[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 13 December 2020 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 936503A163C for <tls@ietfa.amsl.com>; Sat, 12 Dec 2020 23:38:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=UIAv0kxb; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=a29Z4W+w
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TGwxGcFsNmCG for <tls@ietfa.amsl.com>; Sat, 12 Dec 2020 23:38:44 -0800 (PST)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 982303A15F1 for <tls@ietf.org>; Sat, 12 Dec 2020 23:38:36 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id B2AFA5C00A7 for <tls@ietf.org>; Sun, 13 Dec 2020 02:38:35 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 13 Dec 2020 02:38:35 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=kPdqrbIuTEIAy19BzphswJ1KoBXt11yEq8OTFYVWHYg=; b=UIAv0kxb UqbqsVf/y2eRGDv9MLARc75bRsMCADknkwLe9L5djdQuHcc1SnxDp3zt1VBcePSL lOp9ZZgopH6OZ8VgF4WUgSgYxgseVzxw2dd89WavYu1DmIflXc6phUgQK6J0vDjb YQeGoS1BvqLaZiVaQyhbmMnO/74oC8YQ0p6DuUFrWM/KPhDiGaPWk0n8txuLRwy6 DtyjaDTeyMCGz2jRjIEeJPJAydNEUtqh3k1+n6VTZeJvc9MXW83dCpvUQcqfbmmH Gfavb59NxrmAtfLZDn0U0zSTMT9dgns1cgf2W9VrDNZhG7j8qj0+L0+yQ8B7ARQn acwoNezD5/FyBg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=kPdqrbIuTEIAy19BzphswJ1KoBXt1 1yEq8OTFYVWHYg=; b=a29Z4W+wUvUp2I/N7STftEL+MbdpAqerz9LVx9W+RiunO n5rPm8GSe+zAtSbzvYOwEvz0ULqgNT4Zj1gRA057mL6IQ+CrOgCor/rnnllMZrXt b9z1ZD3GeG+ovkA/6k9t9lchsJ6idGfYUfZ30cY3NpGOlMmYyEzHkK/P4miiyZ4z iYOPHy8Ohcg7paWqntLgfR/azAtBTc2UUBVy0N8Lg6Zb2UHbSVrS6W1SqZ0E345z bmm+G26i4h9j8bO9ocMOdBh7cn9selznfn8mbn9SFqEO6wog+xbAnQKXSDn6aQjb Nf0i/5Hp6hsS1+DGxJu73hdSEPs5/56NvZsabfpeg==
X-ME-Sender: <xms:-8TVX0lywQT6myN6FTF8tQ5WPY6RQEfoujTP8WSWHx3NBMAwty1-ow> <xme:-8TVXz1bTcTM4lHVEC6zSkM0b_0JMPYRFSBFZhtPq8akqy9jpF28MJ_6EjLb3DXDB 9F0xyWXxfZhvRSouw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrudekhedgudduudcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppedufedrjeejrdekuddrud eileenucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:-8TVXyr_hA5TA3kimnTVOyzejkJHR2Wo0BFeCX1kmHBiaRP1OFsciw> <xmx:-8TVXwnNe5cPqiwuQ9TLCtZSD_gDW7rob-EornRywaKpV0jxoxey6g> <xmx:-8TVXy0nfMgQiIyyLMq2JeYQtV7eAONvuVbNZVEggAsqnK-DPkMvfQ> <xmx:-8TVX38Q8r-FQCwvX2aPPJ8dBcnVV194TBQ0nZUUz3ci2Uu0NU3g8g>
Received: from fv-az184-911.internal.cloudapp.net (unknown [13.77.81.169]) by mail.messagingengine.com (Postfix) with ESMTPA id 778FB240057 for <tls@ietf.org>; Sun, 13 Dec 2020 02:38:35 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============6948918040883546692=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20201213073835.778FB240057@mailuser.nyi.internal>
Date: Sun, 13 Dec 2020 02:38:35 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/XpUK02owKEtnZTqLAlAIWJCoUdE>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Dec 2020 07:38:48 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+0/-0/πŸ’¬12)
  3 issues received 12 new comments:
  - #369 Potential SNI leak via cross-ECH resumption (3 by cbartle891, chris-wood, kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/369 
  - #359 Transcript hash construction (1 by kylon94)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/359 [ready-for-text] 
  - #354 "Don't stick out" considerations for ECH (8 by bemasc, cbartle891, chris-wood, cjpatton, ekr, huitema)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/354 

* tlswg/tls13-spec (+1/-0/πŸ’¬0)
  1 issues created:
  - More clarity on what should be in the cookies. (by ekr)
    https://github.com/tlswg/tls13-spec/issues/1206 

* tlswg/dtls13-spec (+7/-2/πŸ’¬8)
  7 issues created:
  - Ben Kaduk's review requested a number of example fixes. (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/187 
  - When can you send NCID and RCID (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/186 
  - Add an example for KeyUpdate (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/176 
  - PDU appendix generator is not working properly. (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/175 
  - Say something about how large cert messages may cause congestion (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/174 
  - DTLS version number (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/170 
  - Encryption limits are too long for SN encryption (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/167 

  4 issues received 8 new comments:
  - #187 Ben Kaduk's review requested a number of example fixes. (2 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/187 
  - #186 When can you send NCID and RCID (1 by kaduk)
    https://github.com/tlswg/dtls13-spec/issues/186 
  - #170 DTLS version number (2 by davidben, ekr)
    https://github.com/tlswg/dtls13-spec/issues/170 
  - #167 Encryption limits are too long for SN encryption (3 by ekr, kaduk, martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/167 

  2 issues closed:
  - PDU appendix generator is not working properly. https://github.com/tlswg/dtls13-spec/issues/175 
  - Encryption limits are too long for SN encryption https://github.com/tlswg/dtls13-spec/issues/167 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬1)
  1 pull requests submitted:
  - Clarify privacy goal scope (by kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/371 

  1 pull requests received 1 new comments:
  - #371 Clarify privacy goal scope (1 by kjacobs-moz)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/371 

* tlswg/dtls13-spec (+18/-9/πŸ’¬2)
  18 pull requests submitted:
  - Rationale for spare cids (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/185 
  - Some proposed editorial improvements from Ben Kaduk (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/184 
  - Remove stale text about out-of-epoch records (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/183 
  - Not totally indefinitely (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/182 
  - Some textual clarifications around when ACKs are sent (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/181 
  - Alerts are unreliable (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/180 
  - Rcid excessive (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/179 
  - Clarify when you can reset the timer (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/178 
  - Records with bogus epochs should be discarded, not generate alerts (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/177 
  - Fix some issues around the Finished message (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/173 
  - The advise to aggressively age out was too aggressive (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/172 
  - Don't require always buffering and require that retransmission be ide… (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/171 
  - Stop citing RFC2522 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/169 
  - PMTU estimates (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/168 
  - Require that cipher suites define a record number encryption algorithm (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/166 
  - Fixed portions of the record layer (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/165 
  - Clean up use of connection and association (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/164 
  - Reference tls-old-versions-deprecate (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/163 

  2 pull requests received 2 new comments:
  - #179 Rcid excessive (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/179 
  - #161 Ciphersuites seems to miss a "_8" (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/161 

  9 pull requests merged:
  - Remove stale text about out-of-epoch records
    https://github.com/tlswg/dtls13-spec/pull/183 
  - Not totally indefinitely
    https://github.com/tlswg/dtls13-spec/pull/182 
  - Some textual clarifications around when ACKs are sent
    https://github.com/tlswg/dtls13-spec/pull/181 
  - Clarify when you can reset the timer
    https://github.com/tlswg/dtls13-spec/pull/178 
  - Fix some issues around the Finished message
    https://github.com/tlswg/dtls13-spec/pull/173 
  - Fixed portions of the record layer
    https://github.com/tlswg/dtls13-spec/pull/165 
  - Clean up use of connection and association
    https://github.com/tlswg/dtls13-spec/pull/164 
  - Reference tls-old-versions-deprecate
    https://github.com/tlswg/dtls13-spec/pull/163 
  - editorial/nits from AD review
    https://github.com/tlswg/dtls13-spec/pull/160 

* tlswg/dtls-conn-id (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - It is no longer true that an empty CID and no CID are the same (by ekr)
    https://github.com/tlswg/dtls-conn-id/pull/78 

* tlswg/tls-subcerts (+0/-0/πŸ’¬3)
  1 pull requests received 3 new comments:
  - #77 Add in test vectors (3 by chris-wood, claucece, wbl)
    https://github.com/tlswg/tls-subcerts/pull/77 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team