[TLS] Weekly github digest (TLS Working Group Drafts)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 06 March 2022 07:38 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 914BA3A0A9B for <tls@ietfa.amsl.com>; Sat, 5 Mar 2022 23:38:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.707
X-Spam-Level:
X-Spam-Status: No, score=-6.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=EIAHDs0V; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=YRm4O03t
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cE5RkBOeDO4Q for <tls@ietfa.amsl.com>; Sat, 5 Mar 2022 23:38:51 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C5533A0A69 for <tls@ietf.org>; Sat, 5 Mar 2022 23:38:50 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 04CEA5C00F2 for <tls@ietf.org>; Sun, 6 Mar 2022 02:38:50 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Sun, 06 Mar 2022 02:38:50 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm2; bh=mJ1Kllk6I8DWbgjTOqcdsCW Fl4Ypwsz3szI0tXSJfR8=; b=EIAHDs0VtDljAngDdZvSf87A/ka0sEZYXG7HywX aew247N2YMTZutG6sV4rrgVqzzsZZaroEBs7ZEasl4q44HsGlObtpe54J7uI919n 1c0RYTS1HTYpZAEqod2Lw/VdrbGI+cTodWT6tex2s56jr4iWnBgyFS/KMpYT0Q3G XDhog/9qqUuyjWmRT8SOUBwCT4fjTbQkt7LF6HrxzfYSMLxcBUDJHJH9/e1ldQHz MIqlldC0MKobXutnU+BguAAA74vP6XeLmsegZ8zFwaKF3RPcBqmh8F9rHsuG9Jz9 KgbxbtyL07kwUfd/6+mBCYYOPcYVAuKhJgiTes1ko4x0riQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:from :in-reply-to:mime-version:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm2; bh=mJ1Kllk6I8DWbgjTOqcdsCWFl4Ypwsz3szI0tXSJfR8=; b=YRm4O03t MlzX05gDzDkpKRFndzh+FWv3hH+8Bu3aqWFGUWBLQ/cqsv1q0MjIcG8kyZKSX21N itOKBYWE1CiZWm9My/NiZmCk68EF9YqhNI8Q4MT2fNKLXMaVJZubslCM7s3Ke0bA QQNG1LK+RaLhE7HKn4ZoF6u7KUPwRP8heGCSOciq0bIpEiuwWUrL7k2Hz4cfCGsC hOKpO0WxHefvcixP2Qnbdabvc6Py5V7zuhQclqe4gsq7HfPrvW9GqljKnY2ijouI 5IsDHkAoX3rSaw097kYT6UOTjblLCsb1Nd8hBK0/k7eZ2PLe3IGHc0m259pnX6jh wx6QMT2EzB1v2g==
X-ME-Sender: <xms:CWUkYjALBxac0IQ834g91_iMyD88CAaTrQeNcEICB9t_di08nGrw3w> <xme:CWUkYpj_Qu1alXUJ2De6wL8G_f0P1n9dbxpFrnmXGQxmUdgHrXlVC_akf-0jjTsiL dULprmZwwDnLbGiXQ>
X-ME-Received: <xmr:CWUkYum7qZ6dXeKciMHt7DNfMXmSVNZguTNI59S4RHqLs6G0hH2pJN2wYilXwjpt5CIR3VmkYjEuJHiKj8JP3A_gAD0-q9puGvbEtxQZvn_K8B-N3AEmn4_5GiIyNTnVo-g>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudduuddguddutdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmne cujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhih ucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhi esmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeu gfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrd gtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:CWUkYlzEx5ph5L6FQj0Wt5kxAItDLSfs5_QAjb5yhLx2D_rGbzJUrA> <xmx:CWUkYoQHjWraYLez7YvfvTiJiRkygMJyc_ygmiAqTSkS1VqtbpA87w> <xmx:CWUkYoZnY_mxAHSPg_H52RBWqcbopV5n1-jRufT4TObbNf-7dTxmHg> <xmx:CmUkYjcBuCLtr2dTVct7QQET9E0SWzBzCtSQLhGnhgSmEJ6Ezs7PFw>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 6 Mar 2022 02:38:49 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============0824116437380817123=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20220306073851.0C5533A0A69@ietfa.amsl.com>
Date: Sat, 05 Mar 2022 23:38:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/z4vhYTKvEZhgDJtaL3NseLLSMj4>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2022 07:39:06 -0000
Issues ------ * tlswg/tls-flags (+1/-1/π¬1) 1 issues created: - DTLS-Only? (by seanturner) https://github.com/tlswg/tls-flags/issues/21 1 issues received 1 new comments: - #21 DTLS-Only? (1 by yoavnir) https://github.com/tlswg/tls-flags/issues/21 1 issues closed: - DTLS-Only? https://github.com/tlswg/tls-flags/issues/21 * tlswg/dtls13-spec (+0/-1/π¬6) 3 issues received 6 new comments: - #268 DTLS behavior on received closure alert (1 by gloinul) https://github.com/tlswg/dtls13-spec/issues/268 - #267 Peer Address Update (2 by ekr) https://github.com/tlswg/dtls13-spec/issues/267 - #260 AEAD integrity limits for 0-RTT data (3 by ekr, seanturner) https://github.com/tlswg/dtls13-spec/issues/260 [propose-close] 1 issues closed: - Peer Address Update https://github.com/tlswg/dtls13-spec/issues/267 * tlswg/tls-subcerts (+1/-0/π¬0) 1 issues created: - Add DTLS (by seanturner) https://github.com/tlswg/tls-subcerts/issues/94 * tlswg/tls-exported-authenticator (+0/-2/π¬0) 2 issues closed: - Consider naming the server's CR ServerCertificateRequest https://github.com/tlswg/tls-exported-authenticator/issues/70 - Update SHOULD text https://github.com/tlswg/tls-exported-authenticator/issues/69 * tlswg/draft-ietf-tls-ctls (+0/-0/π¬6) 4 issues received 6 new comments: - #43 Request: Make CTLSPlaintext and CTLSCiphertext sizes less variable (2 by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/issues/43 - #40 Request: Discuss encoding of Alerts (1 by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/issues/40 - #39 Request: Clarify extensibility rules (2 by bemasc, hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/issues/39 - #38 suppressSequenceNumber is not defined (1 by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/issues/38 Pull requests ------------- * tlswg/dtls13-spec (+2/-2/π¬1) 2 pull requests submitted: - fix msg_type's ordering and name (by seanturner) https://github.com/tlswg/dtls13-spec/pull/271 - More words about reachability testing. Fixes #267 (by ekr) https://github.com/tlswg/dtls13-spec/pull/270 1 pull requests received 1 new comments: - #271 fix msg_type's ordering and name (1 by kaduk) https://github.com/tlswg/dtls13-spec/pull/271 2 pull requests merged: - fix msg_type's ordering and name https://github.com/tlswg/dtls13-spec/pull/271 - More words about reachability testing. Fixes #267 https://github.com/tlswg/dtls13-spec/pull/270 * tlswg/dtls-conn-id (+0/-0/π¬1) 1 pull requests received 1 new comments: - #124 "DTLS was designed for securing connection-less transports, like UDP" (1 by boaks) https://github.com/tlswg/dtls-conn-id/pull/124 * tlswg/tls-subcerts (+1/-0/π¬2) 1 pull requests submitted: - add DTLS (by seanturner) https://github.com/tlswg/tls-subcerts/pull/95 1 pull requests received 2 new comments: - #95 add DTLS (2 by chris-wood, hannestschofenig) https://github.com/tlswg/tls-subcerts/pull/95 * tlswg/tls-exported-authenticator (+0/-1/π¬4) 1 pull requests received 4 new comments: - #76 Add warning about agreement on Client certificate bytes. (4 by chris-wood, ekr, jhoyla, kaduk) https://github.com/tlswg/tls-exported-authenticator/pull/76 1 pull requests merged: - Add warning about agreement on Client certificate bytes. https://github.com/tlswg/tls-exported-authenticator/pull/76 * tlswg/draft-ietf-tls-ctls (+4/-0/π¬1) 4 pull requests submitted: - suppressSequenceNumber (by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/pull/49 - Profile_id moved to the ClientHello (by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/pull/48 - Content Type for Plaintext Alert Messages (by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/pull/47 - Benjamin Schwartz added to the acknowledgment section (by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/pull/46 1 pull requests received 1 new comments: - #45 Make cTLS extensible (1 by hannestschofenig) https://github.com/tlswg/draft-ietf-tls-ctls/pull/45 Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
- [TLS] Weekly github digest (TLS Working Group Dra⦠Repository Activity Summary Bot