[TLS] Weekly github digest (TLS Working Group Drafts)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 31 October 2021 07:39 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB8273A0DFE for <tls@ietfa.amsl.com>; Sun, 31 Oct 2021 00:39:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=Mo8CcY2y; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=mkVv/3rh
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kVPeoH4PNELF for <tls@ietfa.amsl.com>; Sun, 31 Oct 2021 00:39:00 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1103E3A0D61 for <tls@ietf.org>; Sun, 31 Oct 2021 00:39:00 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id F145D5C0047 for <tls@ietf.org>; Sun, 31 Oct 2021 03:38:58 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 31 Oct 2021 03:38:58 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject; s=fm1; bh=8mV7WFxJfaI wMRd9lBasvzh70DVvZ3GCKD5zzYtjmq8=; b=Mo8CcY2yRUGHYFtKzo/xHMjDA/d v5J1Rb8dVzZ9e89eoCOI3FSzq6nNK/2u+FZadVp5oA10M37UYf7p3lA3QHeNcGya sVPaZCYy1yjTw5qSoAkw9FNv3UBRlY8Kt4+FinVN1Va4T2qyph+49jncaiYpMv8D nFRpL6ftaIuzXy0GCc1oomhyaHZdet9sczpeUhLIa+56yPh4hbApcPr8nvd3ae7H dsTZiEgmIRtYEt89k05UBtUhDWvsnRWltt5Jv8WURUVp0mYhZdts1TmnqWXfaHey h+xAWfdba1lrKa2l7WbF39gaXqq7rRKsdrusHkoSbzS/ucDftQvBRerRL+w==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:from:mime-version:subject:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=8mV7WFxJfaIwMRd9lBasvzh70DVvZ3GCKD5zzYtjmq8=; b=mkVv/3rh WxSe1e6sFduKB6lA5Lb4b6tZzyfK3nOj6MvoOE9ObshEFXqyO237kYPwSIqCYHSL fWGPInBtdxKakATdCfRcfHeiwm+ncSmxTESNvwyk1ENNBck0aauoWPaXNMKM7q1/ YDrVt3KTZzoIq2Fw5twRn5SaFjhvDTRjLgHKYPSGPBmD6YGU1QDVXtrmabE6nWZB nccKNEDCAOXKCjdKFNrkZsa19ekoNWWSz81o7s8TsxcsTCZ9b/fuDxpf/rawZJT1 tbGXUV390xWAwgkPpd15ukIsjSjlAnN6Ygzj2zjIIg7E1JIoBKcuycy4teXp/cJ6 uzZSl/ECJWbrYw==
X-ME-Sender: <xms:Ekh-YXrbfTVAiwtmnezG1dnrq0dvpClDVY1Bl0iEOCUUR-pDBzGb3g> <xme:Ekh-YRorNEL0ENxVsYu-smxTON-SX-TplWXVxMq9__Mi5VoPsc5NIWh6FZTcsxmS- tW5ZCeUX1JX5af5uA>
X-ME-Received: <xmr:Ekh-YUMOSE6CIK4rxX5yQGwm97A_CTgG5G9kLMaeO37elssZNmVNdWYcdp_O-5JxnqtqyITA_PAn-7Jz0ThSIJM56gnz_JLzlcNdkRo0LS1TNnSuYtH-F1v-KadSyipt3IpSsg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvtddrvdegledgtdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:Ekh-Ya6wJZYwAF4_IG_1xYnWQq4Ei3ROfucTPCxWmeFoquRc_PGH3w> <xmx:Ekh-YW5SdMtdr40T783PdkDiYnMn0yEohBP_iNnTEWKOhcIkvsg6Aw> <xmx:Ekh-YSiJ5ASXB5VC5pQVmZ3zVx-iz0ikuLFd-fwQ8Ws0_cla4Ky83w> <xmx:Ekh-YWH_4XFc2xquiUhBRL4o8WFVCT27LdEqK7HLxSEYfu1KF5X98A>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <tls@ietf.org>; Sun, 31 Oct 2021 03:38:58 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============7134551254496467932=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: tls@ietf.org
Message-Id: <20211031073900.1103E3A0D61@ietfa.amsl.com>
Date: Sun, 31 Oct 2021 00:39:00 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/zpPJIBS-8ilZiIhdN83du0fixng>
Subject: [TLS] Weekly github digest (TLS Working Group Drafts)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Oct 2021 07:39:14 -0000



Issues
------
* tlswg/tls13-spec (+1/-4/πŸ’¬1)
  1 issues created:
  - Check that all valid extensions appear in the table (by ekr)
    https://github.com/tlswg/tls13-spec/issues/1241 

  1 issues received 1 new comments:
  - #1237 cached information extension in EE? (1 by ekr)
    https://github.com/tlswg/tls13-spec/issues/1237 

  4 issues closed:
  - Informal reference to RFC 8879 TLS Certificate Compression https://github.com/tlswg/tls13-spec/issues/1232 [PR Pending] 
  - cached information extension in EE? https://github.com/tlswg/tls13-spec/issues/1237 
  - Not clear why 0-RTT doesn't provide perfect forward secrecy https://github.com/tlswg/tls13-spec/issues/1235 
  - Self-encoded lengths that don't match https://github.com/tlswg/tls13-spec/issues/1219 

* tlswg/tls-flags (+0/-0/πŸ’¬2)
  1 issues received 2 new comments:
  - #13 Usage also for (D)TLS 1.2 (2 by boaks, yoavnir)
    https://github.com/tlswg/tls-flags/issues/13 

* tlswg/dtls13-spec (+0/-1/πŸ’¬3)
  2 issues received 3 new comments:
  - #253 Rekeying in (D)TLS 1.3 does not update the exporter_secret (2 by chris-wood, emanjon)
    https://github.com/tlswg/dtls13-spec/issues/253 
  - #249 DTLS 1.3 limits the number of packets that can be encrypted with AES-GCM to 2^40.5 (1 by emanjon)
    https://github.com/tlswg/dtls13-spec/issues/249 

  1 issues closed:
  - Rekeying in (D)TLS 1.3 does not update the exporter_secret https://github.com/tlswg/dtls13-spec/issues/253 

* tlswg/draft-ietf-tls-ctls (+1/-0/πŸ’¬1)
  1 issues created:
  - suppressSequenceNumber is not defined (by bemasc)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/38 

  1 issues received 1 new comments:
  - #35 Remove varint encoding (1 by bemasc)
    https://github.com/tlswg/draft-ietf-tls-ctls/issues/35 



Pull requests
-------------
* tlswg/draft-ietf-tls-external-psk-importer (+1/-1/πŸ’¬0)
  1 pull requests submitted:
  - Don't use "replace" when describing the binder_key derivation string. (by tmshort)
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/44 

  1 pull requests merged:
  - Don't use "replace" when describing the binder_key derivation string.
    https://github.com/tlswg/draft-ietf-tls-external-psk-importer/pull/44 

* tlswg/tls13-spec (+4/-7/πŸ’¬5)
  4 pull requests submitted:
  - Adding Nimrod Aviram as a contributor. (by nimia)
    https://github.com/tlswg/tls13-spec/pull/1242 
  - Add cached info to extension table. Fixes #1237 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1240 
  - Add reference to RFC 8879. Fixes #1232 (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1239 
  - Emanjon prng (by ekr)
    https://github.com/tlswg/tls13-spec/pull/1238 

  3 pull requests received 5 new comments:
  - #1236 Clarifying the security properties of 0-RTT data. (1 by ekr)
    https://github.com/tlswg/tls13-spec/pull/1236 
  - #1230 RFC 8996 "Deprecating TLS 1.0 and TLS 1.1" (3 by davidben, ekr, richsalz)
    https://github.com/tlswg/tls13-spec/pull/1230 
  - #1217 Random Number Generation and Seeding (1 by ekr)
    https://github.com/tlswg/tls13-spec/pull/1217 

  7 pull requests merged:
  - Add reference to RFC 8879. Fixes #1232
    https://github.com/tlswg/tls13-spec/pull/1239 
  - Add cached info to extension table. Fixes #1237
    https://github.com/tlswg/tls13-spec/pull/1240 
  - Emanjon prng
    https://github.com/tlswg/tls13-spec/pull/1238 
  - Clarify that trailing data in extensions is forbidden.
    https://github.com/tlswg/tls13-spec/pull/1220 
  - Outdated references to ITU-T/ISO/IEC specifications
    https://github.com/tlswg/tls13-spec/pull/1228 
  - Clarifying the security properties of 0-RTT data.
    https://github.com/tlswg/tls13-spec/pull/1236 
  - Correct NST extensions length
    https://github.com/tlswg/tls13-spec/pull/1233 

* tlswg/tls-flags (+0/-1/πŸ’¬0)
  1 pull requests merged:
  - Require abort on malformed extension
    https://github.com/tlswg/tls-flags/pull/12 

* tlswg/tls-exported-authenticator (+0/-1/πŸ’¬2)
  1 pull requests received 2 new comments:
  - #76 Add warning about agreement on Client certificate bytes. (2 by jhoyla, richsalz)
    https://github.com/tlswg/tls-exported-authenticator/pull/76 

  1 pull requests merged:
  - Nick/aug5reviews
    https://github.com/tlswg/tls-exported-authenticator/pull/74 

* tlswg/draft-ietf-tls-ctls (+0/-1/πŸ’¬0)
  1 pull requests merged:
  - Removal of varint encoding
    https://github.com/tlswg/draft-ietf-tls-ctls/pull/36 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team