[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 06 December 2020 07:35 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 998DB3A0E85 for <tls@ietfa.amsl.com>; Sat, 5 Dec 2020 23:35:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=C+Fz36H2; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=J6+aH0n1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gwRVKEDJNGWF for <tls@ietfa.amsl.com>; Sat, 5 Dec 2020 23:35:07 -0800 (PST)
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com [66.111.4.29]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6FEC3A0E66 for <tls@ietf.org>; Sat, 5 Dec 2020 23:35:06 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 2A72B5C0131 for <tls@ietf.org>; Sun, 6 Dec 2020 02:35:06 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 06 Dec 2020 02:35:06 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=m0ZPLsSEF1Gvn/hWQqbyAiD2Ftu/dO89oRFaUXRvpF0=; b=C+Fz36H2 7eTBYjlw+TUIZadoZTLozqp4pt7wJhLqjuK+BNxZ3z4cQNzmVGiVEo4Pxb5T/bbl +Op9TlkY/vylcOIVZfS4k1xDHH/swyJ9zaUT1MT0WsY4pYvU05Mv1F6NSYmhw1e5 YlBNMQpd83+RfrVylYykjlMVjVKcRi5TlPqD66Pp+JCmzeyFsvyNRVJIe4VENMN/ 44R34UWCKym0K8r7nWkOSCWzqnASphuBvhH6SCKbr/PxDcemx9Xh/fUg3VTDamMf ipY6/i+mTs91i5SA/mteYTq9RpIbJFGUMoDiNuqe5SYoPh05Bmni2BjIo6csqq60 lA1WoXeZ5stUoQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=m0ZPLsSEF1Gvn/hWQqbyAiD2Ftu/d O89oRFaUXRvpF0=; b=J6+aH0n1W1ZOMNOA58k2U8VA1b06ZlpQ58tlNGrIbJ+NT 9liq4zkQH0G0v4NY7zysy0awZi16y30cbJx1TD3XClI9pvbAx7kO3qLWCne78DH/ LBSCBopNv+/ScEcBT8t3vClk2Cr3BPgtyo6nG/QfAbHLrpDRMxJWC8Z+KG5MxkBb SPDyM0iPq+JT5DjwrmU/fLlhVcBNr/buP1YMp2LOYoXHEuQ5Lx6rM7QvU8DRW6l6 3qkV/fQzbEdJKa6Yab6gLALu2WHmX4M0QrZ3CjRBy20NLxhb6wum2TVRwjgDBI/W tMNPmfeiV2RSbyBoE7XmgsAnyiax04jAeHuKjIvOw==
X-ME-Sender: <xms:qonMXxgsme0BcRETHml_RBAf-gWQIfSQ8UIo8WBoaaG84BO679wktA> <xme:qonMX2By64WBC8DEFugLMVQh5G81x2als56uvKx-WGGMQsWobBF40_BO5F7M_FAfZ cLa9Tn3CIGiNGtS_g>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrudejuddguddtkecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrieehrddvfedtrd dukeenucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:qonMXxFL4jWLYQB87qsWAAyB1Z06FTZ6zKCMwfDlWUrzLuYIlKA4tg> <xmx:qonMX2SoWneqeJuwSGfXCMW9RMX-KGs8ERIVznK-HA09WlgWMyfv9A> <xmx:qonMX-xOV3W8_dxalW3MAeWsBT6DC6XSnJMsdvgxu2Z66g2zicVYxA> <xmx:qonMXzrcED8kQcUvHuHfl_KuOAxRCTBN4LyM9xCx1IgpfgvPOfuylA>
Received: from fv-az60-565.internal.cloudapp.net (unknown [40.65.230.18]) by mail.messagingengine.com (Postfix) with ESMTPA id F3FF624005C for <tls@ietf.org>; Sun, 6 Dec 2020 02:35:05 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============5428595384391294697=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20201206073505.F3FF624005C@mailuser.nyi.internal>
Date: Sun, 06 Dec 2020 02:35:05 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/NcFkUBvDOvGMUGsTJ3ayjD-lvOU>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Dec 2020 07:35:18 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+0/-0/πŸ’¬3)
  1 issues received 3 new comments:
  - #369 Potential SNI leak via cross-ECH resumption (3 by cjpatton, davidben, kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/369 

* tlswg/draft-ietf-tls-external-psk-importer (+0/-3/πŸ’¬0)
  3 issues closed:
  - OPSDIR review from Al Morton https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/39 
  - Genart Review from Brian Carpenter https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/38 
  - Address Roman's AD comments https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/37 

* tlswg/draft-ietf-tls-ticketrequest (+0/-1/πŸ’¬1)
  1 issues received 1 new comments:
  - #23 IETF LC comments (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/issues/23 

  1 issues closed:
  - IETF LC comments https://github.com/tlswg/draft-ietf-tls-ticketrequest/issues/23 

* tlswg/dtls-conn-id (+0/-1/πŸ’¬1)
  1 issues received 1 new comments:
  - #76 Clarification - variable length CID encoding MUST be deterministic (1 by boaks)
    https://github.com/tlswg/dtls-conn-id/issues/76 

  1 issues closed:
  - Clarification - variable length CID encoding MUST be deterministic https://github.com/tlswg/dtls-conn-id/issues/76 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Clarify ClientHelloOuterAAD serialization (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/370 

  1 pull requests merged:
  - Clarify ClientHelloOuterAAD serialization
    https://github.com/tlswg/draft-ietf-tls-esni/pull/370 

* tlswg/draft-ietf-tls-external-psk-importer (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Address OPS and GENART reviews. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/40 

  1 pull requests merged:
  - Address OPS, GENART, and Roman reviews.
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/40 

* tlswg/draft-ietf-tls-ticketrequest (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Address GENART review comments. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/24 

  1 pull requests merged:
  - Address GENART review comments.
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/24 

* tlswg/tls13-spec (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Discuss tracking implications of session resumption. (by davidben)
    https://github.com/tlswg/tls13-spec/pull/1205 

* tlswg/dtls-conn-id (+0/-0/πŸ’¬1)
  1 pull requests received 1 new comments:
  - #77 Update to new (hopefully) injective MAC structure as discussed in the meeting and on-list (1 by chris-wood)
    https://github.com/tlswg/dtls-conn-id/pull/77 

* tlswg/tls-subcerts (+0/-1/πŸ’¬4)
  2 pull requests received 4 new comments:
  - #82 It should verify for client and server auth (1 by claucece)
    https://github.com/tlswg/tls-subcerts/pull/82 
  - #77 Add in test vectors (3 by chris-wood, claucece, wbl)
    https://github.com/tlswg/tls-subcerts/pull/77 

  1 pull requests merged:
  - It should verify for client and server auth
    https://github.com/tlswg/tls-subcerts/pull/82 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team