[OAUTH-WG] Weekly github digest (OAuth Activity Summary)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 11 February 2024 07:40 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E8BEC14F6B7 for <oauth@ietfa.amsl.com>; Sat, 10 Feb 2024 23:40:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.705
X-Spam-Level:
X-Spam-Status: No, score=-1.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="WY1TjiYf"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="hvtnx7nY"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BEkRRGN2g2Fl for <oauth@ietfa.amsl.com>; Sat, 10 Feb 2024 23:40:10 -0800 (PST)
Received: from wfout6-smtp.messagingengine.com (wfout6-smtp.messagingengine.com [64.147.123.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CA6AC14F6EC for <oauth@ietf.org>; Sat, 10 Feb 2024 23:39:42 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.48]) by mailfout.west.internal (Postfix) with ESMTP id 8FDB41C00078 for <oauth@ietf.org>; Sun, 11 Feb 2024 02:39:41 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute7.internal (MEProxy); Sun, 11 Feb 2024 02:39:41 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1707637181; x=1707723581; bh=s/vM8I3fMldsvbsxoPEreqAdNK6eHJN1vXp B/JB/HN8=; b=WY1TjiYfdWGR9w6opCBJGZD6ZEl+TQTRk0zjENYvcPJpjLLA3G3 83GQhviKoz9181Vq/HzLFirbASjSSBNcavhm6xSZqSFVkYxKaQ7rVZKUglT0Lv2T 0ixlpJdNjHhXOBkgaX07VCQylKgxrcUFWBu8OsbUZKx5KhkHdIwdFoQiYfHfI0/A Fpu4aVbCWXCRZEut8yqJmvVkYKUao+nnDg/2wsmYyn+qid53JbgZKu2hvnCRYnNt SkbEX+RUn7T7mJAEzwU64uRiBc3SDev0D4JSNPrTkKGU96VuvuSub1ddYiw/854R 6tmRh5mIMZ4zrEJRFAaY4ogzGFxZ/w+LZqg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1707637181; x= 1707723581; bh=s/vM8I3fMldsvbsxoPEreqAdNK6eHJN1vXpB/JB/HN8=; b=h vtnx7nYn+y2HyrVfjgixdlS9lG5GkWNI4IPizl5GVR0VxlwvOg7sI8F8mKkc4ICk V4mUxb36BQM/OCVBNLNjtaLYLvla4PVZ1G8iTAbHmPO4+cdk81NJwcyp5MY9BqP9 Wh9YE46tGl4farYEkPprbx8mb8K6h+oLgP7oRfyD1aVz3EISKdbC6ni0AG+U2QlD Cs/e9LZ+41n1UGXX2/SDIw184O80jaTJXwgC3NuEflID5FeSQtjxKyo9RLw4IX6n X54PIpXPzW+BWjWZm+k4/f1GCHZGtoWLkcuz+reFeuZnL5VrwMwuE0QSy8qJ/J0k XsC+V5yeyoLHVhQqEEALA==
X-ME-Sender: <xms:vHnIZaS9Mot8ER8wDfHge6bB8HmJVwHJR1U-Aygw2QuoPD_SmojopQ> <xme:vHnIZfwyIi5CHTNYbcubqdrpTZR7Bxx746R6KQ68z52VreFC81Y5akDO2pGQzRICc Vy9uT8PX2XnPoBeaw>
X-ME-Received: <xmr:vHnIZX11Dt7K30UdRpSAmBc7GAaa0dVwla3-RjIw2ceUcNd4VoXYjepQleqj87JsAOOCeeRBLZeGgf5ABYHewa7Kg22ECSYvdaTyeJbckW-sTvFj5ak0luNYRaqdC3JKNvw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledruddtgdduuddtucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpeefnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:vHnIZWDA1YOD5mYxZUiTAVkHvPTAFK73MQnCv9d4KC9CsHQmLgXfrg> <xmx:vHnIZTjtnAG62ZcRfL5dZxXf_UBqKydryHT_YHDJ6a2qBcqFGfM1Fg> <xmx:vHnIZSrtd20z3f2gGUAa1_4d-9ChVpMSKJM20d2KOedD_Bpvs95AFg> <xmx:vXnIZbZ3QEoYD0yTvr_KmPsjKek4SZlMgUGnkYlTodMM4bDHApf8Mq8yFqg>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 11 Feb 2024 02:39:40 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============5133102288977002444=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20240211073942.1CA6AC14F6EC@ietfa.amsl.com>
Date: Sat, 10 Feb 2024 23:39:42 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/F_J94TT412SVtWS1T8xFJrum0jc>
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Feb 2024 07:40:15 -0000
Events without label "editorial" Issues ------ * oauth-wg/oauth-browser-based-apps (+1/-0/š¬0) 1 issues created: - Question: benefits of encrypting cookie contents in BFF security (by nike61) https://github.com/oauth-wg/oauth-browser-based-apps/issues/31 * oauth-wg/oauth-identity-chaining (+1/-0/š¬0) 1 issues created: - Describe or give examples of what kinds of tokens a client would exchange (by aaronpk) https://github.com/oauth-wg/oauth-identity-chaining/issues/75 * oauth-wg/oauth-sd-jwt-vc (+3/-0/š¬16) 3 issues created: - SD-JWT VC Chaining / Delegation? (by c2bo) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/208 - Add sd_hash to payload of Key Biniding JWT example (by gmirc12) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/206 - defining how DID can be used as user's indetifier (by Sakurann) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 3 issues received 16 new comments: - #208 SD-JWT VC Chaining / Delegation? (1 by peppelinux) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/208 - #206 Add sd_hash to payload of Key Biniding JWT example (4 by awoie, bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/206 - #205 defining how DID can be used as user's indetifier (11 by Sakurann, awoie, bc-pi, paulbastian) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/205 * oauth-wg/oauth-cross-device-security (+1/-0/š¬0) 1 issues created: - More concrete normative requirements (by danielfett) https://github.com/oauth-wg/oauth-cross-device-security/issues/116 * oauth-wg/oauth-selective-disclosure-jwt (+0/-2/š¬2) 1 issues received 2 new comments: - #375 Make SD-JWT(0) and JWT the same (2 by Sakurann, bifurcation) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/375 2 issues closed: - Make SD-JWT(0) and JWT the same https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/375 - Review of verification algorithms https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/389 [has-PR] * oauth-wg/oauth-browser-based-apps (+1/-0/š¬0) 1 issues created: - Question: benefits of encrypting cookie contents in BFF security (by nike61) https://github.com/oauth-wg/oauth-browser-based-apps/issues/31 Pull requests ------------- * oauth-wg/oauth-identity-chaining (+2/-1/š¬1) 2 pull requests submitted: - Consistent spacing in examples (by kamronbatman) https://github.com/oauth-wg/oauth-identity-chaining/pull/77 - update draft name (by aaronpk) https://github.com/oauth-wg/oauth-identity-chaining/pull/76 1 pull requests received 1 new comments: - #76 update draft name (1 by bc-pi) https://github.com/oauth-wg/oauth-identity-chaining/pull/76 1 pull requests merged: - Consistent spacing in examples https://github.com/oauth-wg/oauth-identity-chaining/pull/77 * oauth-wg/oauth-transaction-tokens (+1/-0/š¬0) 1 pull requests submitted: - Addressing issue #44 - updating rules for the `sub` claim when requesting replacement transaction tokens (by gffletch) https://github.com/oauth-wg/oauth-transaction-tokens/pull/71 * oauth-wg/oauth-sd-jwt-vc (+1/-0/š¬0) 1 pull requests submitted: - Switch back to the main sd-jwt-python library branch (by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/207 * oauth-wg/oauth-selective-disclosure-jwt (+0/-1/š¬4) 2 pull requests received 4 new comments: - #394 Distinguish SD-JWT from SD-JWT+KB (2 by Sakurann, bifurcation) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/394 - #354 Rewrite unlinkability considerations (2 by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/354 1 pull requests merged: - Items from Jeffrey Yasskin's review https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/397 Repositories tracked by this digest: ----------------------------------- * https://github.com/oauth-wg/oauth-browser-based-apps * https://github.com/oauth-wg/oauth-identity-chaining * https://github.com/oauth-wg/oauth-transaction-tokens * https://github.com/oauth-wg/oauth-sd-jwt-vc * https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata * https://github.com/oauth-wg/oauth-cross-device-security * https://github.com/oauth-wg/oauth-selective-disclosure-jwt * https://github.com/oauth-wg/oauth-v2-1 * https://github.com/oauth-wg/oauth-browser-based-apps
- [OAUTH-WG] Weekly github digest (OAuth Activity Sā¦ Repository Activity Summary Bot