[OAUTH-WG] Weekly github digest (OAuth Activity Summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 11 February 2024 07:40 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E8BEC14F6B7 for <oauth@ietfa.amsl.com>; Sat, 10 Feb 2024 23:40:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.705
X-Spam-Level:
X-Spam-Status: No, score=-1.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="WY1TjiYf"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="hvtnx7nY"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BEkRRGN2g2Fl for <oauth@ietfa.amsl.com>; Sat, 10 Feb 2024 23:40:10 -0800 (PST)
Received: from wfout6-smtp.messagingengine.com (wfout6-smtp.messagingengine.com [64.147.123.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CA6AC14F6EC for <oauth@ietf.org>; Sat, 10 Feb 2024 23:39:42 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.48]) by mailfout.west.internal (Postfix) with ESMTP id 8FDB41C00078 for <oauth@ietf.org>; Sun, 11 Feb 2024 02:39:41 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute7.internal (MEProxy); Sun, 11 Feb 2024 02:39:41 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1707637181; x=1707723581; bh=s/vM8I3fMldsvbsxoPEreqAdNK6eHJN1vXp B/JB/HN8=; b=WY1TjiYfdWGR9w6opCBJGZD6ZEl+TQTRk0zjENYvcPJpjLLA3G3 83GQhviKoz9181Vq/HzLFirbASjSSBNcavhm6xSZqSFVkYxKaQ7rVZKUglT0Lv2T 0ixlpJdNjHhXOBkgaX07VCQylKgxrcUFWBu8OsbUZKx5KhkHdIwdFoQiYfHfI0/A Fpu4aVbCWXCRZEut8yqJmvVkYKUao+nnDg/2wsmYyn+qid53JbgZKu2hvnCRYnNt SkbEX+RUn7T7mJAEzwU64uRiBc3SDev0D4JSNPrTkKGU96VuvuSub1ddYiw/854R 6tmRh5mIMZ4zrEJRFAaY4ogzGFxZ/w+LZqg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1707637181; x= 1707723581; bh=s/vM8I3fMldsvbsxoPEreqAdNK6eHJN1vXpB/JB/HN8=; b=h vtnx7nYn+y2HyrVfjgixdlS9lG5GkWNI4IPizl5GVR0VxlwvOg7sI8F8mKkc4ICk V4mUxb36BQM/OCVBNLNjtaLYLvla4PVZ1G8iTAbHmPO4+cdk81NJwcyp5MY9BqP9 Wh9YE46tGl4farYEkPprbx8mb8K6h+oLgP7oRfyD1aVz3EISKdbC6ni0AG+U2QlD Cs/e9LZ+41n1UGXX2/SDIw184O80jaTJXwgC3NuEflID5FeSQtjxKyo9RLw4IX6n X54PIpXPzW+BWjWZm+k4/f1GCHZGtoWLkcuz+reFeuZnL5VrwMwuE0QSy8qJ/J0k XsC+V5yeyoLHVhQqEEALA==
X-ME-Sender: <xms:vHnIZaS9Mot8ER8wDfHge6bB8HmJVwHJR1U-Aygw2QuoPD_SmojopQ> <xme:vHnIZfwyIi5CHTNYbcubqdrpTZR7Bxx746R6KQ68z52VreFC81Y5akDO2pGQzRICc Vy9uT8PX2XnPoBeaw>
X-ME-Received: <xmr:vHnIZX11Dt7K30UdRpSAmBc7GAaa0dVwla3-RjIw2ceUcNd4VoXYjepQleqj87JsAOOCeeRBLZeGgf5ABYHewa7Kg22ECSYvdaTyeJbckW-sTvFj5ak0luNYRaqdC3JKNvw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledruddtgdduuddtucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpeefnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:vHnIZWDA1YOD5mYxZUiTAVkHvPTAFK73MQnCv9d4KC9CsHQmLgXfrg> <xmx:vHnIZTjtnAG62ZcRfL5dZxXf_UBqKydryHT_YHDJ6a2qBcqFGfM1Fg> <xmx:vHnIZSrtd20z3f2gGUAa1_4d-9ChVpMSKJM20d2KOedD_Bpvs95AFg> <xmx:vXnIZbZ3QEoYD0yTvr_KmPsjKek4SZlMgUGnkYlTodMM4bDHApf8Mq8yFqg>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 11 Feb 2024 02:39:40 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============5133102288977002444=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20240211073942.1CA6AC14F6EC@ietfa.amsl.com>
Date: Sat, 10 Feb 2024 23:39:42 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/F_J94TT412SVtWS1T8xFJrum0jc>
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Feb 2024 07:40:15 -0000



Events without label "editorial"

Issues
------
* oauth-wg/oauth-browser-based-apps (+1/-0/šŸ’¬0)
  1 issues created:
  - Question: benefits of encrypting cookie contents in BFF security (by nike61)
    https://github.com/oauth-wg/oauth-browser-based-apps/issues/31 

* oauth-wg/oauth-identity-chaining (+1/-0/šŸ’¬0)
  1 issues created:
  - Describe or give examples of what kinds of tokens a client would exchange (by aaronpk)
    https://github.com/oauth-wg/oauth-identity-chaining/issues/75 

* oauth-wg/oauth-sd-jwt-vc (+3/-0/šŸ’¬16)
  3 issues created:
  - SD-JWT VC Chaining / Delegation? (by c2bo)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/208 
  - Add sd_hash to payload of Key Biniding JWT example (by gmirc12)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/206 
  - defining how DID can be used as user's indetifier (by Sakurann)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 

  3 issues received 16 new comments:
  - #208 SD-JWT VC Chaining / Delegation? (1 by peppelinux)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/208 
  - #206 Add sd_hash to payload of Key Biniding JWT example (4 by awoie, bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/206 
  - #205 defining how DID can be used as user's indetifier (11 by Sakurann, awoie, bc-pi, paulbastian)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 

* oauth-wg/oauth-cross-device-security (+1/-0/šŸ’¬0)
  1 issues created:
  - More concrete normative requirements (by danielfett)
    https://github.com/oauth-wg/oauth-cross-device-security/issues/116 

* oauth-wg/oauth-selective-disclosure-jwt (+0/-2/šŸ’¬2)
  1 issues received 2 new comments:
  - #375 Make SD-JWT(0) and JWT the same (2 by Sakurann, bifurcation)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/375 

  2 issues closed:
  - Make SD-JWT(0) and JWT the same https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/375 
  - Review of verification algorithms https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/389 [has-PR] 

* oauth-wg/oauth-browser-based-apps (+1/-0/šŸ’¬0)
  1 issues created:
  - Question: benefits of encrypting cookie contents in BFF security (by nike61)
    https://github.com/oauth-wg/oauth-browser-based-apps/issues/31 



Pull requests
-------------
* oauth-wg/oauth-identity-chaining (+2/-1/šŸ’¬1)
  2 pull requests submitted:
  - Consistent spacing in examples (by kamronbatman)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/77 
  - update draft name (by aaronpk)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/76 

  1 pull requests received 1 new comments:
  - #76 update draft name (1 by bc-pi)
    https://github.com/oauth-wg/oauth-identity-chaining/pull/76 

  1 pull requests merged:
  - Consistent spacing in examples
    https://github.com/oauth-wg/oauth-identity-chaining/pull/77 

* oauth-wg/oauth-transaction-tokens (+1/-0/šŸ’¬0)
  1 pull requests submitted:
  - Addressing issue #44 - updating rules for the `sub` claim when requesting replacement transaction tokens (by gffletch)
    https://github.com/oauth-wg/oauth-transaction-tokens/pull/71 

* oauth-wg/oauth-sd-jwt-vc (+1/-0/šŸ’¬0)
  1 pull requests submitted:
  - Switch back to the main sd-jwt-python library branch (by bc-pi)
    https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/207 

* oauth-wg/oauth-selective-disclosure-jwt (+0/-1/šŸ’¬4)
  2 pull requests received 4 new comments:
  - #394 Distinguish SD-JWT from SD-JWT+KB (2 by Sakurann, bifurcation)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/394 
  - #354 Rewrite unlinkability considerations (2 by Denisthemalice)
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/354 

  1 pull requests merged:
  - Items from Jeffrey Yasskin's review
    https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/397 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1
* https://github.com/oauth-wg/oauth-browser-based-apps