[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 03 March 2024 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52084C14F619 for <tls@ietfa.amsl.com>; Sat, 2 Mar 2024 23:38:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.705
X-Spam-Level:
X-Spam-Status: No, score=-6.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="S5SnoWJX"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="VaVA6wCy"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GY8Z0vihGnZ2 for <tls@ietfa.amsl.com>; Sat, 2 Mar 2024 23:38:47 -0800 (PST)
Received: from wfhigh8-smtp.messagingengine.com (wfhigh8-smtp.messagingengine.com [64.147.123.159]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8F90C14F70A for <tls@ietf.org>; Sat, 2 Mar 2024 23:38:47 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailfhigh.west.internal (Postfix) with ESMTP id BA8491800076 for <tls@ietf.org>; Sun, 3 Mar 2024 02:38:44 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute6.internal (MEProxy); Sun, 03 Mar 2024 02:38:44 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm2; t= 1709451524; x=1709537924; bh=GSyfW+3oZbl6pUXfUJMbqbY3NmG0nmLvAZU DH40wotQ=; b=S5SnoWJXBPydL6ZkelUEBdLqSjJV8BpcxCkLeAMH3bE07M8CP3d S+bWSrAvbXwOCk38YKjWhPMdEEhCm9AFu44b9ic12INtTDh4ppuK8LqbWmNx3Yhg 0MUl6DhBXQBXGuTHVaduwh4MdafTRCzFtLABNkVLnhREA0xE9AgxVutrwnwgYL5B STq0yDZtbT0Qd1OGxSTjEgGJsXVoOIc+groGOJDRxI01aYMbAht93GBv2zVeH3BZ onQVfBbUTho0PMy5E/nW4/MGYdRzLcVx65aTqmKDJKPw/S7P3L/0W6L8QKQm84e2 rcjkUAumFW6rEcJNZVFgpwA8Yhixe67LMUg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t=1709451524; x= 1709537924; bh=GSyfW+3oZbl6pUXfUJMbqbY3NmG0nmLvAZUDH40wotQ=; b=V aVA6wCyUMMt9fA2gYiYf1D8EP7Lhp578kgay9H3PEaHR3RCS1XzZynVElZaVf/xq SUH1ANz5x+l2bIu6VM/kT/SGqsbPze2XI77QLvnHWf/sSyceNB7XNWa71pP9pWGi 7Q+QBzmrU9daaRcKCXvkiDirdx4wNflog+CwaR28dhAFRc5RbepG0VTvgymKoA1R gfCLdAdG3IAqQnCnN0FNXi7gNBb/5pAtQ8sy2LvbVKllUleZAzv3PNFHicXoYIXQ p1PU/SbzVa6P4YyCNZOgp9Q7OKl1wlzPtP6TX35kp9NwYjzhudXSYGeglnY5YhLw Lc/a2NC1V3mgugT/R2RJw==
X-ME-Sender: <xms:BCnkZXnjkNsTD6vXepsPRC0fPLNZcYsgGfw22-5YAbpZrJFhEAJKvg> <xme:BCnkZa2skZIPeV4rlK1yCFtOlLycgIvpWal71UMzd97E6Bl1Z4Rz34aWwGG_gX7fj GQxsKy_m5HH7nmOYQ>
X-ME-Received: <xmr:BCnkZdpLBnarLv9tkgO7kVhMHfSOiY89itpd1tVdc2fNyoW2oGs6HE-leRLofdtZyfk86TFcgN10LUootF5VvMwHfs13-n-y39ByOeLQb3fTAFYfCXOj6dPIigyFMDCw2zhkfw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrheeggddutdekucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:BCnkZfmTrybu6NLpg3eYNKdBgDor1PebyPU-empmNRmG3Rd1_o9T_A> <xmx:BCnkZV17g8votw7FIx93nde_p15FozGMZVArSv2FhPyZk4OkUJXbsg> <xmx:BCnkZeuwc6hUhtUWmgO9a8L_n28_kdSi5io79If9zpvNLRNJ1JQ0Qw> <xmx:BCnkZW_F3S6VYRXCKXUpZz0WQXs3239Q7TwHvvzjwIAuBcLsUYkoLPjEsdk>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 3 Mar 2024 02:38:43 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============5692459440943553937=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20240303073847.B8F90C14F70A@ietfa.amsl.com>
Date: Sat, 02 Mar 2024 23:38:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/OrYllrkaGzUxWA4aiR4zueHjmTg>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Mar 2024 07:38:52 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+2/-1/π¬8) 2 issues created: - Can a retry ECHConfig change the public name? (by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/608 - Recommend greasing PSK? (by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/606 2 issues received 8 new comments: - #608 Can a retry ECHConfig change the public name? (4 by ekr, martinthomson, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/608 - #606 Recommend greasing PSK? (4 by dennisjackson, ekr, martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/issues/606 1 issues closed: - Can a retry ECHConfig change the public name? https://github.com/tlswg/draft-ietf-tls-esni/issues/608 * tlswg/tls13-spec (+0/-2/π¬0) 2 issues closed: - client_early_traffic_secret and alert https://github.com/tlswg/tls13-spec/issues/1338 [propose-close] - illegal_parameter vs protocol_version https://github.com/tlswg/tls13-spec/issues/1339 [propose-close] * tlswg/tls-flags (+1/-0/π¬1) 1 issues created: - "Recommended" Column (by emanjon) https://github.com/tlswg/tls-flags/issues/32 1 issues received 1 new comments: - #32 "Recommended" Column (1 by seanturner) https://github.com/tlswg/tls-flags/issues/32 Pull requests ------------- * tlswg/draft-ietf-tls-esni (+2/-1/π¬4) 2 pull requests submitted: - Explain when clients can remember rejected ECH. Fixes #604 (by ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/609 - Ladd review1 (by ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/607 2 pull requests received 4 new comments: - #609 Explain when clients can remember rejected ECH. Fixes #604 (3 by dennisjackson, ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/609 - #607 Ladd review1 (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/607 1 pull requests merged: - Ladd review1 https://github.com/tlswg/draft-ietf-tls-esni/pull/607 * tlswg/tls13-spec (+0/-1/π¬0) 1 pull requests merged: - AEAD-LIMITS ref https://github.com/tlswg/tls13-spec/pull/1337 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot