[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 20 June 2021 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25AA53A1F5D for <tls@ietfa.amsl.com>; Sun, 20 Jun 2021 00:38:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=US9B19yT; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=aGhOsnwT
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JWbXmY2a_ptA for <tls@ietfa.amsl.com>; Sun, 20 Jun 2021 00:38:41 -0700 (PDT)
Received: from wout5-smtp.messagingengine.com (wout5-smtp.messagingengine.com [64.147.123.21]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A51F3A1F5A for <tls@ietf.org>; Sun, 20 Jun 2021 00:38:41 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id B319CF8E for <tls@ietf.org>; Sun, 20 Jun 2021 03:38:40 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Sun, 20 Jun 2021 03:38:40 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm3; bh=Fe0X56Hnde+ Gxlwc65oJhh5P4ff/YPKkpPsxJ6ZvuKo=; b=US9B19yTYWOEPWNJU6uxI9LQVUP gn/JvK0fBS3Ku9fzkxKEN6c6lWcS9IIU7fFEVkwYqj51j+/szaf9RGxACeZMt6md bKZc38xSh0T/tIfnQuIG3wOYim6VdA8JO4Mm9t8RR3YyXRXi97YQy0MHOsUruKEx gwIGZ4o404OU8fTJVkNmu6sfbMbdzl2ue9KYQU2WoArrm8BpclHZaZMp5XMrfOrT rrr47thtbEddECHOIEw1ZvgKaarQ7VuHAAlS84oZKMvyC2JR9E5u7RBaItXltMty OsVzNBPRZs+4I9sLZpwPZK8/EMdTXhGW4w62i7OaJ5QQYyCvgW4aYLWoxHw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=Fe0X56Hnde+Gxlwc65oJhh5P4ff/YPKkpPsxJ6ZvuKo=; b=aGhOsnwT jMW/iS8Vczp316qqB7XInJCJA6M9oLjbD9Se1eByNcvm9Kf80yVjRSqmpFeXTxdy zIy84blNGEpE7VZ11QB6IaI7Agw035uZIPrpJ97d7fDZgIuES8Iu5S8v2Z7tZGpq SyC3v9EUJb4ItINwfzkyye6gMFFlAJQp210q+CI9xOqk0cOprBu9kecqqO3putfn ricj3CxtkB+sYJUul8rIOaSpHwbPUg0dgKdKU4bFzsYas/gjgtgPm//SimdsXZGf 3u+eO1sMJn2pJXBikwH/tHJcpHAFO3JlNtgXnpgWaZvUNt/ZiUKK9ygSb5nwLkuA VwmYjczZ6rHnHA==
X-ME-Sender: <xms:f_DOYCwEAlR3sGP41vQfTILz0EXzztggN1oKvmiibpki4FfxMotktA> <xme:f_DOYORqId2qDBqDIZw6UkcSbgMjoawLqgeTXuTJoj_CzCgNXdbkFtJDIePEb-BqS q1THPfYAMyPnbcHsQ>
X-ME-Received: <xmr:f_DOYEWz02bGI-CaGW0AYFvLBWxP97whiKUJzFEGL45tLa9tlLRnsLsPxSuJCM4NS3Pgg_0ENLDtAY6s2ZqLmBMgnoaiQ5dk8RqzcJnPGWwdZ7U-BMvl4xAbJGTuS8EAbNiK>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfeefiedgudegvdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmne cujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhih ucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhi esmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeu gfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrd gtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:f_DOYIi-sllC_9z5yinlI5IeoQPTcFphQWepJBcTCn0TxPMRxEGd6Q> <xmx:f_DOYEAU7Zkyr2iitHDfbb4UGuY7ISW_yFqQge0iebb7I4_jVLM5Gw> <xmx:f_DOYJK7CTatnJXwYKJVdF66N6vaZswa7VzPOpeMvOGZqPeLbKtsug> <xmx:gPDOYHNpLoHJMhffbH9AwN4lFWpCGnOlWkPhZiugewm4KANhGB7xvQ>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 20 Jun 2021 03:38:39 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============0119402588374931422=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210620073841.3A51F3A1F5A@ietfa.amsl.com>
Date: Sun, 20 Jun 2021 00:38:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/iwgKdDtdBvfef9zyRnkm8i3nejk>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Jun 2021 07:38:44 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+0/-4/💬2) 2 issues received 2 new comments: - #424 Should IP addresses be allowed for the client-facing server? (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/424 [design] - #405 public_name edge cases and client checks (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/405 [design] 4 issues closed: - public_name edge cases and client checks https://github.com/tlswg/draft-ietf-tls-esni/issues/405 [design] - Should IP addresses be allowed for the client-facing server? https://github.com/tlswg/draft-ietf-tls-esni/issues/424 [design] - A MUST for inclusion of public_name in outer SNI seems wrong https://github.com/tlswg/draft-ietf-tls-esni/issues/396 [design] - Naive outer_extensions decoding is a DoS risk https://github.com/tlswg/draft-ietf-tls-esni/issues/378 [design] Pull requests ------------- * tlswg/draft-ietf-tls-esni (+4/-5/💬13) 4 pull requests submitted: - Say that acceptance will be confirmed twice in case of HRR (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/461 - Say that ECH acceptance is signaled at most once (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/460 - Add 10-to-11 change log. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/459 - Bump codepoint for draft-11 (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/458 5 pull requests received 13 new comments: - #460 Say that ECH acceptance is signaled at most once (1 by martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/pull/460 - #458 Bump codepoint for draft-11 (1 by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/pull/458 - #457 Define the Padding message (4 by chris-wood, cjpatton, martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/pull/457 - #456 Require that someone validate public_name correctly. (6 by chris-wood, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/pull/456 - #447 Leave IPv4 address parsing to the application (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/447 5 pull requests merged: - Say that acceptance will be confirmed twice in case of HRR https://github.com/tlswg/draft-ietf-tls-esni/pull/461 - Add 10-to-11 change log. https://github.com/tlswg/draft-ietf-tls-esni/pull/459 - Require that someone validate public_name correctly. https://github.com/tlswg/draft-ietf-tls-esni/pull/456 - Require compressed extensions appear in the same relative order. https://github.com/tlswg/draft-ietf-tls-esni/pull/455 - Bump codepoint for draft-11 https://github.com/tlswg/draft-ietf-tls-esni/pull/458 * tlswg/tls13-spec (+1/-0/💬0) 1 pull requests submitted: - Correct NST extensions length (by mattcaswell) https://github.com/tlswg/tls13-spec/pull/1233 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra… Repository Activity Summary Bot