[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 14 November 2021 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82F8D3A0B45 for <tls@ietfa.amsl.com>; Sat, 13 Nov 2021 23:38:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=CEykURf8; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=LDSzm+WR
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AYl9oKRDqvhR for <tls@ietfa.amsl.com>; Sat, 13 Nov 2021 23:38:50 -0800 (PST)
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BB0F3A0B02 for <tls@ietf.org>; Sat, 13 Nov 2021 23:38:50 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id 29C113200933 for <tls@ietf.org>; Sun, 14 Nov 2021 02:38:50 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Sun, 14 Nov 2021 02:38:50 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm1; bh=Tx7iFUpR7PT VVLdcvu8goi+JU2RiakYtdbPgdEgriUQ=; b=CEykURf8/zbJYbTwJT+P1XP6Gg3 SRT3eQPDXITtVNLEGH+MRln4qTLnTI36plQHhyed3JkAUb+jIirxLowrnGDrHc6Z NSQEoiHST5YkukmdZfE4dr39mioZQAUrDlFfX6N8LxDW4vFxDqKuImp5bUFjxi/g UWH/tWUsrpqnrdJ0cABudOxleIL3vB05i30GdUuLRRZkVkwrJRC7OmfQ0yF+jVwb ThV9GyLioFdlW+hVWCKLBNHYBXNw+ylzbnvV2aHNsLl5oBUEJsnoiXpJgtgbU7hp 7ZPMO938FkUWI7XgDC4zBc3KBlLiZz+86pXZs3dvb9ax/+7KVoQm3HJAg1Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=Tx7iFUpR7PTVVLdcvu8goi+JU2RiakYtdbPgdEgriUQ=; b=LDSzm+WR whZPyIhYpZKRdg4Ej/lmgJ4viwJ6dl08SezZQoJA2aYoD46bkOAyHajg8LSS572c iRFnEDBxxhPZHbyzmWUOK9MbtvgkwMSxbLVfXnQVWMR2QJ+76lclOPBTJdQRp1UM fElruziWXMiUExbsP1vOZTt7ZX0R8AiAqcCS50+02c+jqO2XLnXduTKyYW/DDgKU ariMtBYzaYmMFr/4+s5ea3n+oZJx6JGmikRQAKX62zOWh2QtTKyGe8Hd3qDygt2d bcXZFesPOBWAh4AZNd2O9bCDYsfcLj3VolHwrZFbk7Vk//ZzQmFdlBigZ/lqdZKs 9OUcJcJ3Kg+uEA==
X-ME-Sender: <xms:Cb2QYSNx28Yf2tUVwZ11A7abFbCIsS9dG0FBd6rLMCojIQHksSJUTw> <xme:Cb2QYQ-6TsGaCaR55o2rJERHy7GiMjr-MHM_0YQZ8JjPUe_oa05hQL2lheGhab2z6 75hKmkbCkLYxd92Gg>
X-ME-Received: <xmr:Cb2QYZQK44goZFjyn8doMD8qknsjOeajjW62ZSpl8PAv9LaxqV51SCmWTUkd-HRS7Slr7QinsntH_qigA3uGCBGzy0dhKJfKe8EAcj02Q8701jhjuLOSGxSPGkWZ3EWOGu5f>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvuddrvdeigddutdelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:Cb2QYSvlf6Hg_Zs-qsvWxxq7uHBfaq8twGFrxmYgizW33_4fVTbzfQ> <xmx:Cb2QYaf5QHX4IhoYoSbYSNZCXQqcZQ8PlUUMrtj5vvsJ4kDMDkyPKA> <xmx:Cb2QYW3y0MXcRDPlWFWEGVP_fmz23BnIxlZakKZJDdYM37PwrXCpyA> <xmx:Cb2QYbr0XAOxkyp3JOgYfAQZvjhodZgl5jWsOgtYKMm9isSqQBQDiA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 14 Nov 2021 02:38:49 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============7404443133788132787=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20211114073850.9BB0F3A0B02@ietfa.amsl.com>
Date: Sat, 13 Nov 2021 23:38:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/xkvkBuFTQ6hUf5x-hNNtsNNJB0c>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Nov 2021 07:38:56 -0000
Issues ------ * tlswg/tls13-spec (+1/-0/π¬0) 1 issues created: - Is resumption allowed before initial connection is closed? (by emanjon) https://github.com/tlswg/tls13-spec/issues/1243 * tlswg/tls-flags (+0/-1/π¬1) 1 issues received 1 new comments: - #13 Usage also for (D)TLS 1.2 (1 by chris-wood) https://github.com/tlswg/tls-flags/issues/13 1 issues closed: - Usage also for (D)TLS 1.2 https://github.com/tlswg/tls-flags/issues/13 * tlswg/dtls13-spec (+1/-1/π¬1) 1 issues created: - Consider rewording of handshake buffering requirement (by hanno-arm) https://github.com/tlswg/dtls13-spec/issues/259 1 issues received 1 new comments: - #254 Mention RFC 7457 in Security section (1 by ekr) https://github.com/tlswg/dtls13-spec/issues/254 1 issues closed: - Mention RFC 7457 in Security section https://github.com/tlswg/dtls13-spec/issues/254 * tlswg/external-psk-design-team (+1/-0/π¬0) 1 issues created: - Matthew Quick's comments (by seanturner) https://github.com/tlswg/external-psk-design-team/issues/78 Pull requests ------------- * tlswg/tls13-spec (+1/-1/π¬0) 1 pull requests submitted: - Resumption is allowed before the initial connection is closed (by emanjon) https://github.com/tlswg/tls13-spec/pull/1244 1 pull requests merged: - Adding Nimrod Aviram as a contributor. https://github.com/tlswg/tls13-spec/pull/1242 * tlswg/tls-flags (+2/-1/π¬0) 2 pull requests submitted: - fix typo (by thomas-fossati) https://github.com/tlswg/tls-flags/pull/15 - Use standards action for 0-7 (by martinthomson) https://github.com/tlswg/tls-flags/pull/14 1 pull requests merged: - fix typo https://github.com/tlswg/tls-flags/pull/15 * tlswg/dtls13-spec (+2/-0/π¬7) 2 pull requests submitted: - Allow immediate processing of handshake data, where possible (by hanno-arm) https://github.com/tlswg/dtls13-spec/pull/258 - Extended epoch like tls. Fixed #249 (by ekr) https://github.com/tlswg/dtls13-spec/pull/257 6 pull requests received 7 new comments: - #258 Allow immediate processing of handshake data, where possible (1 by hanno-arm) https://github.com/tlswg/dtls13-spec/pull/258 - #257 Extended epoch like tls. Fixed #249 (1 by kaduk) https://github.com/tlswg/dtls13-spec/pull/257 - #256 Attempt to address #254 : Mention RFC 7457 in Security section (2 by seanturner) https://github.com/tlswg/dtls13-spec/pull/256 - #255 Increase effective epoch width to 64 bits, keeping the serialized representation 16 bits wide (1 by chris-wood) https://github.com/tlswg/dtls13-spec/pull/255 - #252 More epochs per connection (epoch wrap) (1 by chris-wood) https://github.com/tlswg/dtls13-spec/pull/252 - #250 More epochs per connection (uint32 or uint64) (1 by chris-wood) https://github.com/tlswg/dtls13-spec/pull/250 * tlswg/tls-exported-authenticator (+0/-0/π¬4) 1 pull requests received 4 new comments: - #76 Add warning about agreement on Client certificate bytes. (4 by ekr, jhoyla, martinthomson, seanturner) https://github.com/tlswg/tls-exported-authenticator/pull/76 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot