[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 13 June 2021 07:39 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 795C23A0D38 for <tls@ietfa.amsl.com>; Sun, 13 Jun 2021 00:39:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=YG3OJ6JN; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=FLT48kPk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ryrFDoT2ZkA for <tls@ietfa.amsl.com>; Sun, 13 Jun 2021 00:39:22 -0700 (PDT)
Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F093E3A0D35 for <tls@ietf.org>; Sun, 13 Jun 2021 00:39:21 -0700 (PDT)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id 5939F10D9 for <tls@ietf.org>; Sun, 13 Jun 2021 03:39:20 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Sun, 13 Jun 2021 03:39:20 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm3; bh=C4EWg/p3KXN nCSCmVKQ2XeMveJ/6StGaSTbTuIIEFXc=; b=YG3OJ6JNXaDkeqv1K6aAved3SyN tejs46T299h5JrMvI1+/9DT/+5Y13EYpws7Cq1mF7ilDs1B0LnMcMKMK3+rv/40G X4LJvlgI1W2NGqbI992gxJwZTgUHVwg/jez6TrSllRo2fbZfmHRj2HjsTP5vAdq+ 3BXo5pbcTZ6LpycanazuZ46rVGbcTrEKh+t7kYkU3cjNCmWI62+S6l3ieoMKTGmK pFBt5DH7w9qxL+f1NEGL09OHBOhaI2LEFLu1RpnumyIyizbEE7/hOQqFaFON63Dc oMZp6f1j6MGLBqEW0KXKNqRG+ZvlizSuqX43u8/SKDnpIsIyYTOzxxSstEQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=C4EWg/p3KXNnCSCmVKQ2XeMveJ/6StGaSTbTuIIEFXc=; b=FLT48kPk aM+IlYykWDxeR4WoUYabhiM188YON+9Kj4COEg+Itrd5nmTKgx0FzeRv7SAQEuXT 5fWP7ZW/msMdeso8clr+A3vsqV+yGxSEZmq/tUeYmzs+y/r6qPbwKwILHWU6Ywji tCqamlrvhbYd4kEZ3iKV37jXU8FE3rV9TU62ytoqwsCsNGtWVjGwJ2iSirffAcRW F+9zQjhsRFE0yb+NdVZNAZGwGbD1OtwZ7hLMObrktIJWXGxuV4TKLOHiOVVqNIHM YRrpkOmUOVVOlKnSssE2izQwm8e0yT3YnbgQiCNp1kTmt/irwnFfZCrPzhdKahsl i4rvkR6s+3KU8A==
X-ME-Sender: <xms:J7bFYFVPdghedA8XrBEBHUwg9_ym5xgcAhwgDSOkGA8N__lmt7XMmw> <xme:J7bFYFlB-AUYKAwFFNHQf_59YV4TDpNjuunp3WAUTw_5nM3Bg8MqL2mdQ8Mqm1Ss4 XL7ZMKxWIGJgNJy0Q>
X-ME-Received: <xmr:J7bFYBYh1vgoULD14E31AZ0DZfCGE0WUrC4LvgAZeMmL9_DblAWXZpxo7wjvvOs6gBsj8aLSZhLSLkytM6jKteUXIqdKtiyhUWWhG_qWteIZVTM60jLwooDMfZQodmFG7vUh>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfedvvddgvdduucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedunecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:J7bFYIVGES7yHuYLRZNPTU79q3xlzPWsdspzH2CqRebV9z5GJf_44Q> <xmx:J7bFYPlIlrfo28M60FfGaLaOD5AVfZAf5t6CnNxfy7k2txac0kFtOA> <xmx:J7bFYFdk_-QrnQiVaxy-uIqwEWLUevQ9oNrtG1Kb4nmb9AzjQhVdUg> <xmx:J7bFYEwcevGweaTNXpmpNDMddx1Sb7Egu0BKWXIaaPIqEMyDTxH3rA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 13 Jun 2021 03:39:19 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============3000706944066257042=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210613073921.F093E3A0D35@ietfa.amsl.com>
Date: Sun, 13 Jun 2021 00:39:21 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/VevS0kzSSOf_KxlCHpc4yqFjPhk>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Jun 2021 07:39:27 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+5/-8/💬16)
  5 issues created:
  - Make the definition of key protocol elements easier to find (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/454 
  - Provide a link to this repo in the draft (by martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/453 
  - Reserve some code points for GREASE (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/451 
  - Grease HRR acceptance signal? (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/450 
  - Acceptance signal isn't pseudorandom (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/448 

  7 issues received 16 new comments:
  - #453 Provide a link to this repo in the draft (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/453 
  - #450 Grease HRR acceptance signal? (6 by chris-wood, davidben, martinthomson, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/450 
  - #448 Acceptance signal isn't pseudorandom (1 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/448 
  - #441 Reconsider non-HRR ECH acceptance signal (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/441 
  - #437 Example unsupported mandatory Configuration Extension (3 by davidben, sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/437 [editorial] 
  - #397 Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API (3 by chris-wood, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/397 [design] 
  - #359 Transcript hash construction (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/359 [design] 

  8 issues closed:
  - Including the client's ephemeral public key in the AAD precludes use of a single-shot HPKE API https://github.com/tlswg/draft-ietf-tls-esni/issues/397 [design] 
  - Transcript hash construction https://github.com/tlswg/draft-ietf-tls-esni/issues/359 [design] 
  - Example unsupported mandatory Configuration Extension https://github.com/tlswg/draft-ietf-tls-esni/issues/437 [editorial] 
  - Acceptance signal may not be pseudorandom https://github.com/tlswg/draft-ietf-tls-esni/issues/448 
  - Provide a link to this repo in the draft https://github.com/tlswg/draft-ietf-tls-esni/issues/453 
  - ECH contradicts second ClientHello consistency requirements in RFC8446 https://github.com/tlswg/draft-ietf-tls-esni/issues/358 [design] 
  - Proposal: Introduce HelloRetryRequestOuter/Inner https://github.com/tlswg/draft-ietf-tls-esni/issues/374 [design] 
  - CHI vs. CHO when HRR is sent https://github.com/tlswg/draft-ietf-tls-esni/issues/373 [design] 

* tlswg/dtls13-spec (+1/-0/💬4)
  1 issues created:
  - Should the protocol specify a mechanism to ensure that the link is disconnected if the peer is restarted or some reason? (by yangyangtiantianlonglong)
    https://github.com/tlswg/dtls13-spec/issues/248 

  1 issues received 4 new comments:
  - #248 Should the protocol specify a mechanism to ensure that the link is disconnected if the peer is restarted or some reason? (4 by ekr, yangyangtiantianlonglong)
    https://github.com/tlswg/dtls13-spec/issues/248 

* tlswg/dtls-conn-id (+0/-0/💬3)
  3 issues received 3 new comments:
  - #109 John Scudder's IESG review (1 by kaduk)
    https://github.com/tlswg/dtls-conn-id/issues/109 
  - #107 Martin Duke's IESG review (1 by kaduk)
    https://github.com/tlswg/dtls-conn-id/issues/107 
  - #103 Éric Vyncke's IESG review (1 by kaduk)
    https://github.com/tlswg/dtls-conn-id/issues/103 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+7/-7/💬39)
  7 pull requests submitted:
  - Define the Padding message (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/457 
  - Require that someone validate public_name correctly. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/456 
  - Require compressed extensions appear in the same relative order. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/455 
  - Document the other ech_outer_extensions DoS vector. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/452 
  - Accept conf hkdf (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/449 
  -  Leave IPv4 address parsing to the application (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/447 
  - Rephrase maximum_name_length description. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/446 

  13 pull requests received 39 new comments:
  - #457 Define the Padding message (5 by cjpatton, davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/457 
  - #455 Require compressed extensions appear in the same relative order. (4 by chris-wood, davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/455 
  - #452 Document the other ech_outer_extensions DoS vector. (3 by chris-wood, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/452 
  - #449 Make the acceptance signal pseudorandom (2 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/449 
  - #447  Leave IPv4 address parsing to the application (1 by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/447 
  - #443 Move ClientHello padding to the encoding. (3 by chris-wood, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/443 
  - #442 Preserve length prefixes in ClientHelloOuterAAD (6 by cbartle891, chris-wood, davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/442 
  - #436 Prohibit IP addresses in ECHConfig.public_name. (8 by chris-wood, davidben, richsalz, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/436 
  - #423 Confirm ECH acceptance after HRR (2 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/423 
  - #422 Use ECH payload to distinguish CHI from CHO (2 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/422 
  - #417 HRR applies to both (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/417 
  - #416 Don't make a new handshake (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/416 
  - #313 Replace record-level padding with handshake-level padding (1 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/313 

  7 pull requests merged:
  - Add some security considerations for cookie values.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/439 
  - Make the acceptance signal pseudorandom
    https://github.com/tlswg/draft-ietf-tls-esni/pull/449 
  - Use ECH payload to distinguish CHI from CHO
    https://github.com/tlswg/draft-ietf-tls-esni/pull/422 
  - Confirm ECH acceptance after HRR
    https://github.com/tlswg/draft-ietf-tls-esni/pull/423 
  - Preserve length prefixes in ClientHelloOuterAAD
    https://github.com/tlswg/draft-ietf-tls-esni/pull/442 
  - Rephrase maximum_name_length description.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/446 
  - Link to sections of references.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/445 

* tlswg/dtls-conn-id (+4/-1/💬6)
  4 pull requests submitted:
  - update RRC ref (by thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/pull/121 
  - Mention padding and ContentType encryption (by kaduk)
    https://github.com/tlswg/dtls-conn-id/pull/120 
  - clarify "replace the address" (by kaduk)
    https://github.com/tlswg/dtls-conn-id/pull/119 
  - fix section reference to RFC 8446 for presentation language (by kaduk)
    https://github.com/tlswg/dtls-conn-id/pull/118 

  1 pull requests received 6 new comments:
  - #119 clarify "replace the address" (6 by boaks, ekr, kaduk)
    https://github.com/tlswg/dtls-conn-id/pull/119 

  1 pull requests merged:
  - fix section reference to RFC 8446 for presentation language
    https://github.com/tlswg/dtls-conn-id/pull/118 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team