[TLS] Weekly github digest (TLS Working Group Drafts)
Github Notifications <do_not_reply@mnot.net> Sun, 10 November 2019 00:45 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20C9F120104 for <tls@ietfa.amsl.com>; Sat, 9 Nov 2019 16:45:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=fxRoQNOn; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=BssAf03s
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z8NO13_NSkHS for <tls@ietfa.amsl.com>; Sat, 9 Nov 2019 16:45:15 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A9F61200D5 for <tls@ietf.org>; Sat, 9 Nov 2019 16:45:15 -0800 (PST)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 98EA621A09 for <tls@ietf.org>; Sat, 9 Nov 2019 19:45:14 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Sat, 09 Nov 2019 19:45:14 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm1; bh=6w0OBD0UNS2A8k+d/uCVZswcWjAnC9I3wMXMIyKdGFE=; b=fxRoQNOn 5EKOZ0FmTeiS4vM2dZMYfqVGmsvYP0gLBpJnixjdIzd3csGb20wuxQCk71gMQ+cS XTNTVlX2g0w4rkjEAzUI5FTXvMGJHembqII/iSOUE8gExhaQSlr6SYjPoMwikUrw 52b6Fx+coUG3f3PgX4Fkfww5KyStGr+iyccRL+Z97FNS73hY3U45Y42h7w7Qatoa ARvU1psO2Udrm3SoH9sh0uwNCnNIAs4W5wSSmf9JiYp+43OA74T+sRJKGL12VHLa c9IbXZSYPkhuTecdygwSsCePFm/aYdzZmSlEt/V+YYJCm/RdhGVMWpLde41gEqrC Jd4PoD3RUHY7Vg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; bh=6w0OBD0UNS2A8k+d/uCVZswcWjAnC 9I3wMXMIyKdGFE=; b=BssAf03sjqysabHpo1u2UXlt05aiAWk6piB8lnciQCPJs LdlPNmcJS2eKPfkgyV1AU4N/xBcOCfryheh0ueqVNFfdcuNmG4mlM3Y5Px8PDKDj +A7hNYomgaWvgKJHyDS7MtrHzH83ClxIHJ9id/9hvcyWYQZWb80lSkfVX4L0eceH nHv3eBB5iNEpm0nJYVpFTUcy54fCoIra0SblvpBjI9dqLuTdm9texuSxfWaPbyz1 54QM3Mtxq3MdapjF5VraeLsiI4nZOca7DC7RmHCH7dR15whEBmIMZKMTx5ct9e9t BBd6jqB/0j9qUrRtLIDns2Zc/E80Zu/oo6cSjZCFg==
X-ME-Sender: <xms:mV3HXRjbSviCmCLEZVcdsGMgBn21mNieos7xJmk3dJ85QF7dfi-Dcw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedufedruddvgedgvdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpegtggfhvffusegrtddtredttdejne cuhfhrohhmpefiihhthhhusgcupfhothhifhhitggrthhiohhnshcuoeguohgpnhhothgp rhgvphhlhiesmhhnohhtrdhnvghtqeenucffohhmrghinhepghhithhhuhgsrdgtohhmne cukfhppeeghedrjeelrdduudefrdduieehnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtnecuvehluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:mV3HXQfnb4ygJ0q63gSLlmPypvlk-Uuwy9ZgwVuC8ICV92RQ8XBXfg> <xmx:mV3HXYkmFLSUq0p7a_7VLSnKNcBNit3krtKaHNo_t6WsWol_v_ghag> <xmx:mV3HXdyfb5h75QEUwCdSQ7Rqg8OdlP7Y1lutA3sSPw1z8xg7dkRnVA> <xmx:ml3HXeYritGMvPSt6UeWIE4BJZwWM7DUkGWC56Pi9d5VpfxSlO7xog>
Received: from cloud.mnot.net (cloud.mnot.net [45.79.113.165]) by mail.messagingengine.com (Postfix) with ESMTPA id 6B2D980064 for <tls@ietf.org>; Sat, 9 Nov 2019 19:45:13 -0500 (EST)
Received: from cloud.mnot.net (localhost [127.0.0.1]) by cloud.mnot.net (Postfix) with ESMTP id 97CEF9E70E for <tls@ietf.org>; Sun, 10 Nov 2019 00:45:12 +0000 (UTC)
Content-Type: multipart/alternative; boundary="===============0219683576178147441=="
MIME-Version: 1.0
From: Github Notifications <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20191110004512.97CEF9E70E@cloud.mnot.net>
Date: Sun, 10 Nov 2019 00:45:12 +0000
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/wkW10sXVm2WWqesC4QlKkovFLYg>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Nov 2019 00:45:19 -0000
Issues ------ * tlswg/draft-ietf-tls-esni (+0/-5/π¬24) 9 issues received 24 new comments: - #193 Reasoning for 260 (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/193 - #192 How to parse esni_retry_request generically? (2 by davidben, ocheron) https://github.com/tlswg/draft-ietf-tls-esni/issues/192 - #191 Why is the PaddedSNI padded with zeros? (11 by chris-wood, ekr, martinthomson, sayrer) https://github.com/tlswg/draft-ietf-tls-esni/issues/191 - #189 AEAD-Encrypt definition (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/189 - #188 "HKDF-Extract(0, Z)" (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/188 - #183 Clarification on repeated extensions in ESNIRecord and ESNIKeys (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/183 - #149 Replay attack and timestamp (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/149 [needs WG discussion] - #118 Is there a debug/development server to test client side implementation (3 by avened, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/issues/118 - #116 Compress server name in ClientHello (3 by chris-wood, kazuho) https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion] 5 issues closed: - Compress server name in ClientHello https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion] - AEAD-Encrypt definition https://github.com/tlswg/draft-ietf-tls-esni/issues/189 - Reasoning for 260 https://github.com/tlswg/draft-ietf-tls-esni/issues/193 - Cryptographic configuration consistency https://github.com/tlswg/draft-ietf-tls-esni/issues/178 - Why is the PaddedSNI padded with zeros? https://github.com/tlswg/draft-ietf-tls-esni/issues/191 * tlswg/dtls13-spec (+7/-4/π¬4) 7 issues created: - Records from different connections in the same datagram (by martinthomson) https://github.com/tlswg/dtls13-spec/issues/110 - ChaCha20 header encryption (by martinthomson) https://github.com/tlswg/dtls13-spec/issues/109 - Omitting length (by martinthomson) https://github.com/tlswg/dtls13-spec/issues/108 - "Packet" and "datagram" (by martinthomson) https://github.com/tlswg/dtls13-spec/issues/106 - Content Type - 25 taken by CID (by seanturner) https://github.com/tlswg/dtls13-spec/issues/104 - IANA Considerations (by seanturner) https://github.com/tlswg/dtls13-spec/issues/102 - Editor's draft is ancient (by martinthomson) https://github.com/tlswg/dtls13-spec/issues/101 4 issues received 4 new comments: - #106 "Packet" and "datagram" (1 by ekr) https://github.com/tlswg/dtls13-spec/issues/106 - #102 IANA Considerations (1 by ekr) https://github.com/tlswg/dtls13-spec/issues/102 - #101 Editor's draft is ancient (1 by ekr) https://github.com/tlswg/dtls13-spec/issues/101 - #72 Key separation from TLS (1 by seanturner) https://github.com/tlswg/dtls13-spec/issues/72 4 issues closed: - Editor's draft is ancient https://github.com/tlswg/dtls13-spec/issues/101 - IANA Considerations https://github.com/tlswg/dtls13-spec/issues/102 - Key separation from TLS https://github.com/tlswg/dtls13-spec/issues/72 - Content Type - 25 taken by CID https://github.com/tlswg/dtls13-spec/issues/104 * tlswg/tls-subcerts (+2/-1/π¬6) 2 issues created: - Security Considerations: network layer (by sayrer) https://github.com/tlswg/tls-subcerts/issues/42 - Assign codepoint for delegated_credentials extension (by siyengar) https://github.com/tlswg/tls-subcerts/issues/41 2 issues received 6 new comments: - #42 Security Considerations: network layer (5 by ekr, sayrer) https://github.com/tlswg/tls-subcerts/issues/42 - #41 Assign codepoint for delegated_credentials extension (1 by siyengar) https://github.com/tlswg/tls-subcerts/issues/41 1 issues closed: - PSS https://github.com/tlswg/tls-subcerts/issues/28 * tlswg/tls-exported-authenticator (+0/-3/π¬2) 2 issues received 2 new comments: - #51 Address Secdir last call comments (1 by grittygrease) https://github.com/tlswg/tls-exported-authenticator/issues/51 - #49 Address Genart comments (1 by grittygrease) https://github.com/tlswg/tls-exported-authenticator/issues/49 3 issues closed: - Address Secdir last call comments https://github.com/tlswg/tls-exported-authenticator/issues/51 - Explicitly forbid the generation of EAs with early_exporter_master_secret https://github.com/tlswg/tls-exported-authenticator/issues/48 - Address Genart comments https://github.com/tlswg/tls-exported-authenticator/issues/49 Pull requests ------------- * tlswg/draft-ietf-tls-esni (+8/-1/π¬16) 8 pull requests submitted: - Flatten ESNI negotiation mechanisms (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/201 - Advertise multiple ESNIConfigs as a unit (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/200 - Unify version/extension and key share negotiation mechanisms (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/199 - Add a length prefix to ESNIConfig contents. (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/198 - Key schedule injection proposal. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/197 - Tunnel version (by ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/196 - Clarify rules on order and repetition for ESNIConfig extensions (by dmcardle) https://github.com/tlswg/draft-ietf-tls-esni/pull/195 - Add note about inconsistent cryptographic configurations. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/194 4 pull requests received 16 new comments: - #200 Advertise multiple ESNIConfigs as a unit (4 by bemasc, davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/200 - #199 Unify version/extension and key share negotiation mechanisms (3 by davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/199 - #196 Tunnel version (8 by davidben, ekr, kazuho, martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/pull/196 - #175 refer GREASE extension in resolution algorithm & formatting fix (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/175 1 pull requests merged: - Add note about inconsistent cryptographic configurations. https://github.com/tlswg/draft-ietf-tls-esni/pull/194 * tlswg/draft-ietf-tls-ticketrequest (+1/-1/π¬0) 1 pull requests submitted: - changing track to standards (by seanturner) https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8 1 pull requests merged: - changing track to standards https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8 * tlswg/dtls13-spec (+6/-2/π¬3) 6 pull requests submitted: - Issue106 packets (by ekr) https://github.com/tlswg/dtls13-spec/pull/113 - Issue109 chacha order (by ekr) https://github.com/tlswg/dtls13-spec/pull/112 - Issue110 multiple connections same dg (by ekr) https://github.com/tlswg/dtls13-spec/pull/111 - Fix typo (by martinthomson) https://github.com/tlswg/dtls13-spec/pull/107 - changing ack content type number (by seanturner) https://github.com/tlswg/dtls13-spec/pull/105 - adding DTLS-OK column values (by seanturner) https://github.com/tlswg/dtls13-spec/pull/103 3 pull requests received 3 new comments: - #112 Issue109 chacha order (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/112 - #111 Issue110 multiple connections same dg (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/111 - #103 adding DTLS-OK column values (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/103 2 pull requests merged: - changing ack content type number https://github.com/tlswg/dtls13-spec/pull/105 - Fix typo https://github.com/tlswg/dtls13-spec/pull/107 * tlswg/tls-subcerts (+1/-2/π¬1) 1 pull requests submitted: - Fix a formatting issue in changes (by siyengar) https://github.com/tlswg/tls-subcerts/pull/40 1 pull requests received 1 new comments: - #40 Fix a formatting issue in changes (1 by siyengar) https://github.com/tlswg/tls-subcerts/pull/40 2 pull requests merged: - Fix a formatting issue in changes https://github.com/tlswg/tls-subcerts/pull/40 - Add text for PKCS 1.5 https://github.com/tlswg/tls-subcerts/pull/39 * tlswg/tls-exported-authenticator (+1/-3/π¬2) 1 pull requests submitted: - Explicitly forbid the generation of EAs with early_exporter_master_secret (by grittygrease) https://github.com/tlswg/tls-exported-authenticator/pull/53 2 pull requests received 2 new comments: - #53 Explicitly forbid the generation of EAs with early_exporter_master_secret (1 by grittygrease) https://github.com/tlswg/tls-exported-authenticator/pull/53 - #52 Address Yaron Sheffer's comments. (1 by grittygrease) https://github.com/tlswg/tls-exported-authenticator/pull/52 3 pull requests merged: - Address Yaron Sheffer's comments. https://github.com/tlswg/tls-exported-authenticator/pull/52 - Explicitly forbid the generation of EAs with early_exporter_master_secret https://github.com/tlswg/tls-exported-authenticator/pull/53 - Address comments by Christer Holmberg. https://github.com/tlswg/tls-exported-authenticator/pull/50 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-grease
- [TLS] Weekly github digest (TLS Working Group Dra⦠Github Notifications