[OAUTH-WG] Weekly github digest (OAuth Activity Summary)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 15 June 2025 07:43 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@mail2.ietf.org
Delivered-To: oauth@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 12EC3351B61E for <oauth@mail2.ietf.org>; Sun, 15 Jun 2025 00:43:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.398
X-Spam-Level:
X-Spam-Status: No, score=-2.398 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="c5B6+Cvm"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="QAy9ZoYL"
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RSMm6MVLmFIs for <oauth@mail2.ietf.org>; Sun, 15 Jun 2025 00:43:40 -0700 (PDT)
Received: from fout-b7-smtp.messagingengine.com (fout-b7-smtp.messagingengine.com [202.12.124.150]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id F1974351AA17 for <oauth@ietf.org>; Sun, 15 Jun 2025 00:42:57 -0700 (PDT)
Received: from phl-compute-01.internal (phl-compute-01.phl.internal [10.202.2.41]) by mailfout.stl.internal (Postfix) with ESMTP id A8F3C11400F6 for <oauth@ietf.org>; Sun, 15 Jun 2025 03:42:57 -0400 (EDT)
Received: from phl-mailfrontend-01 ([10.202.2.162]) by phl-compute-01.internal (MEProxy); Sun, 15 Jun 2025 03:42:57 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm2; t= 1749973377; x=1750059777; bh=0hsH6cn8YVTm5HOc+8blXy793qnRwBfkw7t QAzAWU5c=; b=c5B6+CvmRyent/3CURBEdBv8ggps7lZio6vEZqWQs2KGJpencS6 yhPyzoi6D778Y9qGHXazovSPGEst1yw1LTzAwROXuX+0JeckyN88i2sBcCqTBAzi 6EKyRZI5ZwqFbg8PwZKKOEhMpRkoAh4C/1Kc82Ry3qaHuYVKTfR9gWigG1Hmy67/ yXawLCLL/F/78Fo6H6CLu4Ksgwo0FGAYYCy2dV/2UDFGPUkchHrgFtx0AIWQrHwp VOXXMye4u/w/yI5ICPJJZbsPDbLhppFUzVdKJUy0P9eznhMpUqHnd/RWTy4YorOp gMgw0t56B/TKIVVUiTrh7ba5XzQUG6tTZ6g==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm1; t=1749973377; x=1750059777; bh=0 hsH6cn8YVTm5HOc+8blXy793qnRwBfkw7tQAzAWU5c=; b=QAy9ZoYLcUlhLFGt2 wwmQTbAu1apuQkGdChKCjGBZ4hM1QO9HBAnFzKmCOJvMNycRVe3PgcrxY11Mx592 hBvL6CqpIlA1GiG4bQJ1/Si/mp5MRHg7oZgQz45spKqZWw97MFq3K7cZD67vqAiC ZlUcuxWAsH1ePnyH8IH5XXaUBvuvD0dRluPjeMsigrPVe4ooWBs37qh1Y3GygetG Hrs+8KO63tJmnHK3i6hRzwUHLV0kUie8zfudCPcM/j4sCpWYhJS+yek+A6Bymocg c3DqluPWSh/0DJBf1FM6l/1XUyginwKm1KHxXCvMzo4kClg5+6xPGgqdoxjahRT8 9u5Mg==
X-ME-Sender: <xms:gXlOaHNZFSSzmXJbITJRWfVnBbP8Wv2NBDArXm0ECRSy2bTLzLoqmw> <xme:gXlOaB-EbgOlkHY3J7B1ReRnoPoQZXfHWS9LB2hj89pcA2siDBW2Q7o89oBT3NMri 6MsEtku_i9FqeXoVg>
X-ME-Received: <xmr:gXlOaGRztmbwKT0e3FMMxmtaPSP3rkNr2gSKwmtF42xKQPlW3PXFWiC1o0hH9fg-AE73ik4yPkTumxQdfHrBRxp1pZ1HfbM-EPURFlaRzYpwY3tf7GwMtdBoxaGm9lONFlL8dwSr4A>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeeffedrtddugddvfedufecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufh hivghlugculdegledmnecujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomhep tfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguoh gpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedv udetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrg hinhepghhithhhuhgsrdgtohhmnecuvehluhhsthgvrhfuihiivgepvdenucfrrghrrghm pehmrghilhhfrhhomhepughopghnohhtpghrvghplhihsehmnhhothdrnhgvthdpnhgspg hrtghpthhtohepuddpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepohgruhhthhes ihgvthhfrdhorhhg
X-ME-Proxy: <xmx:gXlOaLtlbgRHDSUIKlvoLvNkDWN2yWEeJpoSm2c4u16H6B6bPKn0tQ> <xmx:gXlOaPcWD0HuVPGP1AmpWbDbqUD63HRUTYpWjV3KsejrX0spkSerzg> <xmx:gXlOaH1NqSBLx4BPU8cSmPa94vPTuKNZr4YeaJ3ulxDSkE1yVY8_0A> <xmx:gXlOaL_djUv4GUB81HEhGtsZa90gbGrhNTogL_af_Fm2GlkM_tV81w> <xmx:gXlOaOz8OIIo1Wq1SGzTsiGADQE1-EdU8v44XP1a0TPY_YQwiiAxOeLM>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 15 Jun 2025 03:42:57 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============3418554039180358037=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20250615074257.F1974351AA17@mail2.ietf.org>
Date: Sun, 15 Jun 2025 00:42:57 -0700
Message-ID-Hash: ECAXABSWUNYCCNY3G37BLMBXXL3GSHNH
X-Message-ID-Hash: ECAXABSWUNYCCNY3G37BLMBXXL3GSHNH
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/86lD_wNfJLJ7yMAHyzW1OA6Bw8U>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
Events without label "editorial" Issues ------ * oauth-wg/oauth-sd-jwt-vc (+1/-0/š¬2) 1 issues created: - Inconsistent description of display property of claim metadata (by charsleysa) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/317 2 issues received 2 new comments: - #293 Risk of issuer monitoring with jwt-vc-issuer metadata (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/293 - #248 Provide information where a credential can be obtained (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/248 [future-extension] * oauth-wg/oauth-cross-device-security (+0/-1/š¬2) 1 issues received 2 new comments: - #153 Shepherd Feedback: Normative References (2 by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/issues/153 1 issues closed: - Shepherd Feedback: Normative References https://github.com/oauth-wg/oauth-cross-device-security/issues/153 * oauth-wg/oauth-selective-disclosure-jwt (+0/-0/š¬2) 1 issues received 2 new comments: - #581 Issuer/Verifier unlinkability with an honest Verifier can be broken if certain JWS headers are used (2 by bc-pi) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/581 * oauth-wg/draft-ietf-oauth-status-list (+2/-0/š¬6) 2 issues created: - Feedback regarding expected format (by c2bo) https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/292 - Mailinglist Feedback from Dan Moore (by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/291 1 issues received 6 new comments: - #291 Mailinglist Feedback from Dan Moore (6 by c2bo, paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/291 * oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+0/-0/š¬2) 1 issues received 2 new comments: - #123 Similar proposal in AT Protocol: DPoP-bound private_key_jwt client authentication (2 by c2bo, matthieusieben) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/123 Pull requests ------------- * oauth-wg/oauth-sd-jwt-vc (+1/-0/š¬1) 1 pull requests submitted: - SD-JWT VC Issuer Signature Profiles/Mechanisms (by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/316 1 pull requests received 1 new comments: - #316 SD-JWT VC Issuer Signature Profiles/Mechanisms (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/316 * oauth-wg/oauth-cross-device-security (+2/-2/š¬0) 2 pull requests submitted: - Normative RFCs only (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/163 - Normative/Informative references (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/162 2 pull requests merged: - Normative RFCs only https://github.com/oauth-wg/oauth-cross-device-security/pull/163 - Informative/Normative split https://github.com/oauth-wg/oauth-cross-device-security/pull/161 * oauth-wg/draft-ietf-oauth-status-list (+1/-0/š¬0) 1 pull requests submitted: - add feedback from Dan Moore (by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/293 * oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+0/-0/š¬1) 1 pull requests received 1 new comments: - #112 initial draft for challenge endpoint (1 by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/112 Repositories tracked by this digest: ----------------------------------- * https://github.com/oauth-wg/oauth-browser-based-apps * https://github.com/oauth-wg/oauth-identity-chaining * https://github.com/oauth-wg/oauth-transaction-tokens * https://github.com/oauth-wg/oauth-sd-jwt-vc * https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata * https://github.com/oauth-wg/oauth-cross-device-security * https://github.com/oauth-wg/oauth-selective-disclosure-jwt * https://github.com/oauth-wg/oauth-v2-1 * https://github.com/oauth-wg/draft-ietf-oauth-status-list * https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth -- To have a summary like this sent to your list, see: https://github.com/ietf-github-services/activity-summary
- [OAUTH-WG] Weekly github digest (OAuth Activity S⦠Repository Activity Summary Bot