[OAUTH-WG] Weekly github digest (OAuth Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 26 January 2025 07:39 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61BE2C1D4CD7 for <oauth@ietfa.amsl.com>; Sat, 25 Jan 2025 23:39:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.406
X-Spam-Level:
X-Spam-Status: No, score=-2.406 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="Omw1K3ri"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="fiMmzdW1"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MbnefTaTLtoR for <oauth@ietfa.amsl.com>; Sat, 25 Jan 2025 23:39:10 -0800 (PST)
Received: from fhigh-b7-smtp.messagingengine.com (fhigh-b7-smtp.messagingengine.com [202.12.124.158]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 826CBC1D4CE6 for <oauth@ietf.org>; Sat, 25 Jan 2025 23:39:10 -0800 (PST)
Received: from phl-compute-05.internal (phl-compute-05.phl.internal [10.202.2.45]) by mailfhigh.stl.internal (Postfix) with ESMTP id D79DD25400C7 for <oauth@ietf.org>; Sun, 26 Jan 2025 02:39:09 -0500 (EST)
Received: from phl-mailfrontend-01 ([10.202.2.162]) by phl-compute-05.internal (MEProxy); Sun, 26 Jan 2025 02:39:09 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1737877149; x=1737963549; bh=U0cx3dzLDIGUhcfmgK6Xr8F25rNQi3ghu9u FW/FJEiA=; b=Omw1K3riZVyMqPLXOTGuF1dy9LWHyGOS+OFkh1YzknqbQDXGMKu kNmr32TqiK9iyviYRq0xmF0ppdoth9/wvcLLpgPPHlPGzmMAEVyQHPflU5+oZfUK pKHnO+uB2/e6CHgIW78TrqMlUWO7Kph1UD8tSita9JG7XeQbenS2AfhGvvreD8MS Y46vfpn2MaJcpqvH4Gs0izuOarOzxTzi1WXYSpW93SLHeExJuMnw3kHPJg9UOfLT 0nj2VioiMclOPY5NNnUPLmpg5VVhJ5QLYhJ3pNtfBjjpzQY4diYJ2SqHkuX02Lhk gKhknfjYJoRPQYWZ+llshF9mmeFOslxsjTA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; t=1737877149; x=1737963549; bh=U 0cx3dzLDIGUhcfmgK6Xr8F25rNQi3ghu9uFW/FJEiA=; b=fiMmzdW11arYY7er6 GN1W9oDCjLnQPXSbR7ldCVHbCFpGd4LK8EkXAZPucvwFG+1ai4nwGxDKKLUEvAnU 4XcJBFs+YVT/HN2uHdAoNwAGvXhQumRrDrFTyMf2TID7BTafIi4YQNagbGJdyE+g bCCICgUkIBBqcXgbUABETf5w4t1gFFR1cEVKKw6ZthRt8QY60tA+dLSmucx0WVKw +94neuT98Riarvjix4EZNteO6TgeX4nsUGOwR/vuCSXkMiKIlLge3NQJB3v3rrAa b9uCXf6c9scpG/ED7T8KJSrE1cXiC+Cp6t69xgfUcQ78cmEXmQsWuCOonigj33Lf 6CcpA==
X-ME-Sender: <xms:neaVZ1n8RB_Eja0mLA98-ZBGVl7D69I9kTU7DBRPoYBkhUVd4mrqAA> <xme:neaVZw2EGWNTI5ZjIN1LvT4ih8wy_mI-DDywyyg4psIl21aPWNOGkH79yVXkhF-R_ UBLA31WmipO6YyhJA>
X-ME-Received: <xmr:neaVZ7o_3RfP7911eRJO6dxCketkT5IbuA6tT50mzrN-G_qm6_xF7Dixqi00Qw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeefuddrudejgedgleeikecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufh hivghlugculdegledmnecujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomhep tfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguoh gpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedv udetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrg hinhepghhithhhuhgsrdgtohhmnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghm pehmrghilhhfrhhomhepughopghnohhtpghrvghplhihsehmnhhothdrnhgvthdpnhgspg hrtghpthhtohepuddpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepohgruhhthhes ihgvthhfrdhorhhg
X-ME-Proxy: <xmx:neaVZ1mq0EDoXSZVkL2qhsL2vXUb4BaRQNoVuwP--L1-BzTLbLUuxQ> <xmx:neaVZz1CNIbkEZcVBy4ekSEZZBueFmMs1NWd_mwMwUZQ2B-5qo5FZQ> <xmx:neaVZ0ue5Y43LzIKtOVWvokOzrlcidaixAjv6j18mRXbowEpNwiITA> <xmx:neaVZ3VZvY0dwgkETSLQU2d_lTpxydFGxshxlXdyFDbyBe32KhMLlg> <xmx:neaVZxB6fPRmVbUrjq8sAprn6yPQ4Bk5Qbv15DX5Qtk6YlbZYSkafB15>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 26 Jan 2025 02:39:09 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============1777127328898410718=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20250126073910.826CBC1D4CE6@ietfa.amsl.com>
Date: Sat, 25 Jan 2025 23:39:10 -0800
Message-ID-Hash: QMQA4KHF5R22HUPZ7Q6IOFFQ7LRA3YGX
X-Message-ID-Hash: QMQA4KHF5R22HUPZ7Q6IOFFQ7LRA3YGX
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/-BpWZQozxlowwhmem-x9SV3SaFQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>



