[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 16 May 2021 22:19 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8B7D3A1B69 for <tls@ietfa.amsl.com>; Sun, 16 May 2021 15:19:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.797
X-Spam-Level:
X-Spam-Status: No, score=-2.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=eeTwv748; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=oAuyjRU7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5lxUTKHIGIAB for <tls@ietfa.amsl.com>; Sun, 16 May 2021 15:19:48 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 189113A1B57 for <tls@ietf.org>; Sun, 16 May 2021 15:19:48 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 34CA65C01CF for <tls@ietf.org>; Sun, 16 May 2021 18:19:47 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Sun, 16 May 2021 18:19:47 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm2; bh=Y8A/xViJ6rl V4rEPaIk8Cpt1Brc/AKm+UoeuvMJoyGk=; b=eeTwv748xoskTy5+/3evK53BJTe 1i+n12mcVCSjKATldE67U4m8CFCz2Mlc8nitLFrB0Augh0Gl5+KPfSDviJz7/qZ5 gS9eR0TZTmEmlpMk6aLrrLcm/5UZSZpeGGCtpx+1PdC8LEHNZKpbXOuwSwO7HtUJ 6KX4UqXNJlIP3bTP9O/h+hmUzgcnip1IlnEUzueh3IzWdL5wQb0bC7MDXbMcCX34 xPuAPdNvcd78shPCtu4QsdjXfRi5NkZ05IM4jkqvMPVuhq25SAV4oBwAEqtFG+1k dTHC5kFR8fjw9Gr73N3NB+0AZ5BNQVtYUaYkYXGvMwPczQ4Cyc094hxcW+g==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=Y8A/xViJ6rlV4rEPaIk8Cpt1Brc/AKm+UoeuvMJoyGk=; b=oAuyjRU7 jCKnpyD7iRN4z81POxkQIUmxeyxiJ4OsGOoqnhHh6pPCHHBydDkSNLEgyCI4uR18 d8i9YerM1rbFCOltpCbJlHb3e0juJY2Dm3Zy3JWzSLQWU7bXvli1F31k1xBPvhMW XR12txuEqmHaGsXX9wj62EMBG0YZjz+0lLzPSK7oY8XifkCP/CG5Whj9iDKh7dwR 5prkNMzXMXq2RC2IW8q0W37uCD8ndbtxcPLmjqnhGsh+C5365QLLgUsAi13j6SYf rKpHdAJNFMBGPfio4jIspKPRsFD3wLS4yikVtabt1t//PDqPuuFltlC/FCZy3iDm 2pc0RKNRZzIC6A==
X-ME-Sender: <xms:gZqhYNLV1PXeqYxJWuqa7UEN5ROQ0wcJcmQiLT3iVqsmFTM81eUvkA> <xme:gZqhYJLSR2VUJajcNqtiQ5hrV_y8OAp4pdcgufHltCJNtK54XUXx958yO3P3A8S3C tYsf0FMf5KwJcoNoA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdeigedgtdelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucfkphepuddtgedrvddugedrfeekrddvvdenucevlhhushhtvghrufhiiigvpedt necurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgpnhhothgprhgvphhlhiesmhhnohhtrd hnvght
X-ME-Proxy: <xmx:gZqhYFssvFhTaLkwCMi_k0BRxdndpDzfBg9Xb-W3w-tTiQO58mZqiQ> <xmx:gZqhYOYQwOqyL8CJPpUnq2H577tQ5lRwQQ9ELwGGhYtF4JwUsUr9gA> <xmx:gZqhYEaaQceGStE6qeKTk68ASjgfxm0sJCa7786TMWtEZPlb_NxXAw> <xmx:g5qhYPwS1vP_aN3rbIQ2DQ5CtJXf-z4yfQ572UyBq2tAeyPf7ICqYQ>
Received: from fv-az290-521.z45yk40qnouupoc55gb0v1wkoc.jx.internal.cloudapp.net (unknown [104.214.38.22]) by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 16 May 2021 18:19:45 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============0464861171706964062=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210516221948.189113A1B57@ietfa.amsl.com>
Date: Sun, 16 May 2021 15:19:48 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/_8g5N7hqEd9RbvbgMJAiC0wr_SA>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 May 2021 22:20:05 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+4/-2/💬5)
  4 issues created:
  - Fate of Early Data (by martinduke)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/434 
  - Embedded ClientHello padding complicates whole-input padding schemes (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/433 
  - Should psk_key_exchange_modes also be omitted from ClientHelloOuter? (by sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/431 
  - [Editorial] Make it easy to reference EncodedClientHelloInner decoding concerns (by sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/430 

  2 issues received 5 new comments:
  - #434 Fate of Early Data (3 by davidben, martinduke)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/434 
  - #431 Should psk_key_exchange_modes also be omitted from ClientHelloOuter? (2 by davidben, sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/431 

  2 issues closed:
  - Fate of Early Data https://github.com/tlswg/draft-ietf-tls-esni/issues/434 
  - Should psk_key_exchange_modes also be omitted from ClientHelloOuter? https://github.com/tlswg/draft-ietf-tls-esni/issues/431 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+2/-2/💬0)
  2 pull requests submitted:
  - build fix: Wrap paragraphs at 80 characters (by cjpatton)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/435 
  - Fix HPKE typo. (by sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/432 

  2 pull requests merged:
  - build fix: Wrap paragraphs at 80 characters
    https://github.com/tlswg/draft-ietf-tls-esni/pull/435 
  - Fix HPKE typo.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/432 

* tlswg/dtls-conn-id (+1/-2/💬0)
  1 pull requests submitted:
  - Updates to Acknowledgements and History (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/117 

  2 pull requests merged:
  - Updates to Acknowledgements and History
    https://github.com/tlswg/dtls-conn-id/pull/117 
  - John Scudder's Improved Peer Address Update Text
    https://github.com/tlswg/dtls-conn-id/pull/111 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team