[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 06 September 2020 07:32 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6CB13A0529 for <tls@ietfa.amsl.com>; Sun, 6 Sep 2020 00:32:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=JMmhobOa; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=Umru4Tsm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zaGrMJ9pFL0z for <tls@ietfa.amsl.com>; Sun, 6 Sep 2020 00:32:50 -0700 (PDT)
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com [64.147.123.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69ACC3A046A for <tls@ietf.org>; Sun, 6 Sep 2020 00:32:50 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id CF2C2B70 for <tls@ietf.org>; Sun, 6 Sep 2020 03:32:49 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 06 Sep 2020 03:32:49 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm3; bh=Q26sRQMt+EGhmDRgRSCNHBpYBQWwdBBp8WM+Z7Sy+DI=; b=JMmhobOa 1L7xTz6xbTl/pL4ITI0yspv2DMyUF+Lof1gkeHBNCK7OmQQv+lWWSaduTRstvgzq dHHIxT/7ZpPHgk8+QuJsdPgbvzEy44ij/HUYkObI7LSoJztR4b2lfkkIqw22fThx n1kvbXrtGVi0JgFsAXSi0Gm1roEOOQ8LbGM2EpxV8KKoxdKjT/jRgpDuLw4lNCow knUiBIXun9i19vZrotLp9ZFwHYP34OyITl9/0yg6P5sZwYq+DiAy9W5mxa91RdB4 aiCEkrILdwQQqPn7F+GWETgdoTC9x+wRZUuly7FCqSYaF4qWpaqIih+5GkMUs6iv JM94qBv2wkBoIg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=Q26sRQMt+EGhmDRgRSCNHBpYBQWwd BBp8WM+Z7Sy+DI=; b=Umru4TsmpR9HXzXfribx/t4sZe+8ORGIZVGNaTp5qNB4A ttUcw5Okk8lNQHZQquecU3vvVM4gQGgdjBxSKKKSgJpC+1YIcLBlvdzAyRrV1SGh rEBP0h9SG9TAhX/m5JkLacY4aJLXTWBsehdfcp2O2FWvEJtlOD1n7hqi4/9elLdE xEgbgUkpg0zsuw4MKrErElNPAWYpaYFPxEcS+WL7GNs/J7wtDnwWmOuPK2C/XfwX 4kOzvkfUEZBRe6q2l/2izXtaEbnUJvtkUrPy2Ag1exStCPO7be0SSrvWmT/G+iE7 rZrly0J2dbWbeFkNwqa+toWTHX41D63QiP54aCxMw==
X-ME-Sender: <xms:oZBUX2qBp64e0orOyeDkFmUGgRhasXsMl9xn6gZqgXnw4WWxd8F3-w> <xme:oZBUX0pyRV14EF0C9AKrCDAtIqwqaKA6PG8QUTrUBtk79mToqHwqNqV7s9snnVPJu ymtO7M53J_DqPpHmQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduiedrudegiedgudduiecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrieehrddvtdefrd dujedunecuufhprghmkfhppfgvthifohhrkhepgedtrdeihedrvddtfedrudejudenucev lhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgpnhhoth gprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:oZBUX7N92JragXfzJ3JEDETiMbz0AShIjD5vBaSdCSrDBGsohKTacA> <xmx:oZBUX17DA89S5ersFfrgaLtMXfZD-QEsh-XfYYJqkBqGFRpmP2DwrQ> <xmx:oZBUX15nDGGxpDYXlsdpKcyWk-4nyXvJdaTge5549lN4ifPF0_yZPw> <xmx:oZBUX3ScwL8qQ58P3dwaFWax7_PGL8XbRqIQG4xkrymBIdSJmBawjw>
Received: from fv-az60.internal.cloudapp.net (unknown [40.65.203.171]) by mail.messagingengine.com (Postfix) with ESMTPA id 359213280059 for <tls@ietf.org>; Sun, 6 Sep 2020 03:32:49 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1911778522152017978=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200906073249.359213280059@mailuser.nyi.internal>
Date: Sun, 06 Sep 2020 03:32:49 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Mi7E0Idv26cMEulIHno6sqWAtqg>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Sep 2020 07:32:59 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+4/-3/πŸ’¬58)
  4 issues created:
  - Proposal: remove 'length' field from ECHConfig (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/300 
  - Proposal: Add version indication to ClientEncryptedCH (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/297 
  - Greasing to supporting servers (by wbl)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/295 
  - Questions about client behavior (by D-Sinus)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/294 

  12 issues received 58 new comments:
  - #300 Proposal: remove 'length' field from ECHConfig (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/300 
  - #297 Proposal: Add version indication to ClientEncryptedCH (6 by bemasc, cjpatton, davidben, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/297 
  - #295 Greasing to supporting servers (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/295 
  - #294 Questions about client behavior (4 by D-Sinus, chris-wood, cjpatton, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/294 
  - #290 What to do on ECH decryption failure? (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/290 
  - #289 Rejecting ECH for unrecognized backend servers (2 by Lekensteyn, chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/289 
  - #274 Usage indication: alternatives to trial decryption (22 by bemasc, chris-wood, cjpatton, ekr, huitema, richsalz)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/274 [needs WG discussion] 
  - #267 "ech_accept" response type undefined (1 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/267 
  - #264 Handshake-level vs record-level padding (5 by chris-wood, cjpatton, davidben, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/264 [needs WG discussion] 
  - #263 "outer_extensions": What's the purpose of the hash? (12 by bemasc, cjpatton, davidben, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/263 [needs WG discussion] [question] 
  - #262 "outer_extensions" mechanism is lossy compression (2 by cjpatton, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/262 [needs WG discussion] [ready-for-text] 
  - #253 Nonce rationale clarity (1 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/253 [needs WG discussion] 

  3 issues closed:
  - Questions about client behavior https://github.com/tlswg/draft-ietf-tls-esni/issues/294 
  - Avoid padding cliff https://github.com/tlswg/draft-ietf-tls-esni/issues/252 
  - Computation of `config_digest`: which KDF? https://github.com/tlswg/draft-ietf-tls-esni/issues/278 

* tlswg/dtls-conn-id (+1/-0/πŸ’¬0)
  1 issues created:
  - Add CIDAC (Connection ID Authentication Code)  (by boaks)
    https://github.com/tlswg/dtls-conn-id/issues/74 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+6/-3/πŸ’¬15)
  6 pull requests submitted:
  - Fix the alerts reference. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/299 
  - Narrow the size of possible configuration identifiers. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/298 
  - s/Unmarshal/Deserialize/ to align with HPKE (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/296 
  - Revise "outer_extension" compression mechanism (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/293 
  - Remove "ech_nonce" extension and clarify client behavior (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/292 
  - Clarify distinction between rejection and decryption failure (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/291 

  4 pull requests received 15 new comments:
  - #293 Revise "outer_extension" compression mechanism (2 by cjpatton, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/293 
  - #287 Add ECH confirmation (option (3), but use SH.random) (8 by MikeBishop, cjpatton, davidben, huitema)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/287 
  - #286 Add ECH confirmation (option (3), can fall back to (2)) (2 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/286 
  - #283 Add ECH confirmation (option (3)) (3 by cjpatton, huitema)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/283 

  3 pull requests merged:
  - Narrow the size of possible configuration identifiers.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/298 
  - s/Unmarshal/Deserialize/ to align with HPKE
    https://github.com/tlswg/draft-ietf-tls-esni/pull/296 
  - Fix superfluous padding edge cases.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/268 

* tlswg/dtls-conn-id (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Editorial bits from AD review (by kaduk)
    https://github.com/tlswg/dtls-conn-id/pull/75 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease