[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 10 January 2021 08:04 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1422F3A0EBF for <tls@ietfa.amsl.com>; Sun, 10 Jan 2021 00:04:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.119
X-Spam-Level:
X-Spam-Status: No, score=-2.119 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=mbqkKkft; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=oBLvtLB5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ExsVDZyg1QBJ for <tls@ietfa.amsl.com>; Sun, 10 Jan 2021 00:04:06 -0800 (PST)
Received: from wout4-smtp.messagingengine.com (wout4-smtp.messagingengine.com [64.147.123.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 644703A0EAF for <tls@ietf.org>; Sun, 10 Jan 2021 00:04:06 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id A210A26FF for <tls@ietf.org>; Sun, 10 Jan 2021 03:04:05 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 10 Jan 2021 03:04:05 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=c/1PcnWup8oDHFpH3D4WxBfWQvBO9xvloW02ScFL3t0=; b=mbqkKkft 3We22hCimyGW5dwJV7m6jHzSqdW7KBlJ9zg9AWeTahPxU7v+UC+qAN9r0ylYXTUK 6dPIzBK7nuNokcKNx/6Qdb5AYxmdE61hXfEk9A67TRDx1QephXgdcW54nR5d7oGF Ip7Rc+eiqs5EO4yhW50FreaRKxTHjKXm/TAdRClnSNBFUH+sChW0TIXx3TbNO+v7 5Sv7ahdcYi5aRPUph5KOqHikfbGcBcvskd76RueIAlfz99wgJa4Rt2cjmgIyEXLl 23UIEY7t0Pphynt2fGuy4QcRHaXVDEJZxh9UbWRKMz90fU12/XSCJfmXCBGBH/6o szcL3Bq2An8ypw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=c/1PcnWup8oDHFpH3D4WxBfWQvBO9 xvloW02ScFL3t0=; b=oBLvtLB5bwnHnmLgmaFO/Fiki9nDu0GRKgxaHz1JGIsN7 KLKzBXV66M2+eTFMpOxPplce06nfoMRi8UWIObeyRDyCbA7berenosZeIoTHweZP 4D83M/n5S3I+5veRgjnmy5VAZ/xblq0PLwv79elaARNkWYQy4XL0/n9LVcBDW6aA x8Us5HRB5Pdaf7gF/SQoe6ij+BzGVBo+xJvxHJokxYeVRgmA7YeRjLOFgkrvL33z cbiz0TVSOld3/YFhMGGkjpcukKF+KxZJ9M7izMa2cVfDAxAftlM9fLDKTXL5AoT0 DRPikkJ3kUf/WMwVbKRj8CDcZ38MHuJhyaREMPfIw==
X-ME-Sender: <xms:9bT6XwvxfBX_D3z4HMHD7nVD06VGnryluPJyRxl1rInY9J9w-smUKA> <xme:9bT6X9ef3G7ATOa268Yded-06uqK0N2t96sUSVTernBnzoAgwTrLtSnArQKSUWeoe ebnrlbS48KTLsG1Nw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrvdegkedgudduiecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtje enucfhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicu uehothcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtth gvrhhnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudei teenucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeehvddrvdegvddrledurd duhedvnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:9bT6X7yQHy9VTaLsNDJwBg7ZCfWHwWTwv1VI0sAReqooSWebTye9_g> <xmx:9bT6XzP0rCaR0iPzzRNrgXkOKkO3Kr1q6K1hDCH0AVury9bZU2k66A> <xmx:9bT6Xw-QUXBzW7yOtwayKr9shJIyVnj6t-gKVstlGx8ewhYluv_QtA> <xmx:9bT6X-kyrXvrZ0g2OO0W1asnn0hyrBN2cpKiIgFRv4OZ4zKRF4L6BA>
Received: from fv-az184-39.internal.cloudapp.net (unknown [52.242.91.152]) by mail.messagingengine.com (Postfix) with ESMTPA id EDBE2240057 for <tls@ietf.org>; Sun, 10 Jan 2021 03:04:04 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============2480180576212356742=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20210110080404.EDBE2240057@mailuser.nyi.internal>
Date: Sun, 10 Jan 2021 03:04:04 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/rOBlMJb3VPnlqYSSJsLuo9b3y4k>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Jan 2021 08:04:16 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+0/-0/πŸ’¬1)
  1 issues received 1 new comments:
  - #374 Proposal: Introduce HelloRetryRequestOuter/Inner (1 by cbartle891)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/374 

* tlswg/dtls13-spec (+0/-2/πŸ’¬1)
  1 issues received 1 new comments:
  - #158 Explain differences between DTLS 1.2 CID and DTLS 1.3 in the appendix (1 by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/issues/158 [propose-close] 

  2 issues closed:
  - Say something about how large cert messages may cause congestion https://github.com/tlswg/dtls13-spec/issues/174 [pr-exists] 
  - Add text on how DTLS 1.2 and 1.3 is differentiated on the wire https://github.com/tlswg/dtls13-spec/issues/159 [pr-exists] 

* tlswg/oldversions-deprecate (+0/-0/πŸ’¬1)
  1 issues received 1 new comments:
  - #10 Consistent References (1 by GaryGapinski)
    https://github.com/tlswg/oldversions-deprecate/issues/10 

* tlswg/tls-exported-authenticator (+0/-0/πŸ’¬1)
  1 issues received 1 new comments:
  - #66 Address Roman's AD Comments (1 by chris-wood)
    https://github.com/tlswg/tls-exported-authenticator/issues/66 



Pull requests
-------------
* tlswg/tls-flags (+0/-0/πŸ’¬1)
  1 pull requests received 1 new comments:
  - #5 Clarify what messages can have tls_flags (1 by chris-wood)
    https://github.com/tlswg/tls-flags/pull/5 

* tlswg/dtls13-spec (+6/-3/πŸ’¬5)
  6 pull requests submitted:
  - Editorial changes to Sec. "Handshake Message Fragmentation and Reassembly" (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/203 
  - Added text regarding the legacy_session_id field (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/202 
  - Removed redundant statement (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/201 
  - Graphical description of the demultiplexing process (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/200 
  - Editorial Changes in Section 3 (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/199 
  - Added text about the DTLS 1.2 and DTLS 1.3 CID mechanism (by hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/198 

  3 pull requests received 5 new comments:
  - #201 Removed redundant statement (2 by chris-wood, ekr)
    https://github.com/tlswg/dtls13-spec/pull/201 
  - #200 Graphical description of the demultiplexing process (2 by ekr, hannestschofenig)
    https://github.com/tlswg/dtls13-spec/pull/200 
  - #179 Rcid excessive (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/179 [consensus-needed] 

  3 pull requests merged:
  - Add warning about certificates and congestion. Fixes #174
    https://github.com/tlswg/dtls13-spec/pull/193 [review-needed] 
  - Some proposed editorial improvements from Ben Kaduk
    https://github.com/tlswg/dtls13-spec/pull/184 [landing-ready] 
  - Describe how to distinguish DTLS 1.2 and DTLS 1.3 connections. Fixes …
    https://github.com/tlswg/dtls13-spec/pull/197 [review-needed] 

* tlswg/tls-exported-authenticator (+0/-1/πŸ’¬0)
  1 pull requests merged:
  - Grammar fixes
    https://github.com/tlswg/tls-exported-authenticator/pull/67 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team