[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 07 February 2021 07:36 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 904553AFA35 for <tls@ietfa.amsl.com>; Sat, 6 Feb 2021 23:36:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.819
X-Spam-Level:
X-Spam-Status: No, score=-2.819 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=BKTMLvMz; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=PywSgq4u
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2TC7tc4xc7Cy for <tls@ietfa.amsl.com>; Sat, 6 Feb 2021 23:36:37 -0800 (PST)
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com [64.147.123.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4507A3AFA37 for <tls@ietf.org>; Sat, 6 Feb 2021 23:36:37 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id AAD6CB58 for <tls@ietf.org>; Sun, 7 Feb 2021 02:36:36 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Sun, 07 Feb 2021 02:36:36 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=knsIcoXTNhVtBuQUlla8Ukk5hOtZmoMmNzC59j7HdOI=; b=BKTMLvMz aTSVUVnd+Di04uEzf89XNVzJKy3Nb6fNTrRP+ld16t16fri08QzK9Zp20dENkXBV 0kCP8/M9Vdy/zkDXOzOOOPs158UwoAMAcRd1/WeNi1y5OZwI26rt4qp3ZH3AW3d9 tbX9qfMHR32yE+H3Z+UPtOPuLFDkvVu+f7BUsHyCG//JFLmRqKn9OW+vtELGRgfx teraOYxO+Oz12bY4S4d/oaTMAYUuTjZJftWAX66yFpVALsOYKnQvc9am+fkgCqH+ 3fsIghbTBX8DzQz8rmPJwzmZVuKsfHM2WawczJOaZuhegz8VgIC9LPHf1WsIDezm Y+rRTVm+a5799Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=knsIcoXTNhVtBuQUlla8Ukk5hOtZm oMmNzC59j7HdOI=; b=PywSgq4uhqWavtirGhD9ZR8YTlI0IINLS4sa9LQZPgR+w qF0SjRBTNFwE/0ixIQTfX1vjFeD5LC7WOlyATNIPdX7mThwy4wt++t4nDVi4HzV2 eS6KJpHWi0qhE+ScrSSF6M02a6AFOLYAly15mRIgHmbwgLVurxGKfQUefJCWbsup DfXBV/oqjfR/ZNLe+q9hn8k/HCi4/JvSDTS+E7WunEhsebOjLpHonpvjfDs/2jvs ix0RssWhVo0g/zhYUBJmvlItiI6CzPYJyH8Apo04x92x6fD+Yytnz3p4jmNzGLPP 2Qrwczpot8eciVgMROsfS4jIKOVpl8iWbi0a4cDhQ==
X-ME-Sender: <xms:hJgfYFqHiBTWtENN5whGAGxm1ynoh3O5sOVW-zBCMSwqwfEahswiUw> <xme:hJgfYHqZqoINLm_2k_1CuL-lIcpUxB3oBCgq40YOr6jI3dYsajpa2e3-leINDWQY3 8OVc1XcKPtCgWIoqg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrhedtgddukecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrh hnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteen ucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrieehrddvtdefrddvfe ehnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:hJgfYCNNXyi_x5GicShFzPOPid6p0dkhVqgLqHFdMwBGRR6a6Jix1w> <xmx:hJgfYA62CIu1IhJKnAWxLTm8oRwF_o1Fure6ycLBF9xUO3GV_D5p-g> <xmx:hJgfYE7ccTtZczpY2nr5b8_v9ppHPHpWBtqjnkqv7YUA7uCByeb0aA> <xmx:hJgfYCQ1j3JuKU9QkYIdicFCJL9WGdGQ6aJKviRTKYFcVjPQ5hbrOA>
Received: from fv-az59-276.internal.cloudapp.net (unknown [40.65.203.235]) by mail.messagingengine.com (Postfix) with ESMTPA id 2BB65108005F for <tls@ietf.org>; Sun, 7 Feb 2021 02:36:36 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============3911459200477935075=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210207073636.2BB65108005F@mailuser.nyi.internal>
Date: Sun, 07 Feb 2021 02:36:36 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/dV77oiS8oNKto3tuN_sgKy1GILo>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Feb 2021 07:36:40 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬2)
  1 issues created:
  - Naive outer_extensions decoding is a DoS risk (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/378 

  1 issues received 2 new comments:
  - #378 Naive outer_extensions decoding is a DoS risk (2 by davidben, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/378 

* tlswg/tls13-spec (+1/-0/πŸ’¬1)
  1 issues created:
  - "client authentication" -> "certificate-based client authentication" (by emanjon)
    https://github.com/tlswg/tls13-spec/issues/1209 

  1 issues received 1 new comments:
  - #1208 Contradition around user_cancelled (1 by martinthomson)
    https://github.com/tlswg/tls13-spec/issues/1208 

* tlswg/dtls-conn-id (+2/-0/πŸ’¬4)
  2 issues created:
  - Section 9 comment from Ben (by jsalowey)
    https://github.com/tlswg/dtls-conn-id/issues/80 
  - Section 8 comment from Ben's review (by jsalowey)
    https://github.com/tlswg/dtls-conn-id/issues/79 

  2 issues received 4 new comments:
  - #80 Section 9 comment from Ben (3 by boaks, thomas-fossati)
    https://github.com/tlswg/dtls-conn-id/issues/80 
  - #79 Section 8 comment from Ben's review (1 by boaks)
    https://github.com/tlswg/dtls-conn-id/issues/79 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Remove some more remnants of ESNIKeys (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/377 

  1 pull requests merged:
  - Remove some more remnants of ESNIKeys
    https://github.com/tlswg/draft-ietf-tls-esni/pull/377 

* tlswg/dtls13-spec (+5/-4/πŸ’¬0)
  5 pull requests submitted:
  - Flesh out the security considerations (by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/212 
  - ACK as flight scoped implies implicit ACK behavior (by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/211 
  - The anti-replay window is per-epoch (by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/210 
  - Add an "implementation pitfalls" section (by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/209 
  - nits from AD re-review (by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/208 

  4 pull requests merged:
  - Add an "implementation pitfalls" section
    https://github.com/tlswg/dtls13-spec/pull/209 
  - The anti-replay window is per-epoch
    https://github.com/tlswg/dtls13-spec/pull/210 
  - ACK as flight scoped implies implicit ACK behavior
    https://github.com/tlswg/dtls13-spec/pull/211 
  - nits from AD re-review
    https://github.com/tlswg/dtls13-spec/pull/208 

* tlswg/dtls-conn-id (+5/-0/πŸ’¬0)
  5 pull requests submitted:
  - Change history (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/85 
  - Updated text in Security Consideration Section (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/84 
  - Added reference to draft-gont-numeric-ids-sec-considerations (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/83 
  - Changed DTLSCiphertext to DTLSCIDCiphertext for easier readability (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/82 
  - Corrected statement about multi-homing and CID changes (by hannestschofenig)
    https://github.com/tlswg/dtls-conn-id/pull/81 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team