Issues
------
* tlswg/draft-ietf-tls-esni (+0/-5/💬24)
9 issues received 24 new comments:
- #193 Reasoning for 260 (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/issues/193
- #192 How to parse esni_retry_request generically? (2 by davidben, ocheron)
https://github.com/tlswg/draft-ietf-tls-esni/issues/192
- #191 Why is the PaddedSNI padded with zeros? (11 by chris-wood, ekr, martinthomson, sayrer)
https://github.com/tlswg/draft-ietf-tls-esni/issues/191
- #189 AEAD-Encrypt definition (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/issues/189
- #188 "HKDF-Extract(0, Z)" (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/issues/188
- #183 Clarification on repeated extensions in ESNIRecord and ESNIKeys (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/issues/183
- #149 Replay attack and timestamp (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/issues/149 [needs WG discussion]
- #118 Is there a debug/development server to test client side implementation (3 by avened, sftcd)
https://github.com/tlswg/draft-ietf-tls-esni/issues/118
- #116 Compress server name in ClientHello (3 by chris-wood, kazuho)
https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion]
5 issues closed:
- Compress server name in ClientHello https://github.com/tlswg/draft-ietf-tls-esni/issues/116 [needs WG discussion]
- AEAD-Encrypt definition https://github.com/tlswg/draft-ietf-tls-esni/issues/189
- Reasoning for 260 https://github.com/tlswg/draft-ietf-tls-esni/issues/193
- Cryptographic configuration consistency https://github.com/tlswg/draft-ietf-tls-esni/issues/178
- Why is the PaddedSNI padded with zeros? https://github.com/tlswg/draft-ietf-tls-esni/issues/191
* tlswg/dtls13-spec (+7/-4/💬4)
7 issues created:
- Records from different connections in the same datagram (by martinthomson)
https://github.com/tlswg/dtls13-spec/issues/110
- ChaCha20 header encryption (by martinthomson)
https://github.com/tlswg/dtls13-spec/issues/109
- Omitting length (by martinthomson)
https://github.com/tlswg/dtls13-spec/issues/108
- "Packet" and "datagram" (by martinthomson)
https://github.com/tlswg/dtls13-spec/issues/106
- Content Type - 25 taken by CID (by seanturner)
https://github.com/tlswg/dtls13-spec/issues/104
- IANA Considerations (by seanturner)
https://github.com/tlswg/dtls13-spec/issues/102
- Editor's draft is ancient (by martinthomson)
https://github.com/tlswg/dtls13-spec/issues/101
4 issues received 4 new comments:
- #106 "Packet" and "datagram" (1 by ekr)
https://github.com/tlswg/dtls13-spec/issues/106
- #102 IANA Considerations (1 by ekr)
https://github.com/tlswg/dtls13-spec/issues/102
- #101 Editor's draft is ancient (1 by ekr)
https://github.com/tlswg/dtls13-spec/issues/101
- #72 Key separation from TLS (1 by seanturner)
https://github.com/tlswg/dtls13-spec/issues/72
4 issues closed:
- Editor's draft is ancient https://github.com/tlswg/dtls13-spec/issues/101
- IANA Considerations https://github.com/tlswg/dtls13-spec/issues/102
- Key separation from TLS https://github.com/tlswg/dtls13-spec/issues/72
- Content Type - 25 taken by CID https://github.com/tlswg/dtls13-spec/issues/104
* tlswg/tls-subcerts (+2/-1/💬6)
2 issues created:
- Security Considerations: network layer (by sayrer)
https://github.com/tlswg/tls-subcerts/issues/42
- Assign codepoint for delegated_credentials extension (by siyengar)
https://github.com/tlswg/tls-subcerts/issues/41
2 issues received 6 new comments:
- #42 Security Considerations: network layer (5 by ekr, sayrer)
https://github.com/tlswg/tls-subcerts/issues/42
- #41 Assign codepoint for delegated_credentials extension (1 by siyengar)
https://github.com/tlswg/tls-subcerts/issues/41
1 issues closed:
- PSS https://github.com/tlswg/tls-subcerts/issues/28
* tlswg/tls-exported-authenticator (+0/-3/💬2)
2 issues received 2 new comments:
- #51 Address Secdir last call comments (1 by grittygrease)
https://github.com/tlswg/tls-exported-authenticator/issues/51
- #49 Address Genart comments (1 by grittygrease)
https://github.com/tlswg/tls-exported-authenticator/issues/49
3 issues closed:
- Address Secdir last call comments https://github.com/tlswg/tls-exported-authenticator/issues/51
- Explicitly forbid the generation of EAs with early_exporter_master_secret https://github.com/tlswg/tls-exported-authenticator/issues/48
- Address Genart comments https://github.com/tlswg/tls-exported-authenticator/issues/49
Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+8/-1/💬16)
8 pull requests submitted:
- Flatten ESNI negotiation mechanisms (by davidben)
https://github.com/tlswg/draft-ietf-tls-esni/pull/201
- Advertise multiple ESNIConfigs as a unit (by davidben)
https://github.com/tlswg/draft-ietf-tls-esni/pull/200
- Unify version/extension and key share negotiation mechanisms (by davidben)
https://github.com/tlswg/draft-ietf-tls-esni/pull/199
- Add a length prefix to ESNIConfig contents. (by davidben)
https://github.com/tlswg/draft-ietf-tls-esni/pull/198
- Key schedule injection proposal. (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/pull/197
- Tunnel version (by ekr)
https://github.com/tlswg/draft-ietf-tls-esni/pull/196
- Clarify rules on order and repetition for ESNIConfig extensions (by dmcardle)
https://github.com/tlswg/draft-ietf-tls-esni/pull/195
- Add note about inconsistent cryptographic configurations. (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/pull/194
4 pull requests received 16 new comments:
- #200 Advertise multiple ESNIConfigs as a unit (4 by bemasc, davidben)
https://github.com/tlswg/draft-ietf-tls-esni/pull/200
- #199 Unify version/extension and key share negotiation mechanisms (3 by davidben, ekr)
https://github.com/tlswg/draft-ietf-tls-esni/pull/199
- #196 Tunnel version (8 by davidben, ekr, kazuho, martinthomson)
https://github.com/tlswg/draft-ietf-tls-esni/pull/196
- #175 refer GREASE extension in resolution algorithm & formatting fix (1 by chris-wood)
https://github.com/tlswg/draft-ietf-tls-esni/pull/175
1 pull requests merged:
- Add note about inconsistent cryptographic configurations.
https://github.com/tlswg/draft-ietf-tls-esni/pull/194
* tlswg/draft-ietf-tls-ticketrequest (+1/-1/💬0)
1 pull requests submitted:
- changing track to standards (by seanturner)
https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8
1 pull requests merged:
- changing track to standards
https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/8
* tlswg/dtls13-spec (+6/-2/💬3)
6 pull requests submitted:
- Issue106 packets (by ekr)
https://github.com/tlswg/dtls13-spec/pull/113
- Issue109 chacha order (by ekr)
https://github.com/tlswg/dtls13-spec/pull/112
- Issue110 multiple connections same dg (by ekr)
https://github.com/tlswg/dtls13-spec/pull/111
- Fix typo (by martinthomson)
https://github.com/tlswg/dtls13-spec/pull/107
- changing ack content type number (by seanturner)
https://github.com/tlswg/dtls13-spec/pull/105
- adding DTLS-OK column values (by seanturner)
https://github.com/tlswg/dtls13-spec/pull/103
3 pull requests received 3 new comments:
- #112 Issue109 chacha order (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/112
- #111 Issue110 multiple connections same dg (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/111
- #103 adding DTLS-OK column values (1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/103
2 pull requests merged:
- changing ack content type number
https://github.com/tlswg/dtls13-spec/pull/105
- Fix typo
https://github.com/tlswg/dtls13-spec/pull/107
* tlswg/tls-subcerts (+1/-2/💬1)
1 pull requests submitted:
- Fix a formatting issue in changes (by siyengar)
https://github.com/tlswg/tls-subcerts/pull/40
1 pull requests received 1 new comments:
- #40 Fix a formatting issue in changes (1 by siyengar)
https://github.com/tlswg/tls-subcerts/pull/40
2 pull requests merged:
- Fix a formatting issue in changes
https://github.com/tlswg/tls-subcerts/pull/40
- Add text for PKCS 1.5
https://github.com/tlswg/tls-subcerts/pull/39
* tlswg/tls-exported-authenticator (+1/-3/💬2)
1 pull requests submitted:
- Explicitly forbid the generation of EAs with early_exporter_master_secret
(by grittygrease)
https://github.com/tlswg/tls-exported-authenticator/pull/53
2 pull requests received 2 new comments:
- #53 Explicitly forbid the generation of EAs with
early_exporter_master_secret (1 by grittygrease)
https://github.com/tlswg/tls-exported-authenticator/pull/53
- #52 Address Yaron Sheffer's comments. (1 by grittygrease)
https://github.com/tlswg/tls-exported-authenticator/pull/52
3 pull requests merged:
- Address Yaron Sheffer's comments.
https://github.com/tlswg/tls-exported-authenticator/pull/52
- Explicitly forbid the generation of EAs with early_exporter_master_secret
https://github.com/tlswg/tls-exported-authenticator/pull/53
- Address comments by Christer Holmberg.
https://github.com/tlswg/tls-exported-authenticator/pull/50
Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls