[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 13 October 2024 07:40 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE468C15106F for <tls@ietfa.amsl.com>; Sun, 13 Oct 2024 00:40:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.705
X-Spam-Level:
X-Spam-Status: No, score=-1.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="PC0jDY6R"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="HnCCr/Qh"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bc5392jUNoii for <tls@ietfa.amsl.com>; Sun, 13 Oct 2024 00:40:07 -0700 (PDT)
Received: from fhigh-a6-smtp.messagingengine.com (fhigh-a6-smtp.messagingengine.com [103.168.172.157]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BC363C151082 for <tls@ietf.org>; Sun, 13 Oct 2024 00:40:07 -0700 (PDT)
Received: from phl-compute-11.internal (phl-compute-11.phl.internal [10.202.2.51]) by mailfhigh.phl.internal (Postfix) with ESMTP id E557D1140270 for <tls@ietf.org>; Sun, 13 Oct 2024 03:40:06 -0400 (EDT)
Received: from phl-mailfrontend-01 ([10.202.2.162]) by phl-compute-11.internal (MEProxy); Sun, 13 Oct 2024 03:40:06 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm3; t= 1728805206; x=1728891606; bh=07//avvWVq400edNJgXOSoMOUpeicoDsfps 9SesHOps=; b=PC0jDY6R4gn5XGrZ7v4Sm2afJT0F6Te1YbDXk35xt3T9UbtCZhD oeDYF44TCXRfBJad1IuG9lwyvLGPz27TGVtOlvBaAIM8c3bjvih24EuBtfiunUnJ 4HkkLQZTo6ytJCSCrzjsFQK2QZlCCa7aP7n/KztQl5WYNTHf1CuOlREUe0it4not EtTDxS+CN9eTbBaozx6exAYxXmdO7Km58MZQjuMP15NMO87GxQE9yj1DmvqVPE41 u7NQgMUdjXSA/Dj+1D+lFPUm25JrWy5dcYxWJu9fOSPND1o6L9GjOTyjDvZlq07j B76B7qrMp2yo3+J+X31hdPqcjp4E5SS7Zxw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t=1728805206; x= 1728891606; bh=07//avvWVq400edNJgXOSoMOUpeicoDsfps9SesHOps=; b=H nCCr/QhT1UbZI1+KuGtApvZI3UL10vFhDsubvtZ9gwTx1W37B2wBXRBkX3s1kMmH YnsNQYHCc5bFf6HqsTpT2c2J/6W0yzuq8sVHGVklE0lZxynGZeZoNvw5IY2eag70 3TUwUYY+YaLBW4jo2Ox16YKRf4wsXYq2i2GTnYulDGIPgewp4sjnA2w0fgSkGNGB PB07FhlFMaZp0Cy79ob4HeVXtm9Kci8Xx3TS+i9GzmHdLQRkya21uaxwR8uFw0ev 3e1uAscG8y9AaHNOsor7wuGR/YjGeTXeD+KEedbS8jIdvqYL3LlCzLYwvtFRAdzx ZiHKeUmwpS85czyXCk1eA==
X-ME-Sender: <xms:VnkLZ4sVFfHVA1ib8KUTC2bumEbcLki-lJFM8arQrR0xSFs3YjSAbw> <xme:VnkLZ1cqb0VHgEg6Lh6K2TY22KcuB4ene9_DIs--1JjNIOdWoymCabzqWV4sTceRG 6qi7fLIJdrolSoQDg>
X-ME-Received: <xmr:VnkLZzyJ8-Gm3GgUQF_2tNdbCNlgoMsaxGlV8OKhJ2RJyHYI5Jj1lbgKtNdRreZB62XmfzaoicY7WXJJ_YSXmZsIpbZt44B6ygCjpz-stsOEHyStX8ml89YZF9a7SAZhRE4i>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeeftddrvdegvddguddvfecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufh hivghlugculdegledmnecujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomhep tfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguoh gpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedv udetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrg hinhepghhithhhuhgsrdgtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghm pehmrghilhhfrhhomhepughopghnohhtpghrvghplhihsehmnhhothdrnhgvthdpnhgspg hrtghpthhtohepuddpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepthhlshesihgv thhfrdhorhhg
X-ME-Proxy: <xmx:VnkLZ7PCMNI1fIcvcWuFt6tQcuDkw0zfsQFD-NtqugqP-B8xImbkBQ> <xmx:VnkLZ49890AV7X_2vKKeV9Vr4Q82Q8LX_3Y8KG5o932Sz3rscQR-gw> <xmx:VnkLZzUfA1qo4CDYRt9EIgZb8WnEP_rkdETA3su7DRJBzv6JYQpxLQ> <xmx:VnkLZxd51051zaRVElSSJjL-YTd7D4fy1CV533X_9m6e3sT8TrIZ_w> <xmx:VnkLZ6LsuaTBt56AkZPGGzMGXtgPLLpnID-bP7SueZalCZg9HH4TQEzn>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 13 Oct 2024 03:40:06 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============5684947126785746234=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20241013074007.BC363C151082@ietfa.amsl.com>
Date: Sun, 13 Oct 2024 00:40:07 -0700
Message-ID-Hash: Y4CEPDDCP7MU2J7NML4NFLA7JYNZOPJO
X-Message-ID-Hash: Y4CEPDDCP7MU2J7NML4NFLA7JYNZOPJO
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc5
Precedence: list
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/lhj-7G4Hbm42BuUidOGciIhXsBY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>



Issues
------
* tlswg/draft-ietf-tls-esni (+4/-0/πŸ’¬1)
  4 issues created:
  - Move guidance on greasing out of IANA considerations (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/631 
  - Extraneous configurations MUST have invalid DNS names? (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/630 
  - Should we recommend how often to rotate keys? (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/629 
  - DNS issues from AD review. (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/628 

  1 issues received 1 new comments:
  - #630 Extraneous configurations MUST have invalid DNS names? (1 by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/630 

* tlswg/draft-ietf-tls-svcb-ech (+1/-0/πŸ’¬0)
  1 issues created:
  - Add some examples (and perhaps operational considerations) especially for the Multi-CDN case (by enygren)
    https://github.com/tlswg/draft-ietf-tls-svcb-ech/issues/17 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  - Comments from AD review. (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/632 

* tlswg/draft-ietf-tls-svcb-ech (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Add a variety of examples (by bemasc)
    https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/18 

  1 pull requests merged:
  - Discuss the impact of resolver selection on security
    https://github.com/tlswg/draft-ietf-tls-svcb-ech/pull/16 

* tlswg/tls-key-update (+3/-2/πŸ’¬1)
  3 pull requests submitted:
  - Update draft-ietf-tls-extended-key-update.md (by stfries)
    https://github.com/tlswg/tls-key-update/pull/9 
  - Added relevant SSLKEYLOGFILE labels (by yaroslavros)
    https://github.com/hannestschofenig/tls-key-update/pull/8 
  - Added status for soft rejection of the request (by yaroslavros)
    https://github.com/hannestschofenig/tls-key-update/pull/7 

  1 pull requests received 1 new comments:
  - #7 Added status for soft rejection of the request (1 by yaroslavros)
    https://github.com/tlswg/tls-key-update/pull/7 

  2 pull requests merged:
  - Added status for soft rejection of the request
    https://github.com/tlswg/tls-key-update/pull/7 
  - Added relevant SSLKEYLOGFILE labels
    https://github.com/tlswg/tls-key-update/pull/8 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/dnssec-chain-extension
* https://github.com/tlswg/draft-deprecate-obsolete-kex
* https://github.com/tlswg/draft-ietf-tls-cert-abridge
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/draft-ietf-tls-ecdhe-psk-aead
* https://github.com/tlswg/draft-ietf-tls-ech-keylogfile
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-grease
* https://github.com/tlswg/draft-ietf-tls-iana-registry-updates
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-svcb-ech
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/draft-ietf-tls-tls13-vectors
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/dtls-rrc
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/rfc4492bis
* https://github.com/tlswg/rfc8447bis
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/sslkeylogfile
* https://github.com/tlswg/sslv3-diediedie
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/tls-key-share-prediction
* https://github.com/tlswg/tls-key-update
* https://github.com/tlswg/tls-record-limit
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/tls12-frozen
* https://github.com/tlswg/tls13-pkcs1
* https://github.com/tlswg/tls13-rfc