Issues
------
* tlswg/tls13-spec (+5/-1/💬8)
5 issues created:
- Multiple post-handshake authentications, identities, and tickets. (by
emanjon)
https://github.com/tlswg/tls13-spec/issues/1250
- AEAD integrity limits for 0-RTT data (by emanjon)
https://github.com/tlswg/tls13-spec/issues/1249
- Clarifications on traffic key use for some record types / content types (by emanjon)
https://github.com/tlswg/tls13-spec/issues/1248
- Lifetime and expiry of certificates and external PSK (by emanjon)
https://github.com/tlswg/tls13-spec/issues/1247
- Forward secrecy, long connections, and key exfiltration (by emanjon)
https://github.com/tlswg/tls13-spec/issues/1245
3 issues received 8 new comments:
- #1248 Clarifications on traffic key use for some record types / content
types (2 by emanjon, tomato42)
https://github.com/tlswg/tls13-spec/issues/1248
- #1247 Lifetime, expiry, and validity of certificates and PSKs (5 by emanjon, richsalz, tomato42)
https://github.com/tlswg/tls13-spec/issues/1247
- #1243 Is resumption allowed before initial connection is closed? (1 by ekr)
https://github.com/tlswg/tls13-spec/issues/1243
1 issues closed:
- Is resumption allowed before initial connection is closed? https://github.com/tlswg/tls13-spec/issues/1243
* tlswg/external-psk-design-team (+2/-0/💬0)
2 issues created:
- SECDIR review (by seanturner)
https://github.com/tlswg/external-psk-design-team/issues/80
- OPSDIR comments (by seanturner)
https://github.com/tlswg/external-psk-design-team/issues/79
Pull requests
-------------
* tlswg/tls13-spec (+2/-1/💬0)
2 pull requests submitted:
- Expand the duty of the certificate alerts to PSKs (external and resum… (by
emanjon)
https://github.com/tlswg/tls13-spec/pull/1251
- Forward secrecy, long connections, and key exfiltration (by emanjon)
https://github.com/tlswg/tls13-spec/pull/1246
1 pull requests merged:
- Resumption is allowed before the initial connection is closed
https://github.com/tlswg/tls13-spec/pull/1244
* tlswg/dtls13-spec (+0/-0/💬1)
1 pull requests received 1 new comments:
- #256 Attempt to address #254 : Mention RFC 7457 in Security section (1 by
elvey)
https://github.com/tlswg/dtls13-spec/pull/256
* tlswg/tls-exported-authenticator (+0/-0/💬2)
1 pull requests received 2 new comments:
- #76 Add warning about agreement on Client certificate bytes. (2 by ekr,
jhoyla)
https://github.com/tlswg/tls-exported-authenticator/pull/76
Repositories tracked by this digest:
-----------------------------------
* https://github.com/tlswg/draft-ietf-tls-semistatic-dh
* https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate
* https://github.com/tlswg/draft-ietf-tls-esni
* https://github.com/tlswg/certificate-compression
* https://github.com/tlswg/draft-ietf-tls-external-psk-importer
* https://github.com/tlswg/draft-ietf-tls-ticketrequest
* https://github.com/tlswg/tls13-spec
* https://github.com/tlswg/tls-flags
* https://github.com/tlswg/dtls13-spec
* https://github.com/tlswg/dtls-conn-id
* https://github.com/tlswg/tls-subcerts
* https://github.com/tlswg/oldversions-deprecate
* https://github.com/tlswg/sniencryption
* https://github.com/tlswg/tls-exported-authenticator
* https://github.com/tlswg/draft-ietf-tls-ctls
* https://github.com/tlswg/external-psk-design-team
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls