[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 09 March 2025 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A4F73941FE4 for <tls@mail2.ietf.org>; Sat, 8 Mar 2025 23:38:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.398
X-Spam-Level:
X-Spam-Status: No, score=-2.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="hmCXDOCs"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="nGe4ilGG"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1qk11O_JCoW6 for <tls@mail2.ietf.org>; Sat, 8 Mar 2025 23:38:40 -0800 (PST)
Received: from fout-a1-smtp.messagingengine.com (fout-a1-smtp.messagingengine.com [103.168.172.144]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 3C02A941FC1 for <tls@ietf.org>; Sat, 8 Mar 2025 23:38:40 -0800 (PST)
Received: from phl-compute-10.internal (phl-compute-10.phl.internal [10.202.2.50]) by mailfout.phl.internal (Postfix) with ESMTP id 21D3C13826AB for <tls@ietf.org>; Sun, 9 Mar 2025 03:38:40 -0400 (EDT)
Received: from phl-mailfrontend-02 ([10.202.2.163]) by phl-compute-10.internal (MEProxy); Sun, 09 Mar 2025 03:38:40 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm2; t= 1741505920; x=1741592320; bh=6lk2RKgjwq8GMP7S1pBNyA7cGXtLla8xRMp Atcv1EGU=; b=hmCXDOCsRGm2qxxCJELMXCNuyI7/NHhUEcOlOcP7m5CkilbRBsP oXMJaGrtAzBtylftKOohYxXs/kLdKXl6xxZW8jBewFVJs8obd9aZUm/vtISovHUJ h4juoW8cXcs9xDU442+EpWMFCpHqPHryoMgOWz48RWIUk63C5dYUN14AclDmZ3oN iDA71ZvAc0qRrwbgUSOHm6JRGz5+oX47wRe9SSwDZ+f1h6WuA/H9Hz549h/1qwNY coyrCo3TsnY5/NR4i3LiHc0xrzuDRWsRScMIm9d+K0o5by6Iyv2xOjVrqHHRByh8 ad8vYCf2nJNFiSyBuEHrU60qPwDHpovd05Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; t=1741505920; x=1741592320; bh=6 lk2RKgjwq8GMP7S1pBNyA7cGXtLla8xRMpAtcv1EGU=; b=nGe4ilGGn8jjmJpAx +Q7KWYd8lVm0WG+5XrxLE7epmSJEfkPs+WXHYsH48SrWz0zQb5N+autzaPAEADLh 9rc2NE5ZOacsBMlvsdrdMaXl8XgGNY0aXafRDAZKPsvgPMn7Amtd91KiZucnhgFZ jahIuAdVsPTsL0ojBxZqbD80M1r0iXS6bPwJy/vAUkc7ZwRFqMggtcdX4svtsIPo u8gTdyfL2ppuRWtMOrZjfHtuzFimiLDksccAqmiwnkLHA1TSSz1RWVgTWeRl1P5g TZZK5h/I51rfJIZhpMO3NeHRowxrdeaaHD1n6bqgyKYdgrXZKP88fQH2AWOI4ify Gs2+Q==
X-ME-Sender: <xms:f0XNZ6WIK66ZM24Scr7hteWPVPGmF2GljF0mtW7hgrA7jOU8jL81jA> <xme:f0XNZ2mIX5vl7dX95GFxZWxC98Cjtl-90TOpXFcA7xeIYRg7uLRnm666JaH-Gg_ve fdFn4_Bl0T_Qm_4RA>
X-ME-Received: <xmr:f0XNZ-bCZ8KoFA6-wBRmtUlEl0G2N2FNWDQflmKH9BCl5aKjBvJ35wNCSkOW>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeefvddrtddtgdduudehkeeiucetufdoteggodetrf dotffvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdggtfgfnhhsuhgsshgtrhhisggv pdfurfetoffkrfgpnffqhgenuceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuc hfihgvlhguucdlgeelmdenucfjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhm peftvghpohhsihhtohhrhicutegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoug hopghnohhtpghrvghplhihsehmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeef vdduteejvdefkeehieevuefgfefhteetveegffekffefteffvdelheduieetnecuffhomh grihhnpehgihhthhhusgdrtghomhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgr mhepmhgrihhlfhhrohhmpeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtpdhnsg gprhgtphhtthhopedupdhmohguvgepshhmthhpohhuthdprhgtphhtthhopehtlhhssehi vghtfhdrohhrgh
X-ME-Proxy: <xmx:f0XNZxUMNGSu1UpC4--FJm74pR-zoAbZEI3fPY0POKOj8jRrXmKcIw> <xmx:f0XNZ0nHowKGetSGEOVIei_6NVPSjZEa_x45eVavcQ6MlfMS5JrIwQ> <xmx:f0XNZ2cM-sqSGviB9PmDStrLwQqolzSfli4weyHKdkDKltfuORXCNA> <xmx:f0XNZ2FjLUeqyQ39dtcv7aBZft9aPbJEJRhd1KgTlEgy_GiyMYv4MQ> <xmx:gEXNZ5wUO_FFkuiCUIUjH_80p05fsFb8w2s9S8GGcFw3Re0GQOFISzbl>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 9 Mar 2025 03:38:39 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============4554981683219156132=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20250309073840.3C02A941FC1@mail2.ietf.org>
Date: Sat, 08 Mar 2025 23:38:40 -0800
Message-ID-Hash: MJIMUKBIUHNHF2QHPPNHNRTXGGNURWJH
X-Message-ID-Hash: MJIMUKBIUHNHF2QHPPNHNRTXGGNURWJH
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/SDdaEofyqzzMSdhpEdZB9sOdZzw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>



Issues
------
* tlswg/dtls13-spec (+16/-2/πŸ’¬3)
  16 issues created:
  - Contributions from David Benjamin (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/315 
  - Check with Implementers (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/313 
  - Replay protection of post-handshake messages (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/312 
  - Formal Analysis (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/311 
  - RPK and Misbinding Attack (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/310 
  - Proposed Codepoint Glitch (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/309 
  - ACKs and Epochs (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/307 
  - Wrapping of message_seq (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/305 
  - Key Update Limit (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/303 
  - Term "initial handshake" removed (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/301 
  - ServerHello "legacy_session_id_echo" field (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/299 
  - Legacy Session ID (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/297 
  - Receiving ACK Handling (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/295 
  - 128-bit value used in ACK message (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/293 
  - DTLS 1.3 ACKs near the version transition (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/291 
  - Key Update Errata (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/290 

  2 issues received 3 new comments:
  - #287 Old email for Hannes (1 by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/287 
  - #282 Whats the status of this? (2 by eabase, hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/282 

  2 issues closed:
  - Whats the status of this? https://github.com/tlswg/dtls13-spec/issues/282 
  - Old email for Hannes https://github.com/tlswg/dtls13-spec/issues/287 

* tlswg/rfc8447bis (+1/-0/πŸ’¬0)
  1 issues created:
  - AD review comments (by seanturner)
    https://github.com/tlswg/rfc8447bis/issues/60 



Pull requests
-------------
* tlswg/dtls13-spec (+11/-0/πŸ’¬0)
  11 pull requests submitted:
  - Update to Contributor Section (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/314 
  - Proposed Codepoint Glitch (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/308 
  - ACKs and Epochs (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/306 
  - Wrapping of message_seq (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/304 
  - Key Update Limit (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/302 
  - Term "initial handshake" removed (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/300 
  - ServerHello "legacy_session_id_echo" field (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/298 
  - Legacy Session ID (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/296 
  - Receiving ACKs Handling (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/294 
  - 128-bit value used in ACK message (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/292 
  - Key Update Handling (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/289 

* tlswg/rfc8447bis (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Addressing AD comments (by seanturner)
    https://github.com/tlswg/rfc8447bis/pull/61 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/dnssec-chain-extension
* https://github.com/tlswg/draft-deprecate-obsolete-kex
* https://github.com/tlswg/draft-ietf-tls-cert-abridge
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/draft-ietf-tls-ecdhe-psk-aead
* https://github.com/tlswg/draft-ietf-tls-ech-keylogfile
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-grease
* https://github.com/tlswg/draft-ietf-tls-iana-registry-updates
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-svcb-ech
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/draft-ietf-tls-tls13-vectors
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/dtls-rrc
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/rfc4492bis
* https://github.com/tlswg/rfc8447bis
* https://github.com/tlswg/rfc8773bis
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/sslkeylogfile
* https://github.com/tlswg/sslv3-diediedie
* https://github.com/tlswg/super-jumbo-record-limit
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/tls-key-share-prediction
* https://github.com/tlswg/tls-key-update
* https://github.com/tlswg/tls-record-limit
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/tls12-frozen
* https://github.com/tlswg/tls13-pkcs1
* https://github.com/tlswg/tls13-rfc


-- 
To have a summary like this sent to your list, see: https://github.com/ietf-github-services/activity-summary