[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 09 November 2025 07:42 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 07CE3865D395 for <tls@mail2.ietf.org>; Sat, 8 Nov 2025 23:42:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.397
X-Spam-Level:
X-Spam-Status: No, score=-2.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="BYgLEIn9"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="s4teYWdh"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WGxdnjAKpO5u for <tls@mail2.ietf.org>; Sat, 8 Nov 2025 23:42:32 -0800 (PST)
Received: from fout-b1-smtp.messagingengine.com (fout-b1-smtp.messagingengine.com [202.12.124.144]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 350B1865CECA for <tls@ietf.org>; Sat, 8 Nov 2025 23:40:04 -0800 (PST)
Received: from phl-compute-01.internal (phl-compute-01.internal [10.202.2.41]) by mailfout.stl.internal (Postfix) with ESMTP id DEACD1D0016F for <tls@ietf.org>; Sun, 9 Nov 2025 02:40:03 -0500 (EST)
Received: from phl-mailfrontend-01 ([10.202.2.162]) by phl-compute-01.internal (MEProxy); Sun, 09 Nov 2025 02:40:03 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to:message-id :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1762674003; x=1762760403; bh=zgAMlpH/Z5qpGCzVWSPAR+z2UCAvyWXZTYB kMTqupUc=; b=BYgLEIn9gbxmVwrSXqyYDp88Hg2G2+F7tTfnuGJiCNlFBMTkVZ4 WHj5Gs3NAsDOVzKGoC0Pkm5P2yVVGCxbLDBZdofz4ecWG97yw8J8dr8ov1qVNxqF RkDUpwcJ8GFiokyGHK1y58S0AwGsX4UzrvxoCPVwdmw4fZ28tv8XdhB2CkZEvaDe +Ppc+bMg5lSVPc+cE97aw4GJ2H+QVlgf5ToxKpyRMzifRSAvBk1FFT2f6Nysttjl SrV8Vzohf3Xb2zQEPHe4yE5BNea7lGIj910Jmi9ZVOyLxo7+CI8KP2QOGvEzCObh 8dvZqBoSBoZksW59UTjV9Dd3bdqpS6kVx8Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:message-id :mime-version:reply-to:subject:subject:to:to:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1762674003; x= 1762760403; bh=zgAMlpH/Z5qpGCzVWSPAR+z2UCAvyWXZTYBkMTqupUc=; b=s 4teYWdhcIE2fQwLq2W+1fQEvTlKVXuOy+5yNbpeUNejIuYg11KnLQfTx/vdkJk0Z M4Hqnl72QqCGRbgJko1eUEtiVBcPgm+qPwq2i8q/jGZKqwkjnTEyfMJf6UOoTv1T KHcWy+JsPPWBF64E3/GYSPBwvcMWFBxBVAka5a3IUWBQBlUG0yWZytwj4rrdBhby VSGG4wTChZb2+z7fEwl6ebcBqz18yFWamBLm9DJ36Cq/KsV7rbLJmK88y6FT+H4r ro6BC4KdPXBy2LcOQqXAoZqrAXxDqQWIAb9qo0xnUC7mAVxDWSinc7qEMJhoDDOm kxmCNqzWvxTWnXVJZRXNg==
X-ME-Sender: <xms:U0UQaZL0nMBkwkkvaCFXsL8w8ADAhYWNi99BOUw9tuTn8DNNWnG-Ew> <xme:U0UQabDfxItfyoNjCQlmCcqjFPYBge1_2LvQmjWsr42WX4sB2FUfwj6U_zI_0ei1y u2-jCK_6nol_xk01iVuG5V_bkei9Cb97zG7IK0RL1tlyFrBzZJgpQ>
X-ME-Received: <xmr:U0UQacwqvEKTvdXJ6gMxIKc-xBOCRzyeTsoZYIwNTj3FEhAfXvbCk8mOmq-vTs7XikDHOBkZ_cIN2X0Ph4Uxqo-3UdsClRQ1V8WSXTFA_-QmAJEcIx2YmAoe8iVP9h8YDagJoQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeeffedrtdeggdduleegkeehucetufdoteggodetrf dotffvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfurfetoffkrfgpnffqhgenuceu rghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenucfjug hrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicutegt thhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihsehmnh hothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefgfefh teetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtghomh enucevlhhushhtvghrufhiiigvpedunecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgp nhhothgprhgvphhlhiesmhhnohhtrdhnvghtpdhnsggprhgtphhtthhopedupdhmohguvg epshhmthhpohhuthdprhgtphhtthhopehtlhhssehivghtfhdrohhrgh
X-ME-Proxy: <xmx:U0UQaXOVQXvtPoSgijA0GF-VV3fOHnvkfCheVqUXaYXVqON89x-pDQ> <xmx:U0UQaT9fWGPH5AG8rfN-Q-b7lut4oQJPZvEfglOJwSo3WNIh0pv41A> <xmx:U0UQafqovIrX1jvtjVkaekm6Boe_38LyUdhosLPFF0Y52gpKoAt1tw> <xmx:U0UQad6DwcVWGzBT3Y8TebTOlklyYPNUNKgF_dTVBH-r4k4MLX9MoQ> <xmx:U0UQaYzR-CiiDD1vAXQl5dkplX7qNtWXuKv-QpLAbs6J7lwUduhOo1ix>
Feedback-ID: i1c3946f2:Fastmail
Message-Id: <1762674003.3014433.4EEB40E3@outbound.messagingengine.com>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 9 Nov 2025 02:40:03 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============1564515934393261524=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Date: Sat, 08 Nov 2025 23:40:04 -0800
Message-ID-Hash: 2U5QSWZPKR3QT6UW56OB6PLSUGVOBWIY
X-Message-ID-Hash: 2U5QSWZPKR3QT6UW56OB6PLSUGVOBWIY
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/pwlcGLHOHxgnOz1atBSqleDCCcM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>



Issues
------
* tlswg/draft-ietf-tls-mlkem (+0/-1/πŸ’¬0)
  1 issues closed:
  - Define 'commits', or just define and use 'bind', and stick with one https://github.com/tlswg/draft-ietf-tls-mlkem/issues/2 

* tlswg/dtls13-spec (+1/-7/πŸ’¬3)
  1 issues created:
  - Address DTLS 1.2 Errata (by seanturner)
    https://github.com/tlswg/dtls13-spec/issues/320 

  3 issues received 3 new comments:
  - #310 RPK and Misbinding Attack (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/310 [propose-close] 
  - #291 DTLS 1.3 ACKs near the version transition (1 by antonyantony)
    https://github.com/tlswg/dtls13-spec/issues/291 
  - #283 Imprecise definitions for handling invalid records (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/283 [help wanted] 

  7 issues closed:
  - ACKs and Epochs https://github.com/tlswg/dtls13-spec/issues/307 
  - Wrapping of message_seq https://github.com/tlswg/dtls13-spec/issues/305 
  - Term "initial handshake" removed https://github.com/tlswg/dtls13-spec/issues/301 
  - ServerHello "legacy_session_id_echo" field https://github.com/tlswg/dtls13-spec/issues/299 
  - Proposed Codepoint Glitch https://github.com/tlswg/dtls13-spec/issues/309 
  - Legacy Session ID https://github.com/tlswg/dtls13-spec/issues/297 
  - 128-bit value used in ACK message https://github.com/tlswg/dtls13-spec/issues/293 

* tlswg/super-jumbo-record-limit (+0/-3/πŸ’¬7)
  3 issues received 7 new comments:
  - #12 Comments from Colm (5 by emanjon)
    https://github.com/tlswg/super-jumbo-record-limit/issues/12 
  - #11 Processing unauthenticated data (1 by emanjon)
    https://github.com/tlswg/super-jumbo-record-limit/issues/11 
  - #9 Comment from Eric Rescorla (1 by emanjon)
    https://github.com/tlswg/super-jumbo-record-limit/issues/9 

  3 issues closed:
  - Comments from Colm https://github.com/tlswg/super-jumbo-record-limit/issues/12 
  - Processing unauthenticated data https://github.com/tlswg/super-jumbo-record-limit/issues/11 
  - Comment from Eric Rescorla https://github.com/tlswg/super-jumbo-record-limit/issues/9 

* tlswg/tls-key-update (+2/-6/πŸ’¬7)
  2 issues created:
  - Terminology change for long term keys (by stfries)
    https://github.com/tlswg/tls-key-update/issues/84 
  - Key schedule (by tireddy2)
    https://github.com/tlswg/tls-key-update/issues/83 

  3 issues received 7 new comments:
  - #84 Terminology change for long term keys (2 by stfries)
    https://github.com/tlswg/tls-key-update/issues/84 
  - #83 Key schedule (4 by ilaril, tireddy2)
    https://github.com/tlswg/tls-key-update/issues/83 
  - #74 Exporter API (1 by tireddy2)
    https://github.com/tlswg/tls-key-update/issues/74 

  6 issues closed:
  - Terminology change for long term keys https://github.com/tlswg/tls-key-update/issues/84 
  - Key schedule https://github.com/tlswg/tls-key-update/issues/83 
  - Ambiguities in version -06: Threat model https://github.com/tlswg/tls-key-update/issues/76 
  - General comments on version -06 https://github.com/tlswg/tls-key-update/issues/75 
  - Exporter API https://github.com/tlswg/tls-key-update/issues/74 
  - Align labels with 8446 https://github.com/tlswg/tls-key-update/issues/79 



Pull requests
-------------
* tlswg/draft-ietf-tls-mlkem (+0/-0/πŸ’¬2)
  1 pull requests received 2 new comments:
  - #6 Change recommended to D (2 by dconnolly, emanjon)
    https://github.com/tlswg/draft-ietf-tls-mlkem/pull/6 

* tlswg/dtls13-spec (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  -  (by davidben)
     

* tlswg/tls13-spec (+1/-0/πŸ’¬0)
  1 pull requests submitted:
  -  (by emanjon)
     

* tlswg/tls-key-update (+3/-0/πŸ’¬0)
  3 pull requests submitted:
  -  (by tireddy2)
     
  -  (by stfries)
     
  -  (by tireddy2)
     


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/dnssec-chain-extension
* https://github.com/tlswg/draft-deprecate-obsolete-kex
* https://github.com/tlswg/draft-ietf-tls-cert-abridge
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/draft-ietf-tls-ecdhe-psk-aead
* https://github.com/tlswg/draft-ietf-tls-ech-keylogfile
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-grease
* https://github.com/tlswg/draft-ietf-tls-iana-registry-updates
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-mlkem
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-svcb-ech
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/draft-ietf-tls-tls13-vectors
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/dtls-rrc
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/rfc4492bis
* https://github.com/tlswg/rfc8447bis
* https://github.com/tlswg/rfc8773bis
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/sslkeylogfile
* https://github.com/tlswg/sslv3-diediedie
* https://github.com/tlswg/super-jumbo-record-limit
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/tls-fatt
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/tls-key-share-prediction
* https://github.com/tlswg/tls-key-update
* https://github.com/tlswg/tls-mldsa
* https://github.com/tlswg/tls-record-limit
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/tls-trust-anchor-ids
* https://github.com/tlswg/tls12-frozen
* https://github.com/tlswg/tls13-pkcs1
* https://github.com/tlswg/tls13-rfc
* https://github.com/tlswg/tlswg-wiki


-- 
To have a summary like this sent to your list, see: https://github.com/ietf-github-services/activity-summary