[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 26 April 2020 07:32 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C87623A0FAE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=U0Cy+rP7; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=3TOibYb8
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pt0P6CzdPCGE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:51 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1100E3A0F95 for <tls@ietf.org>; Sun, 26 Apr 2020 00:32:50 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 3D9665C0310 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:50 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 26 Apr 2020 03:32:50 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktFYY0QKkc5HBxG3Q=; b=U0Cy+rP7 nobed2nQVqrBaT7RRqqhHCLIWdx6jO2jWW8KeQ4C6WAMdTybqPC3Ado60sYQAvxk S3To7vIN8btTWQDS354lp+Hn1yNJXuB5njT89h46VTZtArGAR1HJAm4RdBSe5B3D Gl39KCd5gTHg39VDC4K5NEAlyWF4IHyrqFJmL4IbsJLmX/NWXX2S2gVaF7VUSeAh YdjxCgz6ky0lYSDIyHkJL46aM0f90FWwKab9baS+dj3x2yiE0deOHE0IZSDN4kZt hSu2y3+nj9W995fcEIeHUdDtj8KdYzYZJ20nykVQBgQox5sdFhsJlCf2+Cwm/YgZ b0AtvbV6NS9fRg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktF YY0QKkc5HBxG3Q=; b=3TOibYb89XG1iECvTdtf8eXSHtE96lVVQSGt5K9yo14xK 2cg7gYdgST4Th13wqvCY2eqWgL9S+DffoXS7QqhHKvn1AhY6WDfozAkLnWG17RiI GZgr6rshq+OeYAHXJmD1ZYVeLJoIEzjV2uF24OCg7z8yeTzVlEDQE4BrI73I1apE +4r9UCZO6Ahj5z8CRgu81uR7aSVTpRWDMZ5YkC1zk666eqLGReusv7zjVXgMu6fx PZpwaCCXhCSDbAsGrbsCeZ7rL4WQW+SKsiw3Coq/ci5j6jF4b5zQsCz9eVOi50h7 uFX0StVQG/Oh2vnaSS+Gz1OLtX98aTL1cY/zYtCPQ==
X-ME-Sender: <xms:IjmlXqt4vnqEGInu8xXr9SrqE7K8714h7ZjT5FSp8IV3yVFF6t0PKA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrheeigddvjecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucffohhmrghinhepgh hithhhuhgsrdgtohhmnecukfhppedufedrledtrddvvdeirddvtddvnecuvehluhhsthgv rhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhepughopghnohhtpghrvghplh ihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:IjmlXjv4S4yGnqX9u-0RgUNET_Li-kR5dJtH9vEmvYeFFV7D9IJlDA> <xmx:IjmlXgygbL9lBEIs8gUCDPs7GnMmJarYqsv6iJvo8iy5ps1hLFnlTg> <xmx:IjmlXpj2GRv-HzWv54MrZJvSPtgec6oUwN-nnuiyZ1nsCvB1S6jj3A> <xmx:IjmlXkdHzEEDwKTQmJRzY5-ClcoCmmuWA-SE5qsmUOmsGsJbTWedPg>
Received: from fv-az86.internal.cloudapp.net (unknown [13.90.226.202]) by mail.messagingengine.com (Postfix) with ESMTPA id E99BE3065E10 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:49 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5869089515059996555=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200426073249.E99BE3065E10@mailuser.nyi.internal>
Date: Sun, 26 Apr 2020 03:32:49 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/d3qzHUwsFSzPMFxvP_UKQvl1f88>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Apr 2020 07:33:00 -0000
Issues
------
* tlswg/draft-ietf-tls-esni (+1/-0/π¬8)
1 issues created:
- Restrict ECHO inner/outer variance for interop purposes (by sftcd)
https://github.com/tlswg/draft-ietf-tls-esni/issues/223
5 issues received 8 new comments:
- #223 Restrict ECHO inner/outer variance for interop purposes (1 by ekr)
https://github.com/tlswg/draft-ietf-tls-esni/issues/223
- #218 HPKE code points vs. TLS ciphersuites (3 by bifurcation, chris-wood, ekr)
https://github.com/tlswg/draft-ietf-tls-esni/issues/218
- #217 ECHOConfigContents.extensions is not needed (1 by ekr)
https://github.com/tlswg/draft-ietf-tls-esni/issues/217
- #214 Clarify whether ClientHelloInner can support TLS 1.2. (2 by ekr, grittygrease)
https://github.com/tlswg/draft-ietf-tls-esni/issues/214
- #177 GREASE ESNI extensions are easily distinguished from real ones (1 by ekr)
https://github.com/tlswg/draft-ietf-tls-esni/issues/177
* tlswg/draft-ietf-tls-external-psk-importer (+4/-4/π¬0)
4 issues created:
- Remove RFC1035 and RFC6234 references (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33
- Link to Selfie upon first reference (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32
- Clarify that EPSKs with the same identity will yield the same imported PSK (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31
- Replace use of "clients" with "endpoints" (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30
4 issues closed:
- Replace use of "clients" with "endpoints" https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30
- Clarify that EPSKs with the same identity will yield the same imported PSK https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31
- Link to Selfie upon first reference https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32
- Remove RFC1035 and RFC6234 references https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33
* tlswg/dtls13-spec (+1/-1/π¬1)
1 issues created:
- Should we require CIDs on all packets (by ekr)
https://github.com/tlswg/dtls13-spec/issues/144
1 issues received 1 new comments:
- #144 Should we require CIDs on all packets (1 by ekr)
https://github.com/tlswg/dtls13-spec/issues/144
1 issues closed:
- Improve ACK advice https://github.com/tlswg/dtls13-spec/issues/128
* tlswg/tls-subcerts (+0/-2/π¬2)
1 issues received 2 new comments:
- #57 Editor drafts are out-of-date (2 by chris-wood, grittygrease)
https://github.com/tlswg/tls-subcerts/issues/57
2 issues closed:
- Editor drafts are out-of-date https://github.com/tlswg/tls-subcerts/issues/57
- Add RSA signing oracle concerns to security considerations https://github.com/tlswg/tls-subcerts/issues/59
Pull requests
-------------
* tlswg/draft-ietf-tls-md5-sha1-deprecate (+2/-0/π¬0)
2 pull requests submitted:
- Add reference to transcript collision paper (by ghedo)
https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/6
- Clients MUST NOT include MD5 and SHA-1 in the signature_algorithms extension (by ghedo)
https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/5
* tlswg/draft-ietf-tls-esni (+2/-2/π¬5)
2 pull requests submitted:
- Fix outdated references to ESNIConfig (by d1vyank)
https://github.com/tlswg/draft-ietf-tls-esni/pull/222
- Rearrange sentences for better readability (by d1vyank)
https://github.com/tlswg/draft-ietf-tls-esni/pull/221
1 pull requests received 5 new comments:
- #209 padding scheme text (5 by chris-wood, ekr, sftcd)
https://github.com/tlswg/draft-ietf-tls-esni/pull/209
2 pull requests merged:
- Rearrange sentences for better readability
https://github.com/tlswg/draft-ietf-tls-esni/pull/221
- Fix outdated references to ESNIConfig
https://github.com/tlswg/draft-ietf-tls-esni/pull/222
* tlswg/draft-ietf-tls-external-psk-importer (+2/-2/π¬1)
2 pull requests submitted:
- Couple of other notes (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/35
- Apply edits from Verisign review. (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34
1 pull requests received 1 new comments:
- #29 Tighten up IANA considerations (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29
2 pull requests merged:
- Tighten up IANA considerations
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29
- Apply edits from Verisign review.
https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34
* tlswg/draft-ietf-tls-ticketrequest (+1/-0/π¬0)
1 pull requests submitted:
- Declining new tickets requires both counters == 0 (by vdukhovni)
https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/20
* tlswg/dtls13-spec (+3/-8/π¬6)
3 pull requests submitted:
- Explicitly provide integrity for the CID (by ekr)
https://github.com/tlswg/dtls13-spec/pull/143
- Ack epochs2 (by ekr)
https://github.com/tlswg/dtls13-spec/pull/142
- Ack epochs (by ekr)
https://github.com/tlswg/dtls13-spec/pull/141
5 pull requests received 6 new comments:
- #142 Ack epochs2 (2 by chris-wood, ekr)
https://github.com/tlswg/dtls13-spec/pull/142
- #137 Describe duplication of state machines for post-handshake messages (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/137
- #134 Draft -37 changes not uploaded to repo (?) (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/134
- #130 Update to Figure 1 (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/130
- #129 Removed term "deprotection" (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/129
8 pull requests merged:
- Clarify when to ACK and what to ACK
https://github.com/tlswg/dtls13-spec/pull/139
- Nits and wording improvements.
https://github.com/tlswg/dtls13-spec/pull/131
- Providing an informational design rational for the ACK message
https://github.com/tlswg/dtls13-spec/pull/140
- Allow ACKing non-terminal complete flights if response takes time
https://github.com/tlswg/dtls13-spec/pull/138
- Remove SENDING->FINISHED transition in state machine
https://github.com/tlswg/dtls13-spec/pull/136
- KeyUpdate Clarification
https://github.com/tlswg/dtls13-spec/pull/135
- Indicate to remove Working Group Info Section
https://github.com/tlswg/dtls13-spec/pull/133
- Adding Acknowledgements Section
https://github.com/tlswg/dtls13-spec/pull/132
* tlswg/tls-subcerts (+1/-2/π¬1)
1 pull requests submitted:
- Nick/08 (by grittygrease)
https://github.com/tlswg/tls-subcerts/pull/61
1 pull requests received 1 new comments:
- #61 Nick/08 (1 by chris-wood)
https://github.com/tlswg/tls-subcerts/pull/61
2 pull requests merged:
- Nick/08
https://github.com/tlswg/tls-subcerts/pull/61
- The impact of signature forgery attacks
https://github.com/tlswg/tls-subcerts/pull/60
Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot