Issues ------ * tlswg/draft-ietf-tls-esni (+0/-4/💬2) 2 issues received 2 new comments: - #424 Should IP addresses be allowed for the client-facing server? (1 by chris-wood)https://github.com/tlswg/draft-ietf-tls-esni/issues/424 [design] - #405 public_name edge cases and client checks (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/issues/405 [design]
4 issues closed:- public_name edge cases and client checks https://github.com/tlswg/draft-ietf-tls-esni/issues/405 [design] - Should IP addresses be allowed for the client-facing server? https://github.com/tlswg/draft-ietf-tls-esni/issues/424 [design] - A MUST for inclusion of public_name in outer SNI seems wrong https://github.com/tlswg/draft-ietf-tls-esni/issues/396 [design] - Naive outer_extensions decoding is a DoS risk https://github.com/tlswg/draft-ietf-tls-esni/issues/378 [design]
Pull requests ------------- * tlswg/draft-ietf-tls-esni (+4/-5/💬13) 4 pull requests submitted: - Say that acceptance will be confirmed twice in case of HRR (by cjpatton)https://github.com/tlswg/draft-ietf-tls-esni/pull/461 - Say that ECH acceptance is signaled at most once (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/460 - Add 10-to-11 change log. (by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/459 - Bump codepoint for draft-11 (by cjpatton) https://github.com/tlswg/draft-ietf-tls-esni/pull/458
5 pull requests received 13 new comments: - #460 Say that ECH acceptance is signaled at most once (1 by martinthomson)https://github.com/tlswg/draft-ietf-tls-esni/pull/460 - #458 Bump codepoint for draft-11 (1 by sftcd) https://github.com/tlswg/draft-ietf-tls-esni/pull/458 - #457 Define the Padding message (4 by chris-wood, cjpatton, martinthomson) https://github.com/tlswg/draft-ietf-tls-esni/pull/457 - #456 Require that someone validate public_name correctly. (6 by chris-wood, sftcd) https://github.com/tlswg/draft-ietf-tls-esni/pull/456 - #447 Leave IPv4 address parsing to the application (1 by chris-wood) https://github.com/tlswg/draft-ietf-tls-esni/pull/447
5 pull requests merged: - Say that acceptance will be confirmed twice in case of HRRhttps://github.com/tlswg/draft-ietf-tls-esni/pull/461 - Add 10-to-11 change log. https://github.com/tlswg/draft-ietf-tls-esni/pull/459 - Require that someone validate public_name correctly. https://github.com/tlswg/draft-ietf-tls-esni/pull/456 - Require compressed extensions appear in the same relative order. https://github.com/tlswg/draft-ietf-tls-esni/pull/455 - Bump codepoint for draft-11 https://github.com/tlswg/draft-ietf-tls-esni/pull/458
* tlswg/tls13-spec (+1/-0/💬0) 1 pull requests submitted: - Correct NST extensions length (by mattcaswell)https://github.com/tlswg/tls13-spec/pull/1233
Repositories tracked by this digest: ----------------------------------- * https://github.com/tlswg/draft-ietf-tls-semistatic-dh * https://github.com/tlswg/draft-ietf-tls-md5-sha1-deprecate * https://github.com/tlswg/draft-ietf-tls-esni * https://github.com/tlswg/certificate-compression * https://github.com/tlswg/draft-ietf-tls-external-psk-importer * https://github.com/tlswg/draft-ietf-tls-ticketrequest * https://github.com/tlswg/tls13-spec * https://github.com/tlswg/tls-flags * https://github.com/tlswg/dtls13-spec * https://github.com/tlswg/dtls-conn-id * https://github.com/tlswg/tls-subcerts * https://github.com/tlswg/oldversions-deprecate * https://github.com/tlswg/sniencryption * https://github.com/tlswg/tls-exported-authenticator * https://github.com/tlswg/draft-ietf-tls-ctls * https://github.com/tlswg/external-psk-design-team
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls