[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 13 November 2022 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9494CC14CF00 for <tls@ietfa.amsl.com>; Sat, 12 Nov 2022 23:38:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.695
X-Spam-Level:
X-Spam-Status: No, score=-6.695 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=WZVpCf7+; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=K/cqpfS5
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 73UFIQINRJlc for <tls@ietfa.amsl.com>; Sat, 12 Nov 2022 23:38:48 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEAE1C14CEED for <tls@ietf.org>; Sat, 12 Nov 2022 23:38:48 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 0F3745C0081 for <tls@ietf.org>; Sun, 13 Nov 2022 02:38:48 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Sun, 13 Nov 2022 02:38:48 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm2; t=1668325128; x= 1668411528; bh=E9bd+5TDz0ud4NW7aABNpuYxmIFbvkOKgvWM1F9TVKI=; b=W ZVpCf7+5y/vVNqHxtQSMwF0xNMMJRJzo2piTmB0gWn5ME42dRObiClxDUTns68FJ db86c3VfF9shKXaJB7I/H6nTUAs8Lz5/URXfHgKzgHEY9gCgjJbBBQsBK5hjn9zb 0lIXUu7q6z68ux+U6vMucdIm4ESNSEJvhm3U1ssL9qtr2fS9K5+AnQ5Fdnw2G9RD 8QnTSR258st4P3LTPUkSuZJ/RExm3lsvISARS78LCkuE/Hf1/JgxBAilKiJK9xaZ soy25njzp8jeH75x4NqNhgARZ+pSztAVJXAj/FspCpgb6YZ5TO5N7/GinVlpAMTr eggEulUyhlpGLWq9gahAQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:feedback-id :feedback-id:from:from:in-reply-to:mime-version:reply-to:sender :subject:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; t=1668325128; x=1668411528; bh=E 9bd+5TDz0ud4NW7aABNpuYxmIFbvkOKgvWM1F9TVKI=; b=K/cqpfS5mkfpvO4df yxrWt+Frs/C5nnQ2Qv2TDKWUR+UC22jr/NqnOU/yfl4wuoPyHuBA39EZZdkUN3to J3EuWyiCZjFcs+HCf38B9U6kkLbIfX4xn196+33LilIPATk0fnfFXEHWvCfcQsJH A5eXL9/x0v3haTAKRJcqzOxFhXBcUEVAm0U1gxUHtPmPBrcL4XiSTyUJ5ojouC0l gbSR0rcsPsUszNdj65VUVVR0kDWgsZgUVFD606llE21h5Qbf5UXUDV1UzoYhlCDB aJxEyVRkG5Cft2U0fbq7rsg/b8kfyOUNB4fr454HqE04MeXUpi+qqVptDHrKAvdZ vP19w==
X-ME-Sender: <xms:B59wY_McFoOZmQ6sGPGY_XSP0TffbKf_Cl14rD3uebStqD6zXghzdA> <xme:B59wY5_BZmAwxmqnXlRAE0s8yW6oqBiqZsilDGBdqXx3Ui9FEwH9kV-gxrtIqJPCE BPjyo5TH-rQZprbPw>
X-ME-Received: <xmr:B59wY-SiqbX_2523gEsqTwzLoMDg-a8mqvD4rw4hPX0MP_2Cnr7lNhGfWsHmYxBaj4YZBNXPzH5h29K90KLzzmc6c0Bdy5dlLiioaTAJgMaOBM3YxCtVKap138JH6uOhSt7i>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvgedrfeelgdduuddvucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:B59wYzufpuheGgWrLD5XOAI83ilSVES9KpEDmWDsl6r1ztHLCh2Cpg> <xmx:B59wY3eSqPJV60kkPvCUsVpQzj7OZnP6nC4fyXgAAvwhD9uM7dwd-g> <xmx:B59wY_3i932fBQ1pUQWhaPAaJEWk8H_CYJqtqR0TlRfcPxmXeX6ztg> <xmx:CJ9wY1rpP2yT5yjuWvfQut47OdSr9hquC7LG6Lxfqetc5Zk7id5UVg>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 13 Nov 2022 02:38:47 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============0904473108708004039=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20221113073848.BEAE1C14CEED@ietfa.amsl.com>
Date: Sat, 12 Nov 2022 23:38:48 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Rswz6OTx2kk5kMg4Y-L00ihd8t4>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Nov 2022 07:38:53 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-0/💬4)
  1 issues created:
  - Use of MAY in section 5 needs to be fixed up (by pkelsey)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/542 

  2 issues received 4 new comments:
  - #513 Split mode correlation attacks (3 by davidben, pkelsey)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/513 [editorial] 
  - #512 Lessen possibility of client implementation choices undermining GREASE cover (1 by pkelsey)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/512 [parked] 

* tlswg/tls13-spec (+0/-1/💬3)
  3 issues received 3 new comments:
  - #1278 token_binding does not have TLS 1.3 extension markers in IANA (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1278 
  - #1224 HRR server behavior is underspecified (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1224 [propose-close] 
  - #1223 HRR consistency requirements are too strict (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1223 [propose-close] 

  1 issues closed:
  - token_binding does not have TLS 1.3 extension markers in IANA https://github.com/tlswg/tls13-spec/issues/1278 



Pull requests
-------------
* tlswg/tls13-spec (+0/-1/💬1)
  1 pull requests received 1 new comments:
  - #1275 Clarify unsolicited (1 by ekr)
    https://github.com/tlswg/tls13-spec/pull/1275 

  1 pull requests merged:
  - Fix reference to MGF1
    https://github.com/tlswg/tls13-spec/pull/1279 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team