Events without label "editorial"

Issues
------
* oauth-wg/oauth-browser-based-apps (+0/-0/šŸ’¬1)
  1 issues received 1 new comments:
  - #62 Using Web Workers to refresh access tokens adds implementation complexity for marginal security benefit (1 by micolous)
    https://github.com/oauth-wg/oauth-browser-based-apps/issues/62 

* oauth-wg/oauth-identity-chaining (+2/-0/šŸ’¬0)
  2 issues created:
  - Security Considerations (by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/131 
  - Add security consideration on refresh tokens? (by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/130 

* oauth-wg/oauth-transaction-tokens (+0/-4/šŸ’¬4)
  4 issues received 4 new comments:
  - #131 Can a sub_id change? (1 by tulshi)
    https://github.com/oauth-wg/oauth-transaction-tokens/issues/131 [pre-last-call] 
  - #107 external invocations (1 by tulshi)
    https://github.com/oauth-wg/oauth-transaction-tokens/issues/107 [pre-last-call] 
  - #95 Define discovery metadata for support of the Transaction Token functionality (1 by gffletch)
    https://github.com/oauth-wg/oauth-transaction-tokens/issues/95 [IETF120-discuss] [pre-last-call] 
  - #80 Extensibility of `azd` and `rctx` (1 by tulshi)
    https://github.com/oauth-wg/oauth-transaction-tokens/issues/80 [IETF120-discuss] [pre-last-call] 

  4 issues closed:
  - Extensibility of `azd` and `rctx` https://github.com/oauth-wg/oauth-transaction-tokens/issues/80 [IETF120-discuss] [pre-last-call] 
  - Audience, scope & purpose https://github.com/oauth-wg/oauth-transaction-tokens/issues/115 
  - Can a sub_id change? https://github.com/oauth-wg/oauth-transaction-tokens/issues/131 [pre-last-call] 
  - RAR object inside a TraT https://github.com/oauth-wg/oauth-transaction-tokens/issues/118 [pre-last-call] 

* oauth-wg/oauth-sd-jwt-vc (+1/-0/šŸ’¬0)
  1 issues created:
  - Say something about presentations if KB-JWT is not used (by awoie)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/297 

* oauth-wg/draft-ietf-oauth-resource-metadata (+1/-0/šŸ’¬1)
  1 issues created:
  - Necessity of `dpop_bound_access_tokens_required` parameter (by erincandescent)
    https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata/issues/63 

  1 issues received 1 new comments:
  - #56 Ambiguous handling of the resource_metadata WWW-Authenticate parameter (1 by erincandescent)
    https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata/issues/56 

* oauth-wg/draft-ietf-oauth-status-list (+7/-5/šŸ’¬24)
  7 issues created:
  - Extension Token Status List to x509 (by steffenschwalm)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/243 
  - Various editorial change proposals (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/238 
  - Token Lifecycle (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/237 
  - About Status List Token distribution points (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/236 
  - New section to define the sLTSign bit of a key usage extension in a PKC (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/235 
  - Validation Rules (section 8.3) (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/234 
  - Cryptographic signature algorithms (by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/233 

