[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 06 September 2020 07:32 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6CB13A0529 for <tls@ietfa.amsl.com>; Sun, 6 Sep 2020 00:32:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=JMmhobOa; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=Umru4Tsm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zaGrMJ9pFL0z for <tls@ietfa.amsl.com>; Sun, 6 Sep 2020 00:32:50 -0700 (PDT)
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com [64.147.123.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69ACC3A046A for <tls@ietf.org>; Sun, 6 Sep 2020 00:32:50 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id CF2C2B70 for <tls@ietf.org>; Sun, 6 Sep 2020 03:32:49 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 06 Sep 2020 03:32:49 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm3; bh=Q26sRQMt+EGhmDRgRSCNHBpYBQWwdBBp8WM+Z7Sy+DI=; b=JMmhobOa 1L7xTz6xbTl/pL4ITI0yspv2DMyUF+Lof1gkeHBNCK7OmQQv+lWWSaduTRstvgzq dHHIxT/7ZpPHgk8+QuJsdPgbvzEy44ij/HUYkObI7LSoJztR4b2lfkkIqw22fThx n1kvbXrtGVi0JgFsAXSi0Gm1roEOOQ8LbGM2EpxV8KKoxdKjT/jRgpDuLw4lNCow knUiBIXun9i19vZrotLp9ZFwHYP34OyITl9/0yg6P5sZwYq+DiAy9W5mxa91RdB4 aiCEkrILdwQQqPn7F+GWETgdoTC9x+wRZUuly7FCqSYaF4qWpaqIih+5GkMUs6iv JM94qBv2wkBoIg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=Q26sRQMt+EGhmDRgRSCNHBpYBQWwd BBp8WM+Z7Sy+DI=; b=Umru4TsmpR9HXzXfribx/t4sZe+8ORGIZVGNaTp5qNB4A ttUcw5Okk8lNQHZQquecU3vvVM4gQGgdjBxSKKKSgJpC+1YIcLBlvdzAyRrV1SGh rEBP0h9SG9TAhX/m5JkLacY4aJLXTWBsehdfcp2O2FWvEJtlOD1n7hqi4/9elLdE xEgbgUkpg0zsuw4MKrErElNPAWYpaYFPxEcS+WL7GNs/J7wtDnwWmOuPK2C/XfwX 4kOzvkfUEZBRe6q2l/2izXtaEbnUJvtkUrPy2Ag1exStCPO7be0SSrvWmT/G+iE7 rZrly0J2dbWbeFkNwqa+toWTHX41D63QiP54aCxMw==
X-ME-Sender: <xms:oZBUX2qBp64e0orOyeDkFmUGgRhasXsMl9xn6gZqgXnw4WWxd8F3-w> <xme:oZBUX0pyRV14EF0C9AKrCDAtIqwqaKA6PG8QUTrUBtk79mToqHwqNqV7s9snnVPJu ymtO7M53J_DqPpHmQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduiedrudegiedgudduiecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrieehrddvtdefrd dujedunecuufhprghmkfhppfgvthifohhrkhepgedtrdeihedrvddtfedrudejudenucev lhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgpnhhoth gprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:oZBUX7N92JragXfzJ3JEDETiMbz0AShIjD5vBaSdCSrDBGsohKTacA> <xmx:oZBUX17DA89S5ersFfrgaLtMXfZD-QEsh-XfYYJqkBqGFRpmP2DwrQ> <xmx:oZBUX15nDGGxpDYXlsdpKcyWk-4nyXvJdaTge5549lN4ifPF0_yZPw> <xmx:oZBUX3ScwL8qQ58P3dwaFWax7_PGL8XbRqIQG4xkrymBIdSJmBawjw>
Received: from fv-az60.internal.cloudapp.net (unknown [40.65.203.171]) by mail.messagingengine.com (Postfix) with ESMTPA id 359213280059 for <tls@ietf.org>; Sun, 6 Sep 2020 03:32:49 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1911778522152017978=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200906073249.359213280059@mailuser.nyi.internal>
Date: Sun, 06 Sep 2020 03:32:49 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Mi7E0Idv26cMEulIHno6sqWAtqg>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Sep 2020 07:32:59 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+4/-3/π¬58) 4 issues created: - Proposal: remove 'length' field from ECHConfig (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/issues/300 - Proposal: Add version indication to ClientEncryptedCH (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/issues/297 - Greasing to supporting servers (by wbl) https://github.com/tlswg/draft-ietf-tls-esni/issues/295 - Questions about client behavior (by D-Sinus) https://github.com/tlswg/draft-ietf-tls-esni/issues/294 12 issues received 58 new comments: - #300 Proposal: remove 'length' field from ECHConfig (1 by davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/300 - #297 Proposal: Add version indication to ClientEncryptedCH (6 by bemasc, cjpatton, davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/297 - #295 Greasing to supporting servers (1 by davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/295 - #294 Questions about client behavior (4 by D-Sinus, chris-wood, cjpatton, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/294 - #290 What to do on ECH decryption failure? (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/290 - #289 Rejecting ECH for unrecognized backend servers (2 by Lekensteyn, chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/289 - #274 Usage indication: alternatives to trial decryption (22 by bemasc, chris-wood, cjpatton, ekr, huitema, richsalz) https://github.com/tlswg/draft-ietf-tls-esni/issues/274 [needs WG discussion] - #267 "ech_accept" response type undefined (1 by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/issues/267 - #264 Handshake-level vs record-level padding (5 by chris-wood, cjpatton, davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/264 [needs WG discussion] - #263 "outer_extensions": What's the purpose of the hash? (12 by bemasc, cjpatton, davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/263 [needs WG discussion] [question] - #262 "outer_extensions" mechanism is lossy compression (2 by cjpatton, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/262 [needs WG discussion] [ready-for-text] - #253 Nonce rationale clarity (1 by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/issues/253 [needs WG discussion] 3 issues closed: - Questions about client behavior https://github.com/tlswg/draft-ietf-tls-esni/issues/294 - Avoid padding cliff https://github.com/tlswg/draft-ietf-tls-esni/issues/252 - Computation of `config_digest`: which KDF? https://github.com/tlswg/draft-ietf-tls-esni/issues/278 * tlswg/dtls-conn-id (+1/-0/π¬0) 1 issues created: - Add CIDAC (Connection ID Authentication Code) (by boaks) https://github.com/tlswg/dtls-conn-id/issues/74 Pull requests ------------- * tlswg/draft-ietf-tls-esni (+6/-3/π¬15) 6 pull requests submitted: - Fix the alerts reference. (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/299 - Narrow the size of possible configuration identifiers. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/298 - s/Unmarshal/Deserialize/ to align with HPKE (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/296 - Revise "outer_extension" compression mechanism (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/293 - Remove "ech_nonce" extension and clarify client behavior (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/292 - Clarify distinction between rejection and decryption failure (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/291 4 pull requests received 15 new comments: - #293 Revise "outer_extension" compression mechanism (2 by cjpatton, ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/293 - #287 Add ECH confirmation (option (3), but use SH.random) (8 by MikeBishop, cjpatton, davidben, huitema) https://github.com/tlswg/draft-ietf-tls-esni/pull/287 - #286 Add ECH confirmation (option (3), can fall back to (2)) (2 by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/286 - #283 Add ECH confirmation (option (3)) (3 by cjpatton, huitema) https://github.com/tlswg/draft-ietf-tls-esni/pull/283 3 pull requests merged: - Narrow the size of possible configuration identifiers. https://github.com/tlswg/draft-ietf-tls-esni/pull/298 - s/Unmarshal/Deserialize/ to align with HPKE https://github.com/tlswg/draft-ietf-tls-esni/pull/296 - Fix superfluous padding edge cases. https://github.com/tlswg/draft-ietf-tls-esni/pull/268 * tlswg/dtls-conn-id (+1/-0/π¬0) 1 pull requests submitted: - Editorial bits from AD review (by kaduk) https://github.com/tlswg/dtls-conn-id/pull/75 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-grease
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot