[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 27 September 2020 07:33 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B9A63A09D8 for <tls@ietfa.amsl.com>; Sun, 27 Sep 2020 00:33:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=N01zNmyB; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=JvMdHFi0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVClWj8PQPrm for <tls@ietfa.amsl.com>; Sun, 27 Sep 2020 00:33:20 -0700 (PDT)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A70BD3A09B0 for <tls@ietf.org>; Sun, 27 Sep 2020 00:33:20 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 15B685C00AC for <tls@ietf.org>; Sun, 27 Sep 2020 03:33:20 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 27 Sep 2020 03:33:20 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm3; bh=qFf8doNhySHj6Prb8HvALHUVEqxPucNpJXGJ+U2ow6U=; b=N01zNmyB TbumK2N08uEKtFJwC1+1ZnChJDNfJ4ReOvhjxfsy9xb65YVsD7fIwvxDpk+Y/HnH QQImyR4SXF1ZmNlzkDhIWGQL0YZutESlrsNOtif/XEtgyTQKseJ/l6XGfTIKBZZx F+zzuCiIgEBSWq8vu34t5XLhxlOaSi5SN34xtc2o1+y67V2oKX2g12ajnHEqQnID XmOxZPrLZwQjSwYBDxHIFdGnyNqQrGj12GeCG0eM2vkPc/R6rBf7E0iXQ0PjNVrE DBLuPUiFLg/DxmtnpEeg/99Tzqzicp9Y52/z9sF8Pv4fLTz+FM0XEpZCuRsPq/Zo /Ay5/TL6BV6y0A==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=qFf8doNhySHj6Prb8HvALHUVEqxPu cNpJXGJ+U2ow6U=; b=JvMdHFi0aehDzrL0CrpxDhzkMjnrrkBQ+NTFOhbvnYxNx rq6cek1rr1I6DQE52zAiBDfb1+Arw8t+hXoAJl1MUTjEZZPmWFf3arpfn6ItMYn6 ePM4N/AUK1LXqSgzzTE6QyddxIf5hPIrM6pNdmRC1/twsPsD6Xuo1jqDdn6PTPlh WJA8NFkMnzTW47m2zlUlBxP08peTg6xtkzT5r6w2XYoVBo/yaavAzIEua7gpkm2Y qQF1tytvAzMV862LjZQkoPG1FaFH9gPK0qISGlHL5HcUBAcMm0ELWhENdwSSSCmJ EexvAxAffe8dMk8mdgYBdj+b1iWxbrc6JlL/2vgFg==
X-ME-Sender: <xms:P0BwX3TrMV0o5DkxPP_ctM1mTbQaZmiXeHhMGcXqQ7a3CylYfmzOCw> <xme:P0BwX4yUsXblQ-E8cThIUxfNHwZZceTXLKZsnDICAs0LNuWExraSalqlZKicKqy43 B18-ySbaYgd9B7NeQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrvdefgdduudefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpegtggfhvffusegrtddtredttdejne cuhfhrohhmpeftvghpohhsihhtohhrhicutegtthhivhhithihucfuuhhmmhgrrhihuceu ohhtuceoughopghnohhtpghrvghplhihsehmnhhothdrnhgvtheqnecuggftrfgrthhtvg hrnhepkeefvdduteejvdefkeehieevuefgfefhteetveegffekffefteffvdelheduieet necuffhomhgrihhnpehgihhthhhusgdrtghomhenucfkphepudefrdeltddrfeekrdehie enucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgp nhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:P0BwX81fgmVzkD1p1cb8RwLPnIsXJQhMhi4WM0vy7QdZPhW-FVb1QA> <xmx:P0BwX3BkdLYqMq6I5nx2cfy3vGoI-OkQfFunllGh6J_2Z0uJ0J-n9A> <xmx:P0BwXwgoTzWSZVOIbVPazf-VZwfn7BCoMhGiN0d1cKS09p5Byr-4jw> <xmx:QEBwX8aN6f5JS6wL4hTJhoQKVm4nRkGDtm2zzcLGSB7bFs37cOfPsQ>
Received: from fv-az52.internal.cloudapp.net (unknown [13.90.38.56]) by mail.messagingengine.com (Postfix) with ESMTPA id D020A3280059 for <tls@ietf.org>; Sun, 27 Sep 2020 03:33:19 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============4409991395119343782=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200927073319.D020A3280059@mailuser.nyi.internal>
Date: Sun, 27 Sep 2020 03:33:19 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/WyBvYe24sz2ePt3Bz4SVFUKAVdM>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Sep 2020 07:33:29 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-6/💬25)
  1 issues created:
  - Add note on network/transport failure probability and ECH confirmation collision (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/307 

  10 issues received 25 new comments:
  - #295 Greasing to supporting servers (3 by chris-wood, cjpatton, wbl)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/295 
  - #285 Possible to simplify interaction with session resumption? (4 by chris-wood, cjpatton, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/285 
  - #284 Section number levels (2 by MikeBishop, chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/284 
  - #274 Usage indication: alternatives to trial decryption (2 by chris-wood, cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/274 [needs WG discussion] 
  - #264 Handshake-level vs record-level padding (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/264 [needs WG discussion] 
  - #263 "outer_extensions": What's the purpose of the hash? (2 by bemasc, cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/263 [needs WG discussion] [question] 
  - #260 Need a high-level description of the security goal in the intro (3 by chris-wood, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/260 
  - #253 Nonce rationale clarity (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/253 [needs WG discussion] 
  - #251 Common supported KEM (2 by chris-wood, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/251 [needs WG discussion] 
  - #233 Trial decryption after HelloRetryRequest (5 by cjpatton, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/233 

  6 issues closed:
  - Section number levels https://github.com/tlswg/draft-ietf-tls-esni/issues/284 
  - "outer_extensions": What's the purpose of the hash? https://github.com/tlswg/draft-ietf-tls-esni/issues/263 [needs WG discussion] [question] 
  - Need a high-level description of the security goal in the intro https://github.com/tlswg/draft-ietf-tls-esni/issues/260 
  - Common supported KEM https://github.com/tlswg/draft-ietf-tls-esni/issues/251 [needs WG discussion] 
  - Nonce rationale clarity https://github.com/tlswg/draft-ietf-tls-esni/issues/253 [needs WG discussion] 
  - Usage indication: alternatives to trial decryption https://github.com/tlswg/draft-ietf-tls-esni/issues/274 [needs WG discussion] 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+3/-5/💬5)
  3 pull requests submitted:
  - Address minor spec issues (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/308 
  - Add MTI cipher suite based on x25519, HKDF-SHA256, and AES-128-GCM. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/306 
  - Rewrite security and privacy goals (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/305 

  4 pull requests received 5 new comments:
  - #306 Add MTI cipher suite based on x25519, HKDF-SHA256, and AES-128-GCM. (1 by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/306 
  - #292 Remove "ech_nonce" extension and clarify client behavior (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/292 
  - #287 Add ECH confirmation (option (3), but use SH.random) (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/287 
  - #269 Proposal: Retry-only ECHConfig (2 by bemasc, chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/269 

  5 pull requests merged:
  - Address minor spec issues
    https://github.com/tlswg/draft-ietf-tls-esni/pull/308 
  - Rewrite security and privacy goals
    https://github.com/tlswg/draft-ietf-tls-esni/pull/305 
  - Add MTI cipher suite based on x25519, HKDF-SHA256, and AES-128-GCM.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/306 
  - Remove "ech_nonce" extension and clarify client behavior
    https://github.com/tlswg/draft-ietf-tls-esni/pull/292 
  - Add ECH confirmation signal
    https://github.com/tlswg/draft-ietf-tls-esni/pull/287 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease