[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 13 November 2022 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9494CC14CF00 for <tls@ietfa.amsl.com>; Sat, 12 Nov 2022 23:38:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.695
X-Spam-Level:
X-Spam-Status: No, score=-6.695 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=WZVpCf7+; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=K/cqpfS5
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 73UFIQINRJlc for <tls@ietfa.amsl.com>; Sat, 12 Nov 2022 23:38:48 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEAE1C14CEED for <tls@ietf.org>; Sat, 12 Nov 2022 23:38:48 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 0F3745C0081 for <tls@ietf.org>; Sun, 13 Nov 2022 02:38:48 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Sun, 13 Nov 2022 02:38:48 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm2; t=1668325128; x= 1668411528; bh=E9bd+5TDz0ud4NW7aABNpuYxmIFbvkOKgvWM1F9TVKI=; b=W ZVpCf7+5y/vVNqHxtQSMwF0xNMMJRJzo2piTmB0gWn5ME42dRObiClxDUTns68FJ db86c3VfF9shKXaJB7I/H6nTUAs8Lz5/URXfHgKzgHEY9gCgjJbBBQsBK5hjn9zb 0lIXUu7q6z68ux+U6vMucdIm4ESNSEJvhm3U1ssL9qtr2fS9K5+AnQ5Fdnw2G9RD 8QnTSR258st4P3LTPUkSuZJ/RExm3lsvISARS78LCkuE/Hf1/JgxBAilKiJK9xaZ soy25njzp8jeH75x4NqNhgARZ+pSztAVJXAj/FspCpgb6YZ5TO5N7/GinVlpAMTr eggEulUyhlpGLWq9gahAQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:feedback-id :feedback-id:from:from:in-reply-to:mime-version:reply-to:sender :subject:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; t=1668325128; x=1668411528; bh=E 9bd+5TDz0ud4NW7aABNpuYxmIFbvkOKgvWM1F9TVKI=; b=K/cqpfS5mkfpvO4df yxrWt+Frs/C5nnQ2Qv2TDKWUR+UC22jr/NqnOU/yfl4wuoPyHuBA39EZZdkUN3to J3EuWyiCZjFcs+HCf38B9U6kkLbIfX4xn196+33LilIPATk0fnfFXEHWvCfcQsJH A5eXL9/x0v3haTAKRJcqzOxFhXBcUEVAm0U1gxUHtPmPBrcL4XiSTyUJ5ojouC0l gbSR0rcsPsUszNdj65VUVVR0kDWgsZgUVFD606llE21h5Qbf5UXUDV1UzoYhlCDB aJxEyVRkG5Cft2U0fbq7rsg/b8kfyOUNB4fr454HqE04MeXUpi+qqVptDHrKAvdZ vP19w==
X-ME-Sender: <xms:B59wY_McFoOZmQ6sGPGY_XSP0TffbKf_Cl14rD3uebStqD6zXghzdA> <xme:B59wY5_BZmAwxmqnXlRAE0s8yW6oqBiqZsilDGBdqXx3Ui9FEwH9kV-gxrtIqJPCE BPjyo5TH-rQZprbPw>
X-ME-Received: <xmr:B59wY-SiqbX_2523gEsqTwzLoMDg-a8mqvD4rw4hPX0MP_2Cnr7lNhGfWsHmYxBaj4YZBNXPzH5h29K90KLzzmc6c0Bdy5dlLiioaTAJgMaOBM3YxCtVKap138JH6uOhSt7i>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvgedrfeelgdduuddvucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:B59wYzufpuheGgWrLD5XOAI83ilSVES9KpEDmWDsl6r1ztHLCh2Cpg> <xmx:B59wY3eSqPJV60kkPvCUsVpQzj7OZnP6nC4fyXgAAvwhD9uM7dwd-g> <xmx:B59wY_3i932fBQ1pUQWhaPAaJEWk8H_CYJqtqR0TlRfcPxmXeX6ztg> <xmx:CJ9wY1rpP2yT5yjuWvfQut47OdSr9hquC7LG6Lxfqetc5Zk7id5UVg>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 13 Nov 2022 02:38:47 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============0904473108708004039=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20221113073848.BEAE1C14CEED@ietfa.amsl.com>
Date: Sat, 12 Nov 2022 23:38:48 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/Rswz6OTx2kk5kMg4Y-L00ihd8t4>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Nov 2022 07:38:53 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+1/-0/💬4) 1 issues created: - Use of MAY in section 5 needs to be fixed up (by pkelsey) https://github.com/tlswg/draft-ietf-tls-esni/issues/542 2 issues received 4 new comments: - #513 Split mode correlation attacks (3 by davidben, pkelsey) https://github.com/tlswg/draft-ietf-tls-esni/issues/513 [editorial] - #512 Lessen possibility of client implementation choices undermining GREASE cover (1 by pkelsey) https://github.com/tlswg/draft-ietf-tls-esni/issues/512 [parked] * tlswg/tls13-spec (+0/-1/💬3) 3 issues received 3 new comments: - #1278 token_binding does not have TLS 1.3 extension markers in IANA (1 by ekr) https://github.com/tlswg/tls13-spec/issues/1278 - #1224 HRR server behavior is underspecified (1 by ekr) https://github.com/tlswg/tls13-spec/issues/1224 [propose-close] - #1223 HRR consistency requirements are too strict (1 by ekr) https://github.com/tlswg/tls13-spec/issues/1223 [propose-close] 1 issues closed: - token_binding does not have TLS 1.3 extension markers in IANA https://github.com/tlswg/tls13-spec/issues/1278 Pull requests ------------- * tlswg/tls13-spec (+0/-1/💬1) 1 pull requests received 1 new comments: - #1275 Clarify unsolicited (1 by ekr) https://github.com/tlswg/tls13-spec/pull/1275 1 pull requests merged: - Fix reference to MGF1 https://github.com/tlswg/tls13-spec/pull/1279 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra… Repository Activity Summary Bot