Re: [OAUTH-WG] OAuth Digest, Vol 181, Issue 56

Hethm Almamoon <almamoonhethm@gmail.com> Sat, 02 December 2023 21:16 UTC

Return-Path: <almamoonhethm@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 054D5C14F5FC for <oauth@ietfa.amsl.com>; Sat, 2 Dec 2023 13:16:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tcs2XwvDJ43v for <oauth@ietfa.amsl.com>; Sat, 2 Dec 2023 13:16:10 -0800 (PST)
Received: from mail-yw1-x1134.google.com (mail-yw1-x1134.google.com [IPv6:2607:f8b0:4864:20::1134]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA0A2C14F5F8 for <oauth@ietf.org>; Sat, 2 Dec 2023 13:16:10 -0800 (PST)
Received: by mail-yw1-x1134.google.com with SMTP id 00721157ae682-5b383b4184fso36297457b3.1 for <oauth@ietf.org>; Sat, 02 Dec 2023 13:16:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1701551769; x=1702156569; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=2F47Vn/GA7c1roOJMVvf/hxJXzmfe1ppw5285NQw8zQ=; b=NtE+jQko669o5aYBzF7wEjX/wpN2jq/fMIMgontkL9uKf/gaLnKuNQgpycT/awxD23 gXXRVTGEbwIFlBiL3lKa9UKpAdHIzB/gQ4uYa5fweXcP60JiOPGi4UPh3RIv7tOUmpWI ePwhW96FqZcJe4T1YlDuvR3aK2c3wPMFvIR8Dgk2NE5AaT9R8WI+d9iYa2Y+9ZVfCv2O SYbtDNqg18fywgo7aOJXie/wYyGmTUfHbf7tF9H+ht6YN0VcZbaGFSQJI4T4ai5Xe4XC IBP9bNLY9cQQc2Sh5FFy0M/+vM5I77dk42yigkXwXR1ZtsyEjvrWvNhPKoM5RumKaU55 6glw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701551769; x=1702156569; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=2F47Vn/GA7c1roOJMVvf/hxJXzmfe1ppw5285NQw8zQ=; b=DSJabbfOce/mktLwXyfykBgIAyZrFseD5/5pgpcbLjwLaYRM7OsUE/mpgE+zlBgxRO /fhR9DuHc2BxuVjjrZ8Ztjp59OP6QMuSyZsV1RqKW1ZAvXDI8cwMrDW97CQvfUptqV9n PAn9MSDQ7ZaMAfOBvLskno9YdbmYCCrbznkcjccMk7oezFb2FwfsI7nuiKny9PG+GQW8 a1pLlN7UpTdmqgU7GjxfIsQVZHTmGLKk/x0zvpaY1ysboVb16jikETXzQUu63vOL1cOc mSFA3i5B92GVPwLn+y6SZjQTcAvKvbBWNlUiBPt/jR/X9vcF5ghzPdDWa0Mq/6YBSVjW kQDg==
X-Gm-Message-State: AOJu0YznUs/NcWgQh7XCZggBOAtdH1+pj6djky+AUHolXJc8EwSQaSQe zCNdD5TyHX73gRsOwY74EQHVW6DSR+fEYEyFBXf4BlN5/nk=
X-Google-Smtp-Source: AGHT+IHe/bC6QdRKgH1qkJoX0mZiq+SEQIC9QXhc0jNbmCJtxmLxJjb0ZZhwtZH1QJgYJTY0mjJ5gwjqmANPckMcAAo=
X-Received: by 2002:a05:690c:811:b0:5d7:1940:7d77 with SMTP id bx17-20020a05690c081100b005d719407d77mr1365598ywb.78.1701551769524; Sat, 02 Dec 2023 13:16:09 -0800 (PST)
MIME-Version: 1.0
References: <mailman.95.1701288003.56795.oauth@ietf.org> <CAGGEAEQg_CVZA=WBi8KonMzjV=VMsriKzai_WZu8bvFHD6sZ4g@mail.gmail.com>
In-Reply-To: <CAGGEAEQg_CVZA=WBi8KonMzjV=VMsriKzai_WZu8bvFHD6sZ4g@mail.gmail.com>
From: Hethm Almamoon <almamoonhethm@gmail.com>
Date: Sun, 03 Dec 2023 00:15:58 +0300
Message-ID: <CAGGEAESz1YBw_voiZnkXZ3LdKQX5Q2psA4D3p+jdoxx9cHouaw@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000ca1e27060b8d644e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/IX-ZoLHHaMDrLIgPZRNpUNzDAuc>
Subject: Re: [OAUTH-WG] OAuth Digest, Vol 181, Issue 56
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Dec 2023 21:16:15 -0000

مرحبا انا اسمي هيثم اعمل كمطور للشبكة البلوكشين الرئيسية هل تقبل طلبي للعمل
في شبكة الايثريوم ونكون علا اتفاق

في الأربعاء، ٢٩ نوفمبر ٢٠٢٣, ١١:٢٣ م Hethm Almamoon <almamoonhethm@gmail.com>
كتب:

> ارجو منكم حذف وحضر yxz والعنواين الاخرى المشتبهة التي لاتنتمي الى معاملاتي
>
> في الأربعاء، ٢٩ نوفمبر ٢٠٢٣, ١١:٠٢ م <oauth-request@ietf.org> كتب:
>
>> Send OAuth mailing list submissions to
>>         oauth@ietf.org
>>
>> To subscribe or unsubscribe via the World Wide Web, visit
>>         https://www.ietf.org/mailman/listinfo/oauth
>> or, via email, send a message with subject or body 'help' to
>>         oauth-request@ietf.org
>>
>> You can reach the person managing the list at
>>         oauth-owner@ietf.org
>>
>> When replying, please edit your Subject line so it is more specific
>> than "Re: Contents of OAuth digest..."
>>
>>
>> Today's Topics:
>>
>>    1. Re: [Editorial Errata Reported] RFC6749 (7716)
>>       (Rebecca VanRheenen)
>>
>>
>> ----------------------------------------------------------------------
>>
>> Message: 1
>> Date: Wed, 29 Nov 2023 11:14:44 -0800
>> From: Rebecca VanRheenen <rvanrheenen@amsl.com>
>> To: Roman Danyliw <rdd@cert.org>
>> Cc: hello@alexwilson.io, dick.hardt@gmail.com, oauth@ietf.org, RFC
>>         Editor <rfc-editor@rfc-editor.org>
>> Subject: Re: [OAUTH-WG] [Editorial Errata Reported] RFC6749 (7716)
>> Message-ID: <6AFED015-73A0-4E0A-9AB9-8869DD557B5C@amsl.com>
>> Content-Type: text/plain;       charset=utf-8
>>
>> Hi Roman,
>>
>> We are unable to verify this erratum that the submitter marked as
>> editorial. Please note that we have changed the ?Type? of the following
>> errata report to ?Technical?.  As Stream Approver, please review and set
>> the Status and Type accordingly (see the definitions at
>> https://www.rfc-editor.org/errata-definitions/).
>>
>> Note that this errata report has two parts. One part states that "
>> example.com should be client.example.com?. This is a duplicate of EID
>> 4819, which is still in Reported state (see
>> https://www.rfc-editor.org/errata/eid4819). Keep this in mind during
>> your review.
>>
>> You may review the report at:
>> https://www.rfc-editor.org/errata/eid7716
>>
>> Please see https://www.rfc-editor.org/how-to-verify/ for further
>> information on how to verify errata reports.
>>
>> Further information on errata can be found at:
>> https://www.rfc-editor.org/errata.php
>>
>> Thank you.
>>
>> RFC Editor/rv
>>
>>
>>
>> > On Nov 29, 2023, at 8:56 AM, RFC Errata System <
>> rfc-editor@rfc-editor.org> wrote:
>> >
>> > The following errata report has been submitted for RFC6749,
>> > "The OAuth 2.0 Authorization Framework".
>> >
>> > --------------------------------------
>> > You may review the report below and at:
>> > https://www.rfc-editor.org/errata/eid7716
>> >
>> > --------------------------------------
>> > Type: Editorial
>> > Reported by: Alex Wilson <hello@alexwilson.io>
>> >
>> > Section: 4.2.2
>> >
>> > Original Text
>> > -------------
>> >   For example, the authorization server redirects the user-agent by
>> >   sending the following HTTP response (with extra line breaks for
>> >   display purposes only):
>> >
>> >     HTTP/1.1 302 Found
>> >     Location: http://example.com/cb#access_token=2YotnFZFEjr1zCsicMWpAA
>> >               &state=xyz&token_type=example&expires_in=3600
>> >
>> >
>> > Corrected Text
>> > --------------
>> >   For example, the authorization server redirects the user-agent by
>> >   sending the following HTTP response (with extra line breaks for
>> >   display purposes only):
>> >
>> >     HTTP/1.1 302 Found
>> >     Location:
>> http://client.example.com/cb?access_token=2YotnFZFEjr1zCsicMWpAA
>> >               &state=xyz&token_type=example&expires_in=3600
>> >
>> >
>> > Notes
>> > -----
>> > - Host example.com should be client.example.com to be consistent with
>> other examples.
>> > - A hash is used for the query parameters when a question mark should
>> have been used.
>> >
>> > Instructions:
>> > -------------
>> > This erratum is currently posted as "Reported". (If it is spam, it
>> > will be removed shortly by the RFC Production Center.) Please
>> > use "Reply All" to discuss whether it should be verified or
>> > rejected. When a decision is reached, the verifying party
>> > will log in to change the status and edit the report, if necessary.
>> >
>> > --------------------------------------
>> > RFC6749 (draft-ietf-oauth-v2-31)
>> > --------------------------------------
>> > Title               : The OAuth 2.0 Authorization Framework
>> > Publication Date    : October 2012
>> > Author(s)           : D. Hardt, Ed.
>> > Category            : PROPOSED STANDARD
>> > Source              : Web Authorization Protocol
>> > Area                : Security
>> > Stream              : IETF
>> > Verifying Party     : IESG
>> >
>>
>>
>>
>> ------------------------------
>>
>> Subject: Digest Footer
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> ------------------------------
>>
>> End of OAuth Digest, Vol 181, Issue 56
>> **************************************
>>
>