[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 26 April 2020 07:32 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C87623A0FAE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=U0Cy+rP7; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=3TOibYb8
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pt0P6CzdPCGE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:51 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1100E3A0F95 for <tls@ietf.org>; Sun, 26 Apr 2020 00:32:50 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 3D9665C0310 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:50 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 26 Apr 2020 03:32:50 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktFYY0QKkc5HBxG3Q=; b=U0Cy+rP7 nobed2nQVqrBaT7RRqqhHCLIWdx6jO2jWW8KeQ4C6WAMdTybqPC3Ado60sYQAvxk S3To7vIN8btTWQDS354lp+Hn1yNJXuB5njT89h46VTZtArGAR1HJAm4RdBSe5B3D Gl39KCd5gTHg39VDC4K5NEAlyWF4IHyrqFJmL4IbsJLmX/NWXX2S2gVaF7VUSeAh YdjxCgz6ky0lYSDIyHkJL46aM0f90FWwKab9baS+dj3x2yiE0deOHE0IZSDN4kZt hSu2y3+nj9W995fcEIeHUdDtj8KdYzYZJ20nykVQBgQox5sdFhsJlCf2+Cwm/YgZ b0AtvbV6NS9fRg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktF YY0QKkc5HBxG3Q=; b=3TOibYb89XG1iECvTdtf8eXSHtE96lVVQSGt5K9yo14xK 2cg7gYdgST4Th13wqvCY2eqWgL9S+DffoXS7QqhHKvn1AhY6WDfozAkLnWG17RiI GZgr6rshq+OeYAHXJmD1ZYVeLJoIEzjV2uF24OCg7z8yeTzVlEDQE4BrI73I1apE +4r9UCZO6Ahj5z8CRgu81uR7aSVTpRWDMZ5YkC1zk666eqLGReusv7zjVXgMu6fx PZpwaCCXhCSDbAsGrbsCeZ7rL4WQW+SKsiw3Coq/ci5j6jF4b5zQsCz9eVOi50h7 uFX0StVQG/Oh2vnaSS+Gz1OLtX98aTL1cY/zYtCPQ==
X-ME-Sender: <xms:IjmlXqt4vnqEGInu8xXr9SrqE7K8714h7ZjT5FSp8IV3yVFF6t0PKA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrheeigddvjecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucffohhmrghinhepgh hithhhuhgsrdgtohhmnecukfhppedufedrledtrddvvdeirddvtddvnecuvehluhhsthgv rhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhepughopghnohhtpghrvghplh ihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:IjmlXjv4S4yGnqX9u-0RgUNET_Li-kR5dJtH9vEmvYeFFV7D9IJlDA> <xmx:IjmlXgygbL9lBEIs8gUCDPs7GnMmJarYqsv6iJvo8iy5ps1hLFnlTg> <xmx:IjmlXpj2GRv-HzWv54MrZJvSPtgec6oUwN-nnuiyZ1nsCvB1S6jj3A> <xmx:IjmlXkdHzEEDwKTQmJRzY5-ClcoCmmuWA-SE5qsmUOmsGsJbTWedPg>
Received: from fv-az86.internal.cloudapp.net (unknown [13.90.226.202]) by mail.messagingengine.com (Postfix) with ESMTPA id E99BE3065E10 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:49 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5869089515059996555=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200426073249.E99BE3065E10@mailuser.nyi.internal>
Date: Sun, 26 Apr 2020 03:32:49 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/d3qzHUwsFSzPMFxvP_UKQvl1f88>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Apr 2020 07:33:00 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬8)
  1 issues created:
  - Restrict ECHO inner/outer variance for interop purposes (by sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/223 

  5 issues received 8 new comments:
  - #223 Restrict ECHO inner/outer variance for interop purposes (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/223 
  - #218 HPKE code points vs. TLS ciphersuites (3 by bifurcation, chris-wood, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/218 
  - #217 ECHOConfigContents.extensions is not needed (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/217 
  - #214 Clarify whether ClientHelloInner can support TLS 1.2. (2 by ekr, grittygrease)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/214 
  - #177 GREASE ESNI extensions are easily distinguished from real ones (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/177 

* tlswg/draft-ietf-tls-external-psk-importer (+4/-4/πŸ’¬0)
  4 issues created:
  - Remove RFC1035 and RFC6234 references (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33 
  - Link to Selfie upon first reference (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32 
  - Clarify that EPSKs with the same identity will yield the same imported PSK (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31 
  - Replace use of "clients" with "endpoints" (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30 

  4 issues closed:
  - Replace use of "clients" with "endpoints" https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30 
  - Clarify that EPSKs with the same identity will yield the same imported PSK https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31 
  - Link to Selfie upon first reference https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32 
  - Remove RFC1035 and RFC6234 references https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33 

* tlswg/dtls13-spec (+1/-1/πŸ’¬1)
  1 issues created:
  - Should we require CIDs on all packets (by ekr)
    https://github.com/tlswg/dtls13-spec/issues/144 

  1 issues received 1 new comments:
  - #144 Should we require CIDs on all packets (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/144 

  1 issues closed:
  - Improve ACK advice https://github.com/tlswg/dtls13-spec/issues/128 

* tlswg/tls-subcerts (+0/-2/πŸ’¬2)
  1 issues received 2 new comments:
  - #57 Editor drafts are out-of-date (2 by chris-wood, grittygrease)
    https://github.com/tlswg/tls-subcerts/issues/57 

  2 issues closed:
  - Editor drafts are out-of-date https://github.com/tlswg/tls-subcerts/issues/57 
  - Add RSA signing oracle concerns to security considerations https://github.com/tlswg/tls-subcerts/issues/59 



Pull requests
-------------
* tlswg/draft-ietf-tls-md5-sha1-deprecate (+2/-0/πŸ’¬0)
  2 pull requests submitted:
  - Add reference to transcript collision paper (by ghedo)
    https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/6 
  - Clients MUST NOT include MD5 and SHA-1 in the signature_algorithms extension (by ghedo)
    https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/5 

* tlswg/draft-ietf-tls-esni (+2/-2/πŸ’¬5)
  2 pull requests submitted:
  - Fix outdated references to ESNIConfig (by d1vyank)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/222 
  - Rearrange sentences for better readability (by d1vyank)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/221 

  1 pull requests received 5 new comments:
  - #209 padding scheme text (5 by chris-wood, ekr, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/209 

  2 pull requests merged:
  - Rearrange sentences for better readability
    https://github.com/tlswg/draft-ietf-tls-esni/pull/221 
  - Fix outdated references to ESNIConfig
    https://github.com/tlswg/draft-ietf-tls-esni/pull/222 

* tlswg/draft-ietf-tls-external-psk-importer (+2/-2/πŸ’¬1)
  2 pull requests submitted:
  - Couple of other notes (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/35 
  - Apply edits from Verisign review. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34 

  1 pull requests received 1 new comments:
  - #29 Tighten up IANA considerations (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29 

  2 pull requests merged:
  - Tighten up IANA considerations
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29 
  - Apply edits from Verisign review.
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34 

* tlswg/draft-ietf-tls-ticketrequest (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Declining new tickets requires both counters == 0 (by vdukhovni)
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/20 

* tlswg/dtls13-spec (+3/-8/πŸ’¬6)
  3 pull requests submitted:
  - Explicitly provide integrity for the CID (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/143 
  - Ack epochs2 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/142 
  - Ack epochs (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/141 

  5 pull requests received 6 new comments:
  - #142 Ack epochs2 (2 by chris-wood, ekr)
    https://github.com/tlswg/dtls13-spec/pull/142 
  - #137 Describe duplication of state machines for post-handshake messages (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/137 
  - #134 Draft -37 changes not uploaded to repo (?) (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/134 
  - #130 Update to Figure 1 (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/130 
  - #129 Removed term "deprotection" (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/129 

  8 pull requests merged:
  - Clarify when to ACK and what to ACK
    https://github.com/tlswg/dtls13-spec/pull/139 
  - Nits and wording improvements.
    https://github.com/tlswg/dtls13-spec/pull/131 
  - Providing an informational design rational for the ACK message
    https://github.com/tlswg/dtls13-spec/pull/140 
  - Allow ACKing non-terminal complete flights if response takes time
    https://github.com/tlswg/dtls13-spec/pull/138 
  - Remove SENDING->FINISHED transition in state machine
    https://github.com/tlswg/dtls13-spec/pull/136 
  - KeyUpdate Clarification
    https://github.com/tlswg/dtls13-spec/pull/135 
  - Indicate to remove Working Group Info Section
    https://github.com/tlswg/dtls13-spec/pull/133 
  - Adding Acknowledgements Section
    https://github.com/tlswg/dtls13-spec/pull/132 

* tlswg/tls-subcerts (+1/-2/πŸ’¬1)
  1 pull requests submitted:
  - Nick/08 (by grittygrease)
    https://github.com/tlswg/tls-subcerts/pull/61 

  1 pull requests received 1 new comments:
  - #61 Nick/08 (1 by chris-wood)
    https://github.com/tlswg/tls-subcerts/pull/61 

  2 pull requests merged:
  - Nick/08
    https://github.com/tlswg/tls-subcerts/pull/61 
  - The impact of signature forgery attacks
    https://github.com/tlswg/tls-subcerts/pull/60 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease