Issues
------
* tlswg/dtls13-spec (+0/-2/💬5)
 3 issues received 5 new comments:
 - #187 Ben Kaduk's review requested a number of example fixes. (1 by ekr)
https://github.com/tlswg/dtls13-spec/issues/187 - #170 DTLS version number (2 by ekr, kaduk) https://github.com/tlswg/dtls13-spec/issues/170 [pr-exists] - #158 Explain differences between DTLS 1.2 CID and DTLS 1.3 in the appendix (2 by ekr, kaduk) https://github.com/tlswg/dtls13-spec/issues/158 [propose-close]
 2 issues closed:
- State Machine Fix https://github.com/tlswg/dtls13-spec/issues/189 - Ben Kaduk's review requested a number of example fixes. https://github.com/tlswg/dtls13-spec/issues/187
* tlswg/oldversions-deprecate (+1/-0/💬0)
 1 issues created:
 - Consistent References (by seanturner)
https://github.com/tlswg/oldversions-deprecate/issues/10


Pull requests
-------------
* tlswg/tls-flags (+1/-0/💬0)
 1 pull requests submitted:
 - Clarify what messages can have tls_flags (by yoavnir)
https://github.com/tlswg/tls-flags/pull/5
* tlswg/dtls13-spec (+5/-2/💬8)
 5 pull requests submitted:
 - Describe how to distinguish DTLS 1.2 and DTLS 1.3 connections. Fixes … (by 
ekr)
https://github.com/tlswg/dtls13-spec/pull/197 - Use DTLS style version values, even for DTLS 1.3. Fixes #170 (by ekr) https://github.com/tlswg/dtls13-spec/pull/196 - You can intermix sequence and length settings on the same connection.… (by ekr) https://github.com/tlswg/dtls13-spec/pull/195 - Forbid going from an empty CID to a non-empty CID. Fixes #186 (by ekr) https://github.com/tlswg/dtls13-spec/pull/194 - Add warning about certificates and congestion. Fixed #174 (by ekr) https://github.com/tlswg/dtls13-spec/pull/193
 6 pull requests received 8 new comments:
 - #197 Describe how to distinguish DTLS 1.2 and DTLS 1.3 connections. Fixes … 
(1 by ekr)
https://github.com/tlswg/dtls13-spec/pull/197 [review-needed] - #196 Use DTLS style version values, even for DTLS 1.3. Fixes #170 (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/196 - #193 Add warning about certificates and congestion. Fixed #174 (1 by kaduk) https://github.com/tlswg/dtls13-spec/pull/193 [review-needed] - #188 Updated examples in Section 5.6 (3 by ekr, kaduk) https://github.com/tlswg/dtls13-spec/pull/188 - #172 The advise to aggressively age out was too aggressive (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/172 - #166 Require that cipher suites define a record number encryption algorithm (1 by ekr) https://github.com/tlswg/dtls13-spec/pull/166 [review-needed]
 2 pull requests merged:
 - Referencing the DTLSInnerPlaintext from the encrypted_record structure
https://github.com/tlswg/dtls13-spec/pull/157 - Updated examples in Section 5.6 https://github.com/tlswg/dtls13-spec/pull/188

Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to