[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 14 November 2021 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82F8D3A0B45 for <tls@ietfa.amsl.com>; Sat, 13 Nov 2021 23:38:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=CEykURf8; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=LDSzm+WR
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AYl9oKRDqvhR for <tls@ietfa.amsl.com>; Sat, 13 Nov 2021 23:38:50 -0800 (PST)
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com [64.147.123.24]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BB0F3A0B02 for <tls@ietf.org>; Sat, 13 Nov 2021 23:38:50 -0800 (PST)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.west.internal (Postfix) with ESMTP id 29C113200933 for <tls@ietf.org>; Sun, 14 Nov 2021 02:38:50 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Sun, 14 Nov 2021 02:38:50 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm1; bh=Tx7iFUpR7PT VVLdcvu8goi+JU2RiakYtdbPgdEgriUQ=; b=CEykURf8/zbJYbTwJT+P1XP6Gg3 SRT3eQPDXITtVNLEGH+MRln4qTLnTI36plQHhyed3JkAUb+jIirxLowrnGDrHc6Z NSQEoiHST5YkukmdZfE4dr39mioZQAUrDlFfX6N8LxDW4vFxDqKuImp5bUFjxi/g UWH/tWUsrpqnrdJ0cABudOxleIL3vB05i30GdUuLRRZkVkwrJRC7OmfQ0yF+jVwb ThV9GyLioFdlW+hVWCKLBNHYBXNw+ylzbnvV2aHNsLl5oBUEJsnoiXpJgtgbU7hp 7ZPMO938FkUWI7XgDC4zBc3KBlLiZz+86pXZs3dvb9ax/+7KVoQm3HJAg1Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=Tx7iFUpR7PTVVLdcvu8goi+JU2RiakYtdbPgdEgriUQ=; b=LDSzm+WR whZPyIhYpZKRdg4Ej/lmgJ4viwJ6dl08SezZQoJA2aYoD46bkOAyHajg8LSS572c iRFnEDBxxhPZHbyzmWUOK9MbtvgkwMSxbLVfXnQVWMR2QJ+76lclOPBTJdQRp1UM fElruziWXMiUExbsP1vOZTt7ZX0R8AiAqcCS50+02c+jqO2XLnXduTKyYW/DDgKU ariMtBYzaYmMFr/4+s5ea3n+oZJx6JGmikRQAKX62zOWh2QtTKyGe8Hd3qDygt2d bcXZFesPOBWAh4AZNd2O9bCDYsfcLj3VolHwrZFbk7Vk//ZzQmFdlBigZ/lqdZKs 9OUcJcJ3Kg+uEA==
X-ME-Sender: <xms:Cb2QYSNx28Yf2tUVwZ11A7abFbCIsS9dG0FBd6rLMCojIQHksSJUTw> <xme:Cb2QYQ-6TsGaCaR55o2rJERHy7GiMjr-MHM_0YQZ8JjPUe_oa05hQL2lheGhab2z6 75hKmkbCkLYxd92Gg>
X-ME-Received: <xmr:Cb2QYZQK44goZFjyn8doMD8qknsjOeajjW62ZSpl8PAv9LaxqV51SCmWTUkd-HRS7Slr7QinsntH_qigA3uGCBGzy0dhKJfKe8EAcj02Q8701jhjuLOSGxSPGkWZ3EWOGu5f>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvuddrvdeigddutdelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:Cb2QYSvlf6Hg_Zs-qsvWxxq7uHBfaq8twGFrxmYgizW33_4fVTbzfQ> <xmx:Cb2QYaf5QHX4IhoYoSbYSNZCXQqcZQ8PlUUMrtj5vvsJ4kDMDkyPKA> <xmx:Cb2QYW3y0MXcRDPlWFWEGVP_fmz23BnIxlZakKZJDdYM37PwrXCpyA> <xmx:Cb2QYbr0XAOxkyp3JOgYfAQZvjhodZgl5jWsOgtYKMm9isSqQBQDiA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 14 Nov 2021 02:38:49 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============7404443133788132787=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20211114073850.9BB0F3A0B02@ietfa.amsl.com>
Date: Sat, 13 Nov 2021 23:38:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/xkvkBuFTQ6hUf5x-hNNtsNNJB0c>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Nov 2021 07:38:56 -0000



Issues
------
* tlswg/tls13-spec (+1/-0/πŸ’¬0)
  1 issues created:
  - Is resumption allowed before initial connection is closed? (by emanjon)
    https://github.com/tlswg/tls13-spec/issues/1243 

* tlswg/tls-flags (+0/-1/πŸ’¬1)
  1 issues received 1 new comments:
  - #13 Usage also for (D)TLS 1.2 (1 by chris-wood)
    https://github.com/tlswg/tls-flags/issues/13 

  1 issues closed:
  - Usage also for (D)TLS 1.2 https://github.com/tlswg/tls-flags/issues/13 

* tlswg/dtls13-spec (+1/-1/πŸ’¬1)
  1 issues created:
  - Consider rewording of handshake buffering requirement (by hanno-arm)
    https://github.com/tlswg/dtls13-spec/issues/259 

  1 issues received 1 new comments:
  - #254 Mention RFC 7457 in Security section (1 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/254 

  1 issues closed:
  - Mention RFC 7457 in Security section https://github.com/tlswg/dtls13-spec/issues/254 

* tlswg/external-psk-design-team (+1/-0/πŸ’¬0)
  1 issues created:
  - Matthew Quick's comments (by seanturner)
    https://github.com/tlswg/external-psk-design-team/issues/78 



Pull requests
-------------
* tlswg/tls13-spec (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Resumption is allowed before the initial connection is closed (by emanjon)
    https://github.com/tlswg/tls13-spec/pull/1244 

  1 pull requests merged:
  - Adding Nimrod Aviram as a contributor.
    https://github.com/tlswg/tls13-spec/pull/1242 

* tlswg/tls-flags (+2/-1/πŸ’¬0)
  2 pull requests submitted:
  - fix typo (by thomas-fossati)
    https://github.com/tlswg/tls-flags/pull/15 
  - Use standards action for 0-7 (by martinthomson)
    https://github.com/tlswg/tls-flags/pull/14 

  1 pull requests merged:
  - fix typo
    https://github.com/tlswg/tls-flags/pull/15 

* tlswg/dtls13-spec (+2/-0/πŸ’¬7)
  2 pull requests submitted:
  - Allow immediate processing of handshake data, where possible (by hanno-arm)
    https://github.com/tlswg/dtls13-spec/pull/258 
  - Extended epoch like tls. Fixed #249 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/257 

  6 pull requests received 7 new comments:
  - #258 Allow immediate processing of handshake data, where possible (1 by hanno-arm)
    https://github.com/tlswg/dtls13-spec/pull/258 
  - #257 Extended epoch like tls. Fixed #249 (1 by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/257 
  - #256 Attempt to address #254 : Mention RFC 7457 in Security section (2 by seanturner)
    https://github.com/tlswg/dtls13-spec/pull/256 
  - #255 Increase effective epoch width to 64 bits, keeping the serialized representation 16 bits wide (1 by chris-wood)
    https://github.com/tlswg/dtls13-spec/pull/255 
  - #252 More epochs per connection (epoch wrap) (1 by chris-wood)
    https://github.com/tlswg/dtls13-spec/pull/252 
  - #250 More epochs per connection (uint32 or uint64) (1 by chris-wood)
    https://github.com/tlswg/dtls13-spec/pull/250 

* tlswg/tls-exported-authenticator (+0/-0/πŸ’¬4)
  1 pull requests received 4 new comments:
  - #76 Add warning about agreement on Client certificate bytes. (4 by ekr, jhoyla, martinthomson, seanturner)
    https://github.com/tlswg/tls-exported-authenticator/pull/76 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team