  11 issues received 24 new comments:
  - #238 Various editorial change proposals (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/238 
  - #236 About Status List Token distribution points (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/236 
  - #235 New section to define the sLTSign bit of a key usage extension in a PKC (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/235 
  - #234 Validation Rules (section 8.3) (2 by Denisthemalice, paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/234 
  - #233 Cryptographic signature algorithms (7 by Denisthemalice, c2bo, paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/233 
  - #229 Add a section to provide estimations about the size and the number of Token Status Lists (3 by Denisthemalice, paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/229 
  - #225 The status list mechanism as currently described does not allow for interoperability (5 by Denisthemalice, paulbastian, tplooker)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/225 
  - #224 Interims Feedback: Explain motivation to split issuer / status list issuer / status list provider (1 by Denisthemalice)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/224 
  - #222 Interims Feedback: Discussion around Suspended Status Type (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/222 
  - #221 Reduce the statuses to 2 and 1 bit (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/221 
  - #217 Comments on section 12.5.1 Unlinkability (1 by tplooker)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/217 

  5 issues closed:
  - Reduce the statuses to 2 and 1 bit https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/221 
  - Comments on section 12.5.1 Unlinkability https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/217 
  - IETF 118: Mention prior art https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/83 [ready-for-pr] 
  - Interims Feedback: Short-lived credentials https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/223 
  - Add a section to provide estimations about the size and the number of Token Status Lists https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/229 



Pull requests
-------------
* oauth-wg/oauth-identity-chaining (+3/-0/šŸ’¬3)
  3 pull requests submitted:
  - Security Considerations - Sender Constrain Option 3 (by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/132 
  - Security Considerations - Sender Constrain Option 2 (by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/129 
  - Security Considerations - Sender Constrain Option 1 (by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/128 

  2 pull requests received 3 new comments:
  - #132 Security Considerations - Sender Constrain Option 3 (1 by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/132 
  - #128 Security Considerations - Sender Constrain Option 1 (2 by PieterKas)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/128 

* oauth-wg/oauth-transaction-tokens (+2/-1/šŸ’¬0)
  2 pull requests submitted:
  - Fixed upload-artifact version. (by tulshi)
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/152 
  - changed all references to Trust Domain (capitalized) (by tulshi)
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/151 

  1 pull requests merged:
  - Fixed upload-artifact version.
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/152 

* oauth-wg/oauth-selective-disclosure-jwt (+1/-2/šŸ’¬7)
  1 pull requests submitted:
  - Editorial updates to text introduced in -15 to doc history (by bc-pi)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/544 

  1 pull requests received 7 new comments:
  - #535 add Watson Ladd's suggested text with minor adaptations (7 by Denisthemalice, wbl)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/535 

  2 pull requests merged:
  - Editorial updates to text introduced in -15 to doc history
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/544 
  - editorial cleanup
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/543 

* oauth-wg/draft-ietf-oauth-status-list (+4/-5/šŸ’¬4)
  4 pull requests submitted:
  - update templates (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/242 
  - editorial changes on terminology and Referenced Tokens (by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/241 
  - Minor editorial change to address issue 217 (by tplooker)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/240 
  - editorial fixes (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/239 

  2 pull requests received 4 new comments:
  - #239 editorial fixes (1 by paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/239 
  - #232 More test vectors (3 by c2bo, paulbastian)
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/232 

  5 pull requests merged:
  - update templates
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/242 
  - editorial fixes
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/239 
  - Minor editorial change to address issue 217
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/240 
  - Mention prior art
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/231 
  - interims feedback #1
    https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/230 

* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+2/-0/šŸ’¬0)
  2 pull requests submitted:
  - update ietf template (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/97 
  - fix examples (missing typ) (by c2bo)
    https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/96 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1
* https://github.com/oauth-wg/draft-ietf-oauth-status-list
* https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth


-- 
To have a summary like this sent to your list, see: https://github.com/ietf-github-services/activity-summary