[OAUTH-WG] Weekly github digest (OAuth Activity Summary)
Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 10 November 2024 07:56 UTC
Return-Path: <do_not_reply@mnot.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38FB1C14F699 for <oauth@ietfa.amsl.com>; Sat, 9 Nov 2024 23:56:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.706
X-Spam-Level:
X-Spam-Status: No, score=-1.706 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="eFcRx0N4"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="IMuyoGxq"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uyrqh8Be16m3 for <oauth@ietfa.amsl.com>; Sat, 9 Nov 2024 23:56:05 -0800 (PST)
Received: from fout-b4-smtp.messagingengine.com (fout-b4-smtp.messagingengine.com [202.12.124.147]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A0FE2C14F6BA for <oauth@ietf.org>; Sat, 9 Nov 2024 23:56:05 -0800 (PST)
Received: from phl-compute-04.internal (phl-compute-04.phl.internal [10.202.2.44]) by mailfout.stl.internal (Postfix) with ESMTP id 8AF7F114016E for <oauth@ietf.org>; Sun, 10 Nov 2024 02:39:45 -0500 (EST)
Received: from phl-mailfrontend-02 ([10.202.2.163]) by phl-compute-04.internal (MEProxy); Sun, 10 Nov 2024 02:39:45 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:subject:subject:to:to; s=fm1; t= 1731224385; x=1731310785; bh=lMIgz6tRi3Sn3xJhp29hcPBi2ONjbz8j7Cr k3DNhag4=; b=eFcRx0N4XRh3Fv86RG4+vZbSgQ23ziuGcmL6+saqiLh23MlbcVM 57cF21iMlffPqL8/jJkV/frbA+IJgJTUN2Q//O2RbblZThB0tC+xODIo1S7ExNMa VoSuA0nyYIWoT9JfrL73fmCDbHvKbLCy9J1MNXwVY9LDSwLC44Yq/1rhNVzEifp4 gOXWAzQ2KwYhk7LuVR8Mzq0XjWiuPJfmjja4rzOqQnBJb5pMISyPmKbEuE/f6dYY u3iF64MQdPJOt4M0+BN7/U0DhxlFnVqhqsbUsQcUkhqSRoHJZEVvlJE/jWBfHXpD DCgQe1WCbjSsYzJyDujZ3q+MTOiiN5ZjzQQ==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:subject:subject:to:to:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; t=1731224385; x=1731310785; bh=l MIgz6tRi3Sn3xJhp29hcPBi2ONjbz8j7Crk3DNhag4=; b=IMuyoGxqseu0qeYTW ND6Nyuw9Aodm0BVIl8+fbiHxMizyO7rXGR1W+wRpHeIJJxHex/1Fji3hemMoGRJq nI0u18t7r9+MplkitRrHhe5ZgyoSduM+JsQhCGncVKwdAeAYoLh8JlJv5S66U+ZH ZnG5Vtj9/18Wmp1o1e/EV+Sp068Digv8HIeVOm7wWqNjki5R/IuohF8j5aVi9/J2 8Q3mt438XnD34L/KtP9QICfvd2f24ADh2tVgmrHooM35MrIs4eOGJvXEuzmr3w8D lVf66Cpjo4+vbKmrukzJs0sYKy3eWDcmMeOstmH9q8E34iNB+gnNsZ6ysJ/kLcOT 5I0KA==
X-ME-Sender: <xms:QWMwZ0JWgJyY6rUpnZcgKIZHYq5OYfsXEPS4nay-k96JrmJ4uBFEQQ> <xme:QWMwZ0Ii8vjNuxeW1SKAoSm1lWrpLtgjaPHqYdBK7ULLILjrhFlCf_j2B8sCpMrNC GzBAESCyaUqxg8gog>
X-ME-Received: <xmr:QWMwZ0s6GFLpNX2gEWO4yNNYOZgVEWywzczHvquTKG63zHkO0xgeDLCcoqYiDC3xElGPekuAMxNIvg_BkTp0pLFIoyXxqZwyxUJ7rr_rcJOMfCGIMNQO6zmkRVzrvH7CcvJbp4s>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeefuddrtdelgddutdelucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdggtfgfnhhsuhgsshgtrhhisggvpdfu rfetoffkrfgpnffqhgenuceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfih gvlhguucdlgeelmdenucfjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeft vghpohhsihhtohhrhicutegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopg hnohhtpghrvghplhihsehmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvddu teejvdefkeehieevuefgfefhteetveegffekffefteffvdelheduieetnecuffhomhgrih hnpehgihhthhhusgdrtghomhenucevlhhushhtvghrufhiiigvpedunecurfgrrhgrmhep mhgrihhlfhhrohhmpeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtpdhnsggprh gtphhtthhopedupdhmohguvgepshhmthhpohhuthdprhgtphhtthhopehorghuthhhsehi vghtfhdrohhrgh
X-ME-Proxy: <xmx:QWMwZxagt8R14d6SBUoaPFpkCVjcJz6wDnTZXaZWk3TOpZvRH1Wpog> <xmx:QWMwZ7axjqD3k6XuWt5IOvMFhU87jxC_DTi-aEqCb4l5ZRgMtIiHTw> <xmx:QWMwZ9DKGbkZVj9lm8uvDiEmzxEBvM1UghLodqpCIiYT6dRF85v_Ug> <xmx:QWMwZxbMj8Y7-SyBhRDseqr2ERY7I6bT1xn-y8yZc1rjqoa9RlHBvg> <xmx:QWMwZ6n_3cjGUyaG0aBMM5L-yhQyED0z6rll6kBikuiuHPT17QB3TdW1>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <oauth@ietf.org>; Sun, 10 Nov 2024 02:39:45 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============7147976689038624853=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: oauth@ietf.org
Message-Id: <20241110075605.A0FE2C14F6BA@ietfa.amsl.com>
Date: Sat, 09 Nov 2024 23:56:05 -0800
Message-ID-Hash: UTBQPIHCB2TKUJ7EDZHZJ3XJ4CAMCEB5
X-Message-ID-Hash: UTBQPIHCB2TKUJ7EDZHZJ3XJ4CAMCEB5
X-MailFrom: do_not_reply@mnot.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Weekly github digest (OAuth Activity Summary)
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/PgBAApA-OzmydzSn5aYQySxEJ68>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
Events without label "editorial" Issues ------ * oauth-wg/oauth-identity-chaining (+4/-0/š¬0) 4 issues created: - Remove need for additional metadata (by PieterKas) https://github.com/oauth-wg/oauth-identity-chaining/issues/101 - Clarify client terminology (by PieterKas) https://github.com/oauth-wg/oauth-identity-chaining/issues/100 - Using different keys for sender constrained tokens (by PieterKas) https://github.com/oauth-wg/oauth-identity-chaining/issues/99 - Security Considerations on Client authentication (by PieterKas) https://github.com/oauth-wg/oauth-identity-chaining/issues/98 * oauth-wg/oauth-sd-jwt-vc (+1/-0/š¬0) 1 issues created: - Document reasons for not using existing JSON query languages (by aaronpk) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/267 * oauth-wg/oauth-selective-disclosure-jwt (+10/-0/š¬3) 10 issues created: - Hash Function Claim value case-sensitivity (by spheroid) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/523 - The last paragraph of section 10.5 (Issuer Identifier) can be removed (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/522 - A new section about "Issuer anonymity" should be added (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/521 - Section 10.3 (Confidentiality during Transport) should also mention integrity (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/520 - Since claims always contain privacy-sensitive data section 10.2 would need to be reworded (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/519 - Holders SHOULD NOT be required to store SD-JWTs "only in encrypted form" (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/518 - Section 10.2 should be made more general to consider both the storage of signed and un-signed data (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/517 - A new section about "End-User intrackability" should be added (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/516 - The term "unlinkability" is overloaded. For more clarity, the wording "End-user intrackability" should be used in addition (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/515 - A section should be added to consider the case of a presentation of claims to Verifier that have been issued by different Issuers (by Denisthemalice) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/514 2 issues received 3 new comments: - #516 A new section about "End-User intrackability" should be added (1 by paulbastian) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/516 - #489 A (KB-JWT) does not demonstrate a "proof of possession" of private key (2 by Denisthemalice, paulbastian) https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/489 * oauth-wg/oauth-v2-1 (+0/-0/š¬1) 1 issues received 1 new comments: - #183 Clarify `aud` values that should be accepted in `private_key_jwt` at the token (and other) endpoints (1 by bc-pi) https://github.com/oauth-wg/oauth-v2-1/issues/183 Pull requests ------------- * oauth-wg/oauth-identity-chaining (+1/-0/š¬2) 1 pull requests submitted: - Confirmation data transfer (by arndt-s) https://github.com/oauth-wg/oauth-identity-chaining/pull/102 2 pull requests received 2 new comments: - #102 Confirmation data transfer (1 by arndt-s) https://github.com/oauth-wg/oauth-identity-chaining/pull/102 - #95 Add sender constrained tokens (redo) (1 by arndt-s) https://github.com/oauth-wg/oauth-identity-chaining/pull/95 * oauth-wg/oauth-transaction-tokens (+0/-1/š¬0) 1 pull requests merged: - Minor changes https://github.com/oauth-wg/oauth-transaction-tokens/pull/148 * oauth-wg/draft-ietf-oauth-status-list (+1/-0/š¬0) 1 pull requests submitted: - fixes from IETF review (by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/190 Repositories tracked by this digest: ----------------------------------- * https://github.com/oauth-wg/oauth-browser-based-apps * https://github.com/oauth-wg/oauth-identity-chaining * https://github.com/oauth-wg/oauth-transaction-tokens * https://github.com/oauth-wg/oauth-sd-jwt-vc * https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata * https://github.com/oauth-wg/oauth-cross-device-security * https://github.com/oauth-wg/oauth-selective-disclosure-jwt * https://github.com/oauth-wg/oauth-v2-1 * https://github.com/oauth-wg/draft-ietf-oauth-status-list * https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth
- [OAUTH-WG] Weekly github digest (OAuth Activity Sā¦ Repository Activity Summary Bot