[COSE] Weekly github digest (COSE Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 22 October 2023 07:55 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: cose@ietfa.amsl.com
Delivered-To: cose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A40AFC1519B1 for <cose@ietfa.amsl.com>; Sun, 22 Oct 2023 00:55:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.405
X-Spam-Level:
X-Spam-Status: No, score=-2.405 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="DnWfbUlJ"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="v18UY1hZ"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7fz4wQfvlMB4 for <cose@ietfa.amsl.com>; Sun, 22 Oct 2023 00:55:48 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A74F2C15154D for <cose@ietf.org>; Sun, 22 Oct 2023 00:55:48 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id D0EFF5C0306 for <cose@ietf.org>; Sun, 22 Oct 2023 03:40:07 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute6.internal (MEProxy); Sun, 22 Oct 2023 03:40:07 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:sender:subject:subject:to:to; s=fm1; t= 1697960407; x=1698046807; bh=4/9xlxtRLEnHOcDScol50//2KfR6UEDruhk NbNr416A=; b=DnWfbUlJuPjlxZZZ2LAAUD2ImHhwM2YT8LGUqjisSY+yMdUO63g D3nD6jB3RYL8+qanGqZwVCHkQe6FKVPoJ/BVXcDXLScIg+aQaQisBnDOgrwDtPc3 8cQN220oof2WVT/6Sw5Cm65ShagVRVlVYhYvgIOwJ9kXO27Pykxm/biNZ5jtFyEx cVeBC4RWXNOWW7mg4xelR8lgVF3iJ4ZJ/T6n69fEqKv1VM62RJsZ03Z6wvR9Bczh 2bCM/dU5NLgW4aIvkbJmxey5uKh5TyNOCNcTceY1eIU3TWJ8g+DxfF+fpoloQzSg HZH3dlbQ4xwGjS3+FtYlSXG0AbPkHv+PFqw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1697960407; x= 1698046807; bh=4/9xlxtRLEnHOcDScol50//2KfR6UEDruhkNbNr416A=; b=v 18UY1hZmCii/VdAbU3W2eYT3AiEgUQatJPrkugHmYHm/Os5loijqm25mTA9qaL6/ GPbAEl7hX0Als9L1s84b2CL1TSOYw4EsirhDGr/CkKzlCk4uURtDx6lYXTm2vnga qLzIpdP28bw0QDP9EXqOyrJRnuiutmSyGhrFyIGd0MrwA/1Q3kPeX0X0qJ0D7AHR X9DA/aj4aOvwTYx6XAXIUnOIaGwR9VYvK1pnRyovvABtciocsLDoAtzq2ygXh0uv Z+QfuL5nWcnNolxKtXSaJXSLcF0dF2C9st5wjtCyNQaEanz2BX7guGIJeACU3biE 4ec9BreairJUEUKdWYBaQ==
X-ME-Sender: <xms:19E0ZZAnToTnEageQ6QzcO38sdRpGC0ldLQcFes78ZQ_I27ff5v06A> <xme:19E0ZXhUiC3MFxOzvLxwXSQszfpQS2bi-WKq_Hzre-3Y0y17s55iGvcUO_GLrUOTC -jUh843KryQGwhokw>
X-ME-Received: <xmr:19E0ZUkf8MSBCV_nY4v1xV_FDte8I78N3odhiffK0hWlqtw_zuiEWKZxKqSCQmo13_tGjC3D1OB2mSix9lceZxOjZ0izWMSmfyqBPwj84uGOmakmK8Tk4ItCVwhNs5l4LdKwRA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvkedrkedvgdduiecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmnecujf gurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhihucet tghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhiesmh hnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeugfef hfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrdgtoh hmnecuvehluhhsthgvrhfuihiivgepfeenucfrrghrrghmpehmrghilhhfrhhomhepugho pghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:19E0ZTxUiAAAljodNRnZdmCUTF_vTY97gVQEw6--THnAnmCjvWQwZw> <xmx:19E0ZeSJTaE4FEwNFQ1my1P54Po4vhq6jMCHqxzHXPBLwPwS7P0Zhw> <xmx:19E0ZWYq_a4gmrjcy2dYrpsGWIavcA17bgiGBbHgI3azGOUtwMMQWA> <xmx:19E0ZVOeJbhMz9kxOC2zx-YTZOgVQKACp5TN0taWy65up55K5ao0lQ>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <cose@ietf.org>; Sun, 22 Oct 2023 03:40:07 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============8904890066284530879=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: cose@ietf.org
Message-Id: <20231022075548.A74F2C15154D@ietfa.amsl.com>
Date: Sun, 22 Oct 2023 00:55:48 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/cose/E5RaFpePhJJA4EaCFoJaY0KujvQ>
Subject: [COSE] Weekly github digest (COSE Activity Summary)
X-BeenThere: cose@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: CBOR Object Signing and Encryption <cose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cose>, <mailto:cose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cose/>
List-Post: <mailto:cose@ietf.org>
List-Help: <mailto:cose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cose>, <mailto:cose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Oct 2023 07:55:53 -0000



Events without label "editorial"

Issues
------
* cose-wg/CBOR-certificates (+1/-10/💬13)
  1 issues created:
  - Byte string encoding of text string assumes even number of symbols (by gselander)
    https://github.com/cose-wg/CBOR-certificates/issues/135 

  12 issues received 13 new comments:
  - #125 Extend relevant example C509 certificates with annotations (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/125 
  - #124 Add support for challengePassword attribute (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/124 
  - #112 Assign integer value to following issue/subject attributes (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/112 
  - #111 Assign integer value to following extensions (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/111 
  - #105 Is the reduction of certificate size the killer feature of C509? (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/105 
  - #102 Further comments from Ilari (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/102 
  - #101 id-pe-tlsfeature and subject information access should likely be supported (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/101 
  - #96 Describe CA processing (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/96 
  - #92 Example certificate with key usable for Diffie-Hellman. (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/92 
  - #80 CSR for Certificates containing static DH keys (2 by gselander, highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/80 
  - #74 Signaure and Public Key Algorithms (Figure 8 and 9)  (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/74 [close?] 
  - #68 CRL and OCSP? The same CBOR encoding could trivially be used for CRL and OCSP as well. (1 by highlunder)
    https://github.com/cose-wg/CBOR-certificates/issues/68 [revocation] 

  10 issues closed:
  - Signaure and Public Key Algorithms (Figure 8 and 9)  https://github.com/cose-wg/CBOR-certificates/issues/74 [close?] 
  - CRL and OCSP? The same CBOR encoding could trivially be used for CRL and OCSP as well. https://github.com/cose-wg/CBOR-certificates/issues/68 [revocation] 
  - Extend relevant example C509 certificates with annotations https://github.com/cose-wg/CBOR-certificates/issues/125 
  - Add support for challengePassword attribute https://github.com/cose-wg/CBOR-certificates/issues/124 
  - Assign integer value to following issue/subject attributes https://github.com/cose-wg/CBOR-certificates/issues/112 
  - Assign integer value to following extensions https://github.com/cose-wg/CBOR-certificates/issues/111 
  - Is the reduction of certificate size the killer feature of C509? https://github.com/cose-wg/CBOR-certificates/issues/105 
  - id-pe-tlsfeature and subject information access should likely be supported https://github.com/cose-wg/CBOR-certificates/issues/101 
  - Example certificate with key usable for Diffie-Hellman. https://github.com/cose-wg/CBOR-certificates/issues/92 
  - Describe CA processing https://github.com/cose-wg/CBOR-certificates/issues/96 



Pull requests
-------------
* cose-wg/CBOR-certificates (+2/-6/💬2)
  2 pull requests submitted:
  - A bit more on legacy / describe legacy CA processing (by highlunder)
    https://github.com/cose-wg/CBOR-certificates/pull/134 
  - Suitability of different public key algorithms for use within IoT  (by highlunder)
    https://github.com/cose-wg/CBOR-certificates/pull/133 

  1 pull requests received 2 new comments:
  - #133 Suitability of different public key algorithms for use within IoT  (2 by gselander)
    https://github.com/cose-wg/CBOR-certificates/pull/133 

  6 pull requests merged:
  - Suitability of different public key algorithms for use within IoT 
    https://github.com/cose-wg/CBOR-certificates/pull/133 
  - Create draft-ietf-cose-cbor-revocation-management.md
    https://github.com/cose-wg/CBOR-certificates/pull/119 
  - Integer assignments
    https://github.com/cose-wg/CBOR-certificates/pull/131 
  - A bit more on legacy / describe legacy CA processing
    https://github.com/cose-wg/CBOR-certificates/pull/134 
  - A comment instead of a specific Diffie-Hellman key agreement cert
    https://github.com/cose-wg/CBOR-certificates/pull/132 
  - Add support for challengePassword attribute of CSR
    https://github.com/cose-wg/CBOR-certificates/pull/127 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/cose-wg/CBOR-certificates
* https://github.com/cose-wg/Charter
* https://github.com/cose-wg/cose-rfc8152bis
* https://github.com/cose-wg/countersign
* https://github.com/cose-wg/X509