https://github.com/tlswg/draft-ietf-tls-esni/issues/379 - #378 Naive outer_extensions decoding is a DoS risk (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/378 2 issues closed: - Include changelog going forward https://github.com/tlswg/draft-ietf-tls-esni/issues/388 - Fixed-length values should probably be fixed-length https://github.com/tlswg/draft-ietf-tls-esni/issues/386 * tlswg/tls13-spec (+2/-1/π¬18) 2 issues created: - HRR server behavior is underspecified (by davidben) https://github.com/tlswg/tls13-spec/issues/1224 - HRR consistency requirements are too strict (by davidben) https://github.com/tlswg/tls13-spec/issues/1223 6 issues received 18 new comments: - #1224 HRR server behavior is underspecified (1 by davidben) https://github.com/tlswg/tls13-spec/issues/1224 - #1223 HRR consistency requirements are too strict (5 by davidben, martinthomson, richsalz, tomato42) https://github.com/tlswg/tls13-spec/issues/1223 - #1221 Unsolicited extensions (5 by ekr, jhoyla, richsalz) https://github.com/tlswg/tls13-spec/issues/1221 - #1214 Implication of Recommended/Not Recommended (5 by chris-wood, dkg, richsalz) https://github.com/tlswg/tls13-spec/issues/1214 - #1212 general alert (1 by chris-wood) https://github.com/tlswg/tls13-spec/issues/1212 - #1208 Contradition around user_cancelled (1 by chris-wood) https://github.com/tlswg/tls13-spec/issues/1208 1 issues closed: - Unsolicited extensions https://github.com/tlswg/tls13-spec/issues/1221 * tlswg/dtls-conn-id (+4/-0/π¬4) 4 issues created: - IANA section slight reorg (by thomas-fossati) https://github.com/tlswg/dtls-conn-id/issues/91 - Assorted typos (by thomas-fossati) https://github.com/tlswg/dtls-conn-id/issues/90 - Zero-length CID clarifications (by thomas-fossati) https://github.com/tlswg/dtls-conn-id/issues/89 - Missing RFC 8174 boilerplate (by thomas-fossati) https://github.com/tlswg/dtls-conn-id/issues/88 4 issues received 4 new comments: - #91 IANA section slight reorg (1 by hannestschofenig) https://github.com/tlswg/dtls-conn-id/issues/91 - #90 Assorted typos (1 by hannestschofenig) https://github.com/tlswg/dtls-conn-id/issues/90 - #89 Zero-length CID clarifications (1 by boaks) https://github.com/tlswg/dtls-conn-id/issues/89 - #88 Missing RFC 8174 boilerplate (1 by hannestschofenig) https://github.com/tlswg/dtls-conn-id/issues/88 Pull requests ------------- * tlswg/draft-ietf-tls-esni (+1/-3/π¬1) 1 pull requests submitted: - Retarget #384 (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/394 1 pull requests received 1 new comments: - #381 Truncate the config_id to a single byte. (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/381 3 pull requests merged: - Retarget #384 https://github.com/tlswg/draft-ietf-tls-esni/pull/394 - Truncate the config_id to a single byte. https://github.com/tlswg/draft-ietf-tls-esni/pull/381 - Add -09 to -10 change log. https://github.com/tlswg/draft-ietf-tls-esni/pull/392 * tlswg/tls13-spec (+1/-1/π¬0) 1 pull requests submitted: - Clarify that indications are just requests with no response. Fixes #1221 (by ekr) https://github.com/tlswg/tls13-spec/pull/1222 1 pull requests merged: - Clarify that indications are just requests with no response. Fixes #1221 https://github.com/tlswg/tls13-spec/pull/1222 * tlswg/dtls-conn-id (+4/-0/π¬0) 4 pull requests submitted: - Added Acknowledgements (by hannestschofenig) https://github.com/tlswg/dtls-conn-id/pull/95 - Improved readability of the IANA Consideration Section (by hannestschofenig) https://github.com/tlswg/dtls-conn-id/pull/94 - Nits (by hannestschofenig) https://github.com/tlswg/dtls-conn-id/pull/93 - Adding reference to RFC 8174 (by hannestschofenig) https://github.com/tlswg/dtls-conn-id/pull/92 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot