Issues
------
* tlswg/tls13-spec (+5/-1/💬8)
 5 issues created:
 - Multiple post-handshake authentications, identities, and tickets. (by 
emanjon)
https://github.com/tlswg/tls13-spec/issues/1250 - AEAD integrity limits for 0-RTT data (by emanjon) https://github.com/tlswg/tls13-spec/issues/1249 - Clarifications on traffic key use for some record types / content types (by emanjon) https://github.com/tlswg/tls13-spec/issues/1248 - Lifetime and expiry of certificates and external PSK (by emanjon) https://github.com/tlswg/tls13-spec/issues/1247 - Forward secrecy, long connections, and key exfiltration (by emanjon) https://github.com/tlswg/tls13-spec/issues/1245
 3 issues received 8 new comments:
 - #1248 Clarifications on traffic key use for some record types / content 
types (2 by emanjon, tomato42)
https://github.com/tlswg/tls13-spec/issues/1248 - #1247 Lifetime, expiry, and validity of certificates and PSKs (5 by emanjon, richsalz, tomato42) https://github.com/tlswg/tls13-spec/issues/1247 - #1243 Is resumption allowed before initial connection is closed? (1 by ekr) https://github.com/tlswg/tls13-spec/issues/1243
 1 issues closed:
- Is resumption allowed before initial connection is closed? https://github.com/tlswg/tls13-spec/issues/1243
* tlswg/external-psk-design-team (+2/-0/💬0)
 2 issues created:
 - SECDIR review (by seanturner)
https://github.com/tlswg/external-psk-design-team/issues/80 - OPSDIR comments (by seanturner) https://github.com/tlswg/external-psk-design-team/issues/79


Pull requests
-------------
* tlswg/tls13-spec (+2/-1/💬0)
 2 pull requests submitted:
 - Expand the duty of the certificate alerts to PSKs (external and resum… (by 
emanjon)
https://github.com/tlswg/tls13-spec/pull/1251 - Forward secrecy, long connections, and key exfiltration (by emanjon) https://github.com/tlswg/tls13-spec/pull/1246
 1 pull requests merged:
 - Resumption is allowed before the initial connection is closed
https://github.com/tlswg/tls13-spec/pull/1244
* tlswg/dtls13-spec (+0/-0/💬1)
 1 pull requests received 1 new comments:
 - #256 Attempt to address #254 : Mention RFC 7457 in Security section (1 by 
elvey)
https://github.com/tlswg/dtls13-spec/pull/256
* tlswg/tls-exported-authenticator (+0/-0/💬2)
 1 pull requests received 2 new comments:
 - #76 Add warning about agreement on Client certificate bytes. (2 by ekr, 
jhoyla)
https://github.com/tlswg/tls-exported-authenticator/pull/76

Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to