[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 26 April 2020 07:32 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C87623A0FAE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=U0Cy+rP7; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=3TOibYb8
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pt0P6CzdPCGE for <tls@ietfa.amsl.com>; Sun, 26 Apr 2020 00:32:51 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1100E3A0F95 for <tls@ietf.org>; Sun, 26 Apr 2020 00:32:50 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 3D9665C0310 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:50 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 26 Apr 2020 03:32:50 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktFYY0QKkc5HBxG3Q=; b=U0Cy+rP7 nobed2nQVqrBaT7RRqqhHCLIWdx6jO2jWW8KeQ4C6WAMdTybqPC3Ado60sYQAvxk S3To7vIN8btTWQDS354lp+Hn1yNJXuB5njT89h46VTZtArGAR1HJAm4RdBSe5B3D Gl39KCd5gTHg39VDC4K5NEAlyWF4IHyrqFJmL4IbsJLmX/NWXX2S2gVaF7VUSeAh YdjxCgz6ky0lYSDIyHkJL46aM0f90FWwKab9baS+dj3x2yiE0deOHE0IZSDN4kZt hSu2y3+nj9W995fcEIeHUdDtj8KdYzYZJ20nykVQBgQox5sdFhsJlCf2+Cwm/YgZ b0AtvbV6NS9fRg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=Ss2S53qduN20pQQRh+Jqb13JIGktF YY0QKkc5HBxG3Q=; b=3TOibYb89XG1iECvTdtf8eXSHtE96lVVQSGt5K9yo14xK 2cg7gYdgST4Th13wqvCY2eqWgL9S+DffoXS7QqhHKvn1AhY6WDfozAkLnWG17RiI GZgr6rshq+OeYAHXJmD1ZYVeLJoIEzjV2uF24OCg7z8yeTzVlEDQE4BrI73I1apE +4r9UCZO6Ahj5z8CRgu81uR7aSVTpRWDMZ5YkC1zk666eqLGReusv7zjVXgMu6fx PZpwaCCXhCSDbAsGrbsCeZ7rL4WQW+SKsiw3Coq/ci5j6jF4b5zQsCz9eVOi50h7 uFX0StVQG/Oh2vnaSS+Gz1OLtX98aTL1cY/zYtCPQ==
X-ME-Sender: <xms:IjmlXqt4vnqEGInu8xXr9SrqE7K8714h7ZjT5FSp8IV3yVFF6t0PKA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrheeigddvjecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucffohhmrghinhepgh hithhhuhgsrdgtohhmnecukfhppedufedrledtrddvvdeirddvtddvnecuvehluhhsthgv rhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhepughopghnohhtpghrvghplh ihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:IjmlXjv4S4yGnqX9u-0RgUNET_Li-kR5dJtH9vEmvYeFFV7D9IJlDA> <xmx:IjmlXgygbL9lBEIs8gUCDPs7GnMmJarYqsv6iJvo8iy5ps1hLFnlTg> <xmx:IjmlXpj2GRv-HzWv54MrZJvSPtgec6oUwN-nnuiyZ1nsCvB1S6jj3A> <xmx:IjmlXkdHzEEDwKTQmJRzY5-ClcoCmmuWA-SE5qsmUOmsGsJbTWedPg>
Received: from fv-az86.internal.cloudapp.net (unknown [13.90.226.202]) by mail.messagingengine.com (Postfix) with ESMTPA id E99BE3065E10 for <tls@ietf.org>; Sun, 26 Apr 2020 03:32:49 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5869089515059996555=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20200426073249.E99BE3065E10@mailuser.nyi.internal>
Date: Sun, 26 Apr 2020 03:32:49 -0400
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/d3qzHUwsFSzPMFxvP_UKQvl1f88>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Apr 2020 07:33:00 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+1/-0/π¬8) 1 issues created: - Restrict ECHO inner/outer variance for interop purposes (by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/223 5 issues received 8 new comments: - #223 Restrict ECHO inner/outer variance for interop purposes (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/223 - #218 HPKE code points vs. TLS ciphersuites (3 by bifurcation, chris-wood, ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/218 - #217 ECHOConfigContents.extensions is not needed (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/217 - #214 Clarify whether ClientHelloInner can support TLS 1.2. (2 by ekr, grittygrease) https://github.com/tlswg/draft-ietf-tls-esni/issues/214 - #177 GREASE ESNI extensions are easily distinguished from real ones (1 by ekr) https://github.com/tlswg/draft-ietf-tls-esni/issues/177 * tlswg/draft-ietf-tls-external-psk-importer (+4/-4/π¬0) 4 issues created: - Remove RFC1035 and RFC6234 references (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33 - Link to Selfie upon first reference (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32 - Clarify that EPSKs with the same identity will yield the same imported PSK (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31 - Replace use of "clients" with "endpoints" (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30 4 issues closed: - Replace use of "clients" with "endpoints" https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/30 - Clarify that EPSKs with the same identity will yield the same imported PSK https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/31 - Link to Selfie upon first reference https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/32 - Remove RFC1035 and RFC6234 references https://github.com/tlswg/draft-ietf-tls-external-psk-importer/issues/33 * tlswg/dtls13-spec (+1/-1/π¬1) 1 issues created: - Should we require CIDs on all packets (by ekr) https://github.com/tlswg/dtls13-spec/issues/144 1 issues received 1 new comments: - #144 Should we require CIDs on all packets (1 by ekr) https://github.com/tlswg/dtls13-spec/issues/144 1 issues closed: - Improve ACK advice https://github.com/tlswg/dtls13-spec/issues/128 * tlswg/tls-subcerts (+0/-2/π¬2) 1 issues received 2 new comments: - #57 Editor drafts are out-of-date (2 by chris-wood, grittygrease) https://github.com/tlswg/tls-subcerts/issues/57 2 issues closed: - Editor drafts are out-of-date https://github.com/tlswg/tls-subcerts/issues/57 - Add RSA signing oracle concerns to security considerations https://github.com/tlswg/tls-subcerts/issues/59 Pull requests ------------- * tlswg/draft-ietf-tls-md5-sha1-deprecate (+2/-0/π¬0) 2 pull requests submitted: - Add reference to transcript collision paper (by ghedo) https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/6 - Clients MUST NOT include MD5 and SHA-1 in the signature_algorithms extension (by ghedo) https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate/pull/5 * tlswg/draft-ietf-tls-esni (+2/-2/π¬5) 2 pull requests submitted: - Fix outdated references to ESNIConfig (by d1vyank) https://github.com/tlswg/draft-ietf-tls-esni/pull/222 - Rearrange sentences for better readability (by d1vyank) https://github.com/tlswg/draft-ietf-tls-esni/pull/221 1 pull requests received 5 new comments: - #209 padding scheme text (5 by chris-wood, ekr, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/pull/209 2 pull requests merged: - Rearrange sentences for better readability https://github.com/tlswg/draft-ietf-tls-esni/pull/221 - Fix outdated references to ESNIConfig https://github.com/tlswg/draft-ietf-tls-esni/pull/222 * tlswg/draft-ietf-tls-external-psk-importer (+2/-2/π¬1) 2 pull requests submitted: - Couple of other notes (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/35 - Apply edits from Verisign review. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34 1 pull requests received 1 new comments: - #29 Tighten up IANA considerations (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29 2 pull requests merged: - Tighten up IANA considerations https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/29 - Apply edits from Verisign review. https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/34 * tlswg/draft-ietf-tls-ticketrequest (+1/-0/π¬0) 1 pull requests submitted: - Declining new tickets requires both counters == 0 (by vdukhovni) https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/20 * tlswg/dtls13-spec (+3/-8/π¬6) 3 pull requests submitted: - Explicitly provide integrity for the CID (by ekr) https://github.com/tlswg/dtls13-spec/pull/143 - Ack epochs2 (by ekr) https://github.com/tlswg/dtls13-spec/pull/142 - Ack epochs (by ekr) https://github.com/tlswg/dtls13-spec/pull/141 5 pull requests received 6 new comments: - #142 Ack epochs2 (2 by chris-wood, ekr) https://github.com/tlswg/dtls13-spec/pull/142 - #137 Describe duplication of state machines for post-handshake messages (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/137 - #134 Draft -37 changes not uploaded to repo (?) (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/134 - #130 Update to Figure 1 (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/130 - #129 Removed term "deprotection" (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/129 8 pull requests merged: - Clarify when to ACK and what to ACK https://github.com/tlswg/dtls13-spec/pull/139 - Nits and wording improvements. https://github.com/tlswg/dtls13-spec/pull/131 - Providing an informational design rational for the ACK message https://github.com/tlswg/dtls13-spec/pull/140 - Allow ACKing non-terminal complete flights if response takes time https://github.com/tlswg/dtls13-spec/pull/138 - Remove SENDING->FINISHED transition in state machine https://github.com/tlswg/dtls13-spec/pull/136 - KeyUpdate Clarification https://github.com/tlswg/dtls13-spec/pull/135 - Indicate to remove Working Group Info Section https://github.com/tlswg/dtls13-spec/pull/133 - Adding Acknowledgements Section https://github.com/tlswg/dtls13-spec/pull/132 * tlswg/tls-subcerts (+1/-2/π¬1) 1 pull requests submitted: - Nick/08 (by grittygrease) https://github.com/tlswg/tls-subcerts/pull/61 1 pull requests received 1 new comments: - #61 Nick/08 (1 by chris-wood) https://github.com/tlswg/tls-subcerts/pull/61 2 pull requests merged: - Nick/08 https://github.com/tlswg/tls-subcerts/pull/61 - The impact of signature forgery attacks https://github.com/tlswg/tls-subcerts/pull/60 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-grease
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot