Issues
------
* tlswg/draft-ietf-tls-esni (+3/-1/💬11)
 3 issues created:
 - ECH contradicts second ClientHello consistency requirements in RFC8446 (by 
davidben)
https://github.com/tlswg/draft-ietf-tls-esni/issues/358 - Clients should send consistent GREASE ECH extensions between CH1 and CH2 (by davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/356 - "Don't stick out" considerations for ECH-09 (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/issues/354
 3 issues received 11 new comments:
 - #356 Clients should send consistent GREASE ECH extensions between CH1 and 
CH2 (5 by chris-wood, cjpatton, davidben)
https://github.com/tlswg/draft-ietf-tls-esni/issues/356 - #348 General server handling of ECH extension is unclear (3 by chris-wood, cjpatton, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/348 - #326 Include ECH context in ClientHelloOuterAAD (3 by chris-wood, cjpatton, davidben) https://github.com/tlswg/draft-ietf-tls-esni/issues/326
 1 issues closed:
- Consider shortening config_id to 8 bytes https://github.com/tlswg/draft-ietf-tls-esni/issues/342
* tlswg/dtls13-spec (+0/-1/💬3)
 1 issues received 3 new comments:
 - #153 DTLS 1.3 header format (3 by awcunning, hannestschofenig)
https://github.com/tlswg/dtls13-spec/issues/153
 1 issues closed:
- DTLS 1.3 header format https://github.com/tlswg/dtls13-spec/issues/153
* tlswg/dtls-conn-id (+0/-3/💬1)
 1 issues received 1 new comments:
 - #76 Clarification - variable length CID encoding MUST be deterministic (1 by 
boaks)
https://github.com/tlswg/dtls-conn-id/issues/76
 3 issues closed:
- Clarification - variable length CID encoding MUST be deterministic https://github.com/tlswg/dtls-conn-id/issues/76 - Add CIDAC (Connection ID Authentication Code) https://github.com/tlswg/dtls-conn-id/issues/74 - Disallow sending MAC failure fatal alerts to non-validated peers https://github.com/tlswg/dtls-conn-id/issues/72


Pull requests
-------------
* tlswg/draft-ietf-tls-esni (+3/-5/💬19)
 3 pull requests submitted:
 - Correcting incorrect integer equivalents for ECH and outer_extensions (by 
sudheesh001)
https://github.com/tlswg/draft-ietf-tls-esni/pull/357 - Bump HPKE-05 to -06 (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/355 - Derive accept confirmation from the handshake secret (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/353
 5 pull requests received 19 new comments:
 - #357 Correcting incorrect integer equivalents for ECH and outer_extensions 
(4 by chris-wood, davidben, sudheesh001)
https://github.com/tlswg/draft-ietf-tls-esni/pull/357 - #353 Derive accept confirmation from the handshake secret (3 by chris-wood, ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/353 - #352 Use the same HPKE context between the two ClientHellos (8 by chris-wood, cjpatton, davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/352 - #345 Only extract 8 bytes for the config_id (1 by davidben) https://github.com/tlswg/draft-ietf-tls-esni/pull/345 - #316 Require HRR-sensitive parameters match in ClientHello(Outer|Inner). (3 by davidben, ekr) https://github.com/tlswg/draft-ietf-tls-esni/pull/316
 5 pull requests merged:
 - Correcting incorrect integer equivalents for ECH and outer_extensions
https://github.com/tlswg/draft-ietf-tls-esni/pull/357 - Bump HPKE-05 to -06 https://github.com/tlswg/draft-ietf-tls-esni/pull/355 - Clarify client and server roles https://github.com/tlswg/draft-ietf-tls-esni/pull/350 - Rearrange the server HRR text. https://github.com/tlswg/draft-ietf-tls-esni/pull/351 - Only extract 8 bytes for the config_id https://github.com/tlswg/draft-ietf-tls-esni/pull/345
* tlswg/draft-ietf-tls-ticketrequest (+1/-1/💬0)
 1 pull requests submitted:
 - Address Ben's review. (by chris-wood)
https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/22
 1 pull requests merged:
 - Address Ben's review.
https://github.com/tlswg/draft-ietf-tls-ticketrequest/pull/22
* tlswg/dtls13-spec (+4/-2/💬0)
 4 pull requests submitted:
 - Referencing the DTLSInnerPlaintext from the encrypted_record structure (by 
hannestschofenig)
https://github.com/tlswg/dtls13-spec/pull/157 - Boilerplate Text Change (by hannestschofenig) https://github.com/tlswg/dtls13-spec/pull/156 - Changes in Markdown (by hannestschofenig) https://github.com/tlswg/dtls13-spec/pull/155 - Corrected Figure 4 (by hannestschofenig) https://github.com/tlswg/dtls13-spec/pull/154
 2 pull requests merged:
 - Changes in Markdown
https://github.com/tlswg/dtls13-spec/pull/155 - Corrected Figure 4 https://github.com/tlswg/dtls13-spec/pull/154
* tlswg/dtls-conn-id (+0/-3/💬1)
 1 pull requests received 1 new comments:
 - #73 Disallow sending MAC failure fatal alerts to non-validated peers (1 by 
boaks)
https://github.com/tlswg/dtls-conn-id/pull/73
 3 pull requests merged:
 - Disallow sending MAC failure fatal alerts to non-validated peers
https://github.com/tlswg/dtls-conn-id/pull/73 - Editorial bits from AD review https://github.com/tlswg/dtls-conn-id/pull/75 - Corrected reference to the RRC draft https://github.com/tlswg/dtls-conn-id/pull/71

Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-grease
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to