[TLS] Weekly github digest (TLS Working Group Drafts)

Github Notifications <do_not_reply@mnot.net> Sun, 10 November 2019 00:45 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20C9F120104 for <tls@ietfa.amsl.com>; Sat, 9 Nov 2019 16:45:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=fxRoQNOn; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=BssAf03s
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z8NO13_NSkHS for <tls@ietfa.amsl.com>; Sat, 9 Nov 2019 16:45:15 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A9F61200D5 for <tls@ietf.org>; Sat, 9 Nov 2019 16:45:15 -0800 (PST)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 98EA621A09 for <tls@ietf.org>; Sat, 9 Nov 2019 19:45:14 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Sat, 09 Nov 2019 19:45:14 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=6w0OBD0UNS2A8k+d/uCVZswcWjAnC9I3wMXMIyKdGFE=; b=fxRoQNOn 5EKOZ0FmTeiS4vM2dZMYfqVGmsvYP0gLBpJnixjdIzd3csGb20wuxQCk71gMQ+cS XTNTVlX2g0w4rkjEAzUI5FTXvMGJHembqII/iSOUE8gExhaQSlr6SYjPoMwikUrw 52b6Fx+coUG3f3PgX4Fkfww5KyStGr+iyccRL+Z97FNS73hY3U45Y42h7w7Qatoa ARvU1psO2Udrm3SoH9sh0uwNCnNIAs4W5wSSmf9JiYp+43OA74T+sRJKGL12VHLa c9IbXZSYPkhuTecdygwSsCePFm/aYdzZmSlEt/V+YYJCm/RdhGVMWpLde41gEqrC Jd4PoD3RUHY7Vg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=6w0OBD0UNS2A8k+d/uCVZswcWjAnC 9I3wMXMIyKdGFE=; b=BssAf03sjqysabHpo1u2UXlt05aiAWk6piB8lnciQCPJs LdlPNmcJS2eKPfkgyV1AU4N/xBcOCfryheh0ueqVNFfdcuNmG4mlM3Y5Px8PDKDj +A7hNYomgaWvgKJHyDS7MtrHzH83ClxIHJ9id/9hvcyWYQZWb80lSkfVX4L0eceH nHv3eBB5iNEpm0nJYVpFTUcy54fCoIra0SblvpBjI9dqLuTdm9texuSxfWaPbyz1 54QM3Mtxq3MdapjF5VraeLsiI4nZOca7DC7RmHCH7dR15whEBmIMZKMTx5ct9e9t BBd6jqB/0j9qUrRtLIDns2Zc/E80Zu/oo6cSjZCFg==
X-ME-Sender: <xms:mV3HXRjbSviCmCLEZVcdsGMgBn21mNieos7xJmk3dJ85QF7dfi-Dcw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedufedruddvgedgvdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpegtggfhvffusegrtddtredttdejne cuhfhrohhmpefiihhthhhusgcupfhothhifhhitggrthhiohhnshcuoeguohgpnhhothgp rhgvphhlhiesmhhnohhtrdhnvghtqeenucffohhmrghinhepghhithhhuhgsrdgtohhmne cukfhppeeghedrjeelrdduudefrdduieehnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtnecuvehluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:mV3HXQfnb4ygJ0q63gSLlmPypvlk-Uuwy9ZgwVuC8ICV92RQ8XBXfg> <xmx:mV3HXYkmFLSUq0p7a_7VLSnKNcBNit3krtKaHNo_t6WsWol_v_ghag> <xmx:mV3HXdyfb5h75QEUwCdSQ7Rqg8OdlP7Y1lutA3sSPw1z8xg7dkRnVA> <xmx:ml3HXeYritGMvPSt6UeWIE4BJZwWM7DUkGWC56Pi9d5VpfxSlO7xog>
Received: from cloud.mnot.net (cloud.mnot.net [45.79.113.165]) by mail.messagingengine.com (Postfix) with ESMTPA id 6B2D980064 for <tls@ietf.org>; Sat, 9 Nov 2019 19:45:13 -0500 (EST)
Received: from cloud.mnot.net (localhost [127.0.0.1]) by cloud.mnot.net (Postfix) with ESMTP id 97CEF9E70E for <tls@ietf.org>; Sun, 10 Nov 2019 00:45:12 +0000 (UTC)
Content-Type: multipart/alternative; boundary="===============0219683576178147441=="
MIME-Version: 1.0
From: Github Notifications <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20191110004512.97CEF9E70E@cloud.mnot.net>
Date: Sun, 10 Nov 2019 00:45:12 +0000
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/wkW10sXVm2WWqesC4QlKkovFLYg>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Nov 2019 00:45:19 -0000



Issues
------
* tlswg/draft-ietf-tls-esni (+0/-5/πŸ’¬24)
  9 issues received 24 new comments:
  - #193 Reasoning for 260 (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/193 
  - #192 How to parse esni_retry_request generically? (2 by davidben, ocheron)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/192 
  - #191 Why is the PaddedSNI padded with zeros? (11 by chris-wood, ekr, martinthomson, sayrer)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/191 
  - #189 AEAD-Encrypt definition (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/189 
  - #188 "HKDF-Extract(0, Z)" (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/188 
  - #183 Clarification on repeated extensions in ESNIRecord and ESNIKeys (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/183 
  - #149 Replay attack and timestamp (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/149 [needs WG discussion] 
  - #118 Is there a debug/development server to test client side implementation (3 by avened, sftcd)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/118 
  - #116 Compress server name in ClientHello (3 by chris-wood, kazuho)
    https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion] 

  5 issues closed:
  - Compress server name in ClientHello https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion] 
  - AEAD-Encrypt definition https://github.com/tlswg/draft-ietf-tls-esni/issues/189 
  - Reasoning for 260 https://github.com/tlswg/draft-ietf-tls-esni/issues/193 
  - Cryptographic configuration consistency https://github.com/tlswg/draft-ietf-tls-esni/issues/178 
  - Why is the PaddedSNI padded with zeros? https://github.com/tlswg/draft-ietf-tls-esni/issues/191 

* tlswg/dtls13-spec (+7/-4/πŸ’¬4)
  7 issues created:
  - Records from different connections in the same datagram (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/110 
  - ChaCha20 header encryption (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/109 
  - Omitting length (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/108 
  - "Packet" and "datagram" (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/106 
  - Content Type - 25 taken by CID (by seanturner)
    https://github.com/tlswg/dtls13-spec/issues/104 
  - IANA Considerations (by seanturner)
    https://github.com/tlswg/dtls13-spec/issues/102 
  - Editor's draft is ancient (by martinthomson)
    https://github.com/tlswg/dtls13-spec/issues/101 

  4 issues received 4 new comments:
  - #106 "Packet" and "datagram" (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/106 
  - #102 IANA Considerations (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/102 
  - #101 Editor's draft is ancient (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/101 
  - #72 Key separation from TLS (1 by seanturner)
    https://github.com/tlswg/dtls13-spec/issues/72 

  4 issues closed:
  - Editor's draft is ancient https://github.com/tlswg/dtls13-spec/issues/101 
  - IANA Considerations https://github.com/tlswg/dtls13-spec/issues/102 
  - Key separation from TLS https://github.com/tlswg/dtls13-spec/issues/72 
  - Content Type - 25 taken by CID https://github.com/tlswg/dtls13-spec/issues/104 

* tlswg/tls-subcerts (+2/-1/πŸ’¬6)
  2 issues created:
  - Security Considerations: network layer (by sayrer)
    https://github.com/tlswg/tls-subcerts/issues/42 
  - Assign codepoint for delegated_credentials extension (by siyengar)
    https://github.com/tlswg/tls-subcerts/issues/41 

  2 issues received 6 new comments:
  - #42 Security Considerations: network layer (5 by ekr, sayrer)
    https://github.com/tlswg/tls-subcerts/issues/42 
  - #41 Assign codepoint for delegated_credentials extension (1 by siyengar)
    https://github.com/tlswg/tls-subcerts/issues/41 

  1 issues closed:
  - PSS https://github.com/tlswg/tls-subcerts/issues/28 

* tlswg/tls-exported-authenticator (+0/-3/πŸ’¬2)
  2 issues received 2 new comments:
  - #51 Address Secdir last call comments (1 by grittygrease)
    https://github.com/tlswg/tls-exported-authenticator/issues/51 
  - #49 Address Genart comments (1 by grittygrease)
    https://github.com/tlswg/tls-exported-authenticator/issues/49 

  3 issues closed:
  - Address Secdir last call comments https://github.com/tlswg/tls-exported-authenticator/issues/51 
  - Explicitly forbid the generation of EAs with early_exporter_master_secret https://github.com/tlswg/tls-exported-authenticator/issues/48 
  - Address Genart comments https://github.com/tlswg/tls-exported-authenticator/issues/49 



Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+8/-1/πŸ’¬16)
  8 pull requests submitted:
  - Flatten ESNI negotiation mechanisms (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/201 
  - Advertise multiple ESNIConfigs as a unit (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/200 
  - Unify version/extension and key share negotiation mechanisms (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/199 
  - Add a length prefix to ESNIConfig contents. (by davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/198 
  - Key schedule injection proposal. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/197 
  - Tunnel version (by ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/196 
  - Clarify rules on order and repetition for ESNIConfig extensions (by dmcardle)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/195 
  - Add note about inconsistent cryptographic configurations. (by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/194 

  4 pull requests received 16 new comments:
  - #200 Advertise multiple ESNIConfigs as a unit (4 by bemasc, davidben)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/200 
  - #199 Unify version/extension and key share negotiation mechanisms (3 by davidben, ekr)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/199 
  - #196 Tunnel version (8 by davidben, ekr, kazuho, martinthomson)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/196 
  - #175 refer GREASE extension in resolution algorithm & formatting fix (1 by chris-wood)
    https://github.com/tlswg/draft-ietf-tls-esni/pull/175 

  1 pull requests merged:
  - Add note about inconsistent cryptographic configurations.
    https://github.com/tlswg/draft-ietf-tls-esni/pull/194 

* tlswg/draft-ietf-tls-ticketrequest (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - changing track to standards (by seanturner)
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8 

  1 pull requests merged:
  - changing track to standards
    https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8 

* tlswg/dtls13-spec (+6/-2/πŸ’¬3)
  6 pull requests submitted:
  - Issue106 packets (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/113 
  - Issue109 chacha order (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/112 
  - Issue110 multiple connections same dg (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/111 
  - Fix typo (by martinthomson)
    https://github.com/tlswg/dtls13-spec/pull/107 
  - changing ack content type number (by seanturner)
    https://github.com/tlswg/dtls13-spec/pull/105 
  - adding DTLS-OK column values (by seanturner)
    https://github.com/tlswg/dtls13-spec/pull/103 

  3 pull requests received 3 new comments:
  - #112 Issue109 chacha order (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/112 
  - #111 Issue110 multiple connections same dg (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/111 
  - #103 adding DTLS-OK column values (1 by ekr)
    https://github.com/tlswg/dtls13-spec/pull/103 

  2 pull requests merged:
  - changing ack content type number
    https://github.com/tlswg/dtls13-spec/pull/105 
  - Fix typo
    https://github.com/tlswg/dtls13-spec/pull/107 

* tlswg/tls-subcerts (+1/-2/πŸ’¬1)
  1 pull requests submitted:
  - Fix a formatting issue in changes (by siyengar)
    https://github.com/tlswg/tls-subcerts/pull/40 

  1 pull requests received 1 new comments:
  - #40 Fix a formatting issue in changes (1 by siyengar)
    https://github.com/tlswg/tls-subcerts/pull/40 

  2 pull requests merged:
  - Fix a formatting issue in changes
    https://github.com/tlswg/tls-subcerts/pull/40 
  - Add text for PKCS 1.5
    https://github.com/tlswg/tls-subcerts/pull/39 

* tlswg/tls-exported-authenticator (+1/-3/πŸ’¬2)
  1 pull requests submitted:
  - Explicitly forbid the generation of EAs with early_exporter_master_secret (by grittygrease)
    https://github.com/tlswg/tls-exported-authenticator/pull/53 

  2 pull requests received 2 new comments:
  - #53 Explicitly forbid the generation of EAs with early_exporter_master_secret (1 by grittygrease)
    https://github.com/tlswg/tls-exported-authenticator/pull/53 
  - #52 Address Yaron Sheffer's comments. (1 by grittygrease)
    https://github.com/tlswg/tls-exported-authenticator/pull/52 

  3 pull requests merged:
  - Address Yaron Sheffer's comments.
    https://github.com/tlswg/tls-exported-authenticator/pull/52 
  - Explicitly forbid the generation of EAs with early_exporter_master_secret
    https://github.com/tlswg/tls-exported-authenticator/pull/53 
  - Address comments by Christer Holmberg.
    https://github.com/tlswg/tls-exported-authenticator/pull/50 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease