[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 06 March 2022 07:38 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 914BA3A0A9B for <tls@ietfa.amsl.com>; Sat, 5 Mar 2022 23:38:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.707
X-Spam-Level:
X-Spam-Status: No, score=-6.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=EIAHDs0V; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=YRm4O03t
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cE5RkBOeDO4Q for <tls@ietfa.amsl.com>; Sat, 5 Mar 2022 23:38:51 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C5533A0A69 for <tls@ietf.org>; Sat, 5 Mar 2022 23:38:50 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 04CEA5C00F2 for <tls@ietf.org>; Sun, 6 Mar 2022 02:38:50 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Sun, 06 Mar 2022 02:38:50 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm2; bh=mJ1Kllk6I8DWbgjTOqcdsCW Fl4Ypwsz3szI0tXSJfR8=; b=EIAHDs0VtDljAngDdZvSf87A/ka0sEZYXG7HywX aew247N2YMTZutG6sV4rrgVqzzsZZaroEBs7ZEasl4q44HsGlObtpe54J7uI919n 1c0RYTS1HTYpZAEqod2Lw/VdrbGI+cTodWT6tex2s56jr4iWnBgyFS/KMpYT0Q3G XDhog/9qqUuyjWmRT8SOUBwCT4fjTbQkt7LF6HrxzfYSMLxcBUDJHJH9/e1ldQHz MIqlldC0MKobXutnU+BguAAA74vP6XeLmsegZ8zFwaKF3RPcBqmh8F9rHsuG9Jz9 KgbxbtyL07kwUfd/6+mBCYYOPcYVAuKhJgiTes1ko4x0riQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:from :in-reply-to:mime-version:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=mJ1Kllk6I8DWbgjTOqcdsCWFl4Ypwsz3szI0tXSJfR8=; b=YRm4O03t MlzX05gDzDkpKRFndzh+FWv3hH+8Bu3aqWFGUWBLQ/cqsv1q0MjIcG8kyZKSX21N itOKBYWE1CiZWm9My/NiZmCk68EF9YqhNI8Q4MT2fNKLXMaVJZubslCM7s3Ke0bA QQNG1LK+RaLhE7HKn4ZoF6u7KUPwRP8heGCSOciq0bIpEiuwWUrL7k2Hz4cfCGsC hOKpO0WxHefvcixP2Qnbdabvc6Py5V7zuhQclqe4gsq7HfPrvW9GqljKnY2ijouI 5IsDHkAoX3rSaw097kYT6UOTjblLCsb1Nd8hBK0/k7eZ2PLe3IGHc0m259pnX6jh wx6QMT2EzB1v2g==
X-ME-Sender: <xms:CWUkYjALBxac0IQ834g91_iMyD88CAaTrQeNcEICB9t_di08nGrw3w> <xme:CWUkYpj_Qu1alXUJ2De6wL8G_f0P1n9dbxpFrnmXGQxmUdgHrXlVC_akf-0jjTsiL dULprmZwwDnLbGiXQ>
X-ME-Received: <xmr:CWUkYum7qZ6dXeKciMHt7DNfMXmSVNZguTNI59S4RHqLs6G0hH2pJN2wYilXwjpt5CIR3VmkYjEuJHiKj8JP3A_gAD0-q9puGvbEtxQZvn_K8B-N3AEmn4_5GiIyNTnVo-g>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudduuddguddutdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmne cujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhih ucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhi esmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeu gfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrd gtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:CWUkYlzEx5ph5L6FQj0Wt5kxAItDLSfs5_QAjb5yhLx2D_rGbzJUrA> <xmx:CWUkYoQHjWraYLez7YvfvTiJiRkygMJyc_ygmiAqTSkS1VqtbpA87w> <xmx:CWUkYoZnY_mxAHSPg_H52RBWqcbopV5n1-jRufT4TObbNf-7dTxmHg> <xmx:CmUkYjcBuCLtr2dTVct7QQET9E0SWzBzCtSQLhGnhgSmEJ6Ezs7PFw>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 6 Mar 2022 02:38:49 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============0824116437380817123=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20220306073851.0C5533A0A69@ietfa.amsl.com>
Date: Sat, 05 Mar 2022 23:38:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/z4vhYTKvEZhgDJtaL3NseLLSMj4>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2022 07:39:06 -0000



Issues
------
* tlswg/tls-flags (+1/-1/πŸ’¬1)
  1 issues created:
  - DTLS-Only? (by seanturner)
    https://github.com/tlswg/tls-flags/issues/21 

  1 issues received 1 new comments:
  - #21 DTLS-Only? (1 by yoavnir)
    https://github.com/tlswg/tls-flags/issues/21 

  1 issues closed:
  - DTLS-Only? https://github.com/tlswg/tls-flags/issues/21 

* tlswg/dtls13-spec (+0/-1/πŸ’¬6)
  3 issues received 6 new comments:
  - #268  DTLS behavior on received closure alert (1 by gloinul)
    https://github.com/tlswg/dtls13-spec/issues/268 
  - #267 Peer Address Update (2 by ekr)
    https://github.com/tlswg/dtls13-spec/issues/267 
  - #260 AEAD integrity limits for 0-RTT data (3 by ekr, seanturner)
    https://github.com/tlswg/dtls13-spec/issues/260 [propose-close] 

  1 issues closed:
  - Peer Address Update https://github.com/tlswg/dtls13-spec/issues/267 

* tlswg/tls-subcerts (+1/-0/πŸ’¬0)
  1 issues created:
  - Add DTLS (by seanturner)
    https://github.com/tlswg/tls-subcerts/issues/94 

* tlswg/tls-exported-authenticator (+0/-2/πŸ’¬0)
  2 issues closed:
  - Consider naming the server's CR ServerCertificateRequest https://github.com/tlswg/tls-exported-authenticator/issues/70 
  - Update SHOULD text https://github.com/tlswg/tls-exported-authenticator/issues/69 

* tlswg/draft-ietf-tls-ctls (+0/-0/πŸ’¬6)
  4 issues received 6 new comments:
  - #43 Request: Make CTLSPlaintext and CTLSCiphertext sizes less variable (2 by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/43 
  - #40 Request: Discuss encoding of Alerts (1 by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/40 
  - #39 Request: Clarify extensibility rules (2 by bemasc, hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/39 
  - #38 suppressSequenceNumber is not defined (1 by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/38 



Pull requests
-------------
* tlswg/dtls13-spec (+2/-2/πŸ’¬1)
  2 pull requests submitted:
  - fix msg_type's ordering and name (by seanturner)
    https://github.com/tlswg/dtls13-spec/pull/271 
  - More words about reachability testing. Fixes #267 (by ekr)
    https://github.com/tlswg/dtls13-spec/pull/270 

  1 pull requests received 1 new comments:
  - #271 fix msg_type's ordering and name (1 by kaduk)
    https://github.com/tlswg/dtls13-spec/pull/271 

  2 pull requests merged:
  - fix msg_type's ordering and name
    https://github.com/tlswg/dtls13-spec/pull/271 
  - More words about reachability testing. Fixes #267
    https://github.com/tlswg/dtls13-spec/pull/270 

* tlswg/dtls-conn-id (+0/-0/πŸ’¬1)
  1 pull requests received 1 new comments:
  - #124 "DTLS was designed for securing connection-less transports, like UDP" (1 by boaks)
    https://github.com/tlswg/dtls-conn-id/pull/124 

* tlswg/tls-subcerts (+1/-0/πŸ’¬2)
  1 pull requests submitted:
  - add DTLS (by seanturner)
    https://github.com/tlswg/tls-subcerts/pull/95 

  1 pull requests received 2 new comments:
  - #95 add DTLS (2 by chris-wood, hannestschofenig)
    https://github.com/tlswg/tls-subcerts/pull/95 

* tlswg/tls-exported-authenticator (+0/-1/πŸ’¬4)
  1 pull requests received 4 new comments:
  - #76 Add warning about agreement on Client certificate bytes. (4 by chris-wood, ekr, jhoyla, kaduk)
    https://github.com/tlswg/tls-exported-authenticator/pull/76 

  1 pull requests merged:
  - Add warning about agreement on Client certificate bytes.
    https://github.com/tlswg/tls-exported-authenticator/pull/76 

* tlswg/draft-ietf-tls-ctls (+4/-0/πŸ’¬1)
  4 pull requests submitted:
  - suppressSequenceNumber (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/49 
  - Profile_id moved to the ClientHello (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/48 
  - Content Type for Plaintext Alert Messages (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/47 
  - Benjamin Schwartz added to the acknowledgment section (by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/46 

  1 pull requests received 1 new comments:
  - #45 Make cTLS extensible (1 by hannestschofenig)
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/45 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team