Re: [OAUTH-WG] OAuth Digest, Vol 181, Issue 56

Hethm Almamoon <almamoonhethm@gmail.com> Wed, 29 November 2023 20:24 UTC

Return-Path: <almamoonhethm@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35D1CC151545 for <oauth@ietfa.amsl.com>; Wed, 29 Nov 2023 12:24:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WyaQEjAL83Fm for <oauth@ietfa.amsl.com>; Wed, 29 Nov 2023 12:24:01 -0800 (PST)
Received: from mail-yb1-xb2d.google.com (mail-yb1-xb2d.google.com [IPv6:2607:f8b0:4864:20::b2d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D443DC151543 for <oauth@ietf.org>; Wed, 29 Nov 2023 12:24:01 -0800 (PST)
Received: by mail-yb1-xb2d.google.com with SMTP id 3f1490d57ef6-db527023652so103672276.3 for <oauth@ietf.org>; Wed, 29 Nov 2023 12:24:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1701289441; x=1701894241; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=5+MEwuYs4dN8R+4icR7sa75+qaW7Slmi7hDpiONLtu0=; b=E/mclZLFmKP+rqdsY8Ulv9wcIuKCkk2gmVgUEt6E0DlK8epUHNTR1TtDtQpvfFf7AU yh8f4AdPeJUpdUmfe0y8IgDk2qNpskliBIMQGTmFeghBh4lxYfjSHbgbfDUvGb1UoHTZ UR4ps3caxIqb6yD3oDIpuymJ8JEzkrufjm+itA4HNymnJ8yJ9uhhGrQr5YumV78FRFc6 jvAj8GBdrIYFD2/XiPWASF1K4dscAVSyob/q/KoOL9Ax0Il0ovg4fx1Y6wETu3RR22nc 6/6uCYPgMv9gAfUHLe+rIkPCI9kSZrEOmR7p89KHTAXAdjb9zOFmDijbrSAs9Cg/xNeO zbtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701289441; x=1701894241; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=5+MEwuYs4dN8R+4icR7sa75+qaW7Slmi7hDpiONLtu0=; b=AdgCaKz21Cf0EDVahVi3KwRyoPWE26wgL0Qs18ZLroQUSZOIDnfCiHU9+lNh00+gGI dqyNjIpCfPJgK0naIFZdmanEV0ZoESeOqHaZjnsYcuF0RWL7vUK3wfQygr0R6q9IvT1a tcGN6v+VGbQ9pO8HGF9KNqVLYxxOFOhUimHdLmS1LwGaN86fLA19tMf7d5VfDH1o20du K+nE2R3PmD0VJ8rN4XTj1t858T6DLT/v1mv3kc6a8DGHa/kxmYynXSY5qoEiqAB7m7o5 Dzw1ORglKrP2JQNhurWcqg7zdUwr3AaJlsQyVCSIS8TCpiquOBHsgHvRg3mv4E6gTLB7 n2ZQ==
X-Gm-Message-State: AOJu0Yy5iy0MtDvjoRM1EW0qaixAbcDoHcWDVzKdNvzuhfHGLmutZkZS AYrUFa0IAECB3Ve/mpM+/aLwJ0ZVxqwsLnF4c197EkQ4IgA/1g==
X-Google-Smtp-Source: AGHT+IHcyckw7keNN1k50Nsj9llLqCpFuP1FocTs069mozW7kJg9oLeb+fVUPtpQu4lTrO1SWe096PM1Ls60ldrJdHo=
X-Received: by 2002:a25:8c07:0:b0:d9a:ba4b:44ab with SMTP id k7-20020a258c07000000b00d9aba4b44abmr19581048ybl.61.1701289440813; Wed, 29 Nov 2023 12:24:00 -0800 (PST)
MIME-Version: 1.0
References: <mailman.95.1701288003.56795.oauth@ietf.org>
In-Reply-To: <mailman.95.1701288003.56795.oauth@ietf.org>
From: Hethm Almamoon <almamoonhethm@gmail.com>
Date: Wed, 29 Nov 2023 23:23:48 +0300
Message-ID: <CAGGEAEQg_CVZA=WBi8KonMzjV=VMsriKzai_WZu8bvFHD6sZ4g@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c7a4d9060b505027"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/s78PwUQaIykSGKyffGKvEWlCE8Y>
Subject: Re: [OAUTH-WG] OAuth Digest, Vol 181, Issue 56
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Nov 2023 20:24:06 -0000

ارجو منكم حذف وحضر yxz والعنواين الاخرى المشتبهة التي لاتنتمي الى معاملاتي

في الأربعاء، ٢٩ نوفمبر ٢٠٢٣, ١١:٠٢ م <oauth-request@ietf.org> كتب:

> Send OAuth mailing list submissions to
>         oauth@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://www.ietf.org/mailman/listinfo/oauth
> or, via email, send a message with subject or body 'help' to
>         oauth-request@ietf.org
>
> You can reach the person managing the list at
>         oauth-owner@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of OAuth digest..."
>
>
> Today's Topics:
>
>    1. Re: [Editorial Errata Reported] RFC6749 (7716)
>       (Rebecca VanRheenen)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Wed, 29 Nov 2023 11:14:44 -0800
> From: Rebecca VanRheenen <rvanrheenen@amsl.com>
> To: Roman Danyliw <rdd@cert.org>
> Cc: hello@alexwilson.io, dick.hardt@gmail.com, oauth@ietf.org, RFC
>         Editor <rfc-editor@rfc-editor.org>
> Subject: Re: [OAUTH-WG] [Editorial Errata Reported] RFC6749 (7716)
> Message-ID: <6AFED015-73A0-4E0A-9AB9-8869DD557B5C@amsl.com>
> Content-Type: text/plain;       charset=utf-8
>
> Hi Roman,
>
> We are unable to verify this erratum that the submitter marked as
> editorial. Please note that we have changed the ?Type? of the following
> errata report to ?Technical?.  As Stream Approver, please review and set
> the Status and Type accordingly (see the definitions at
> https://www.rfc-editor.org/errata-definitions/).
>
> Note that this errata report has two parts. One part states that "
> example.com should be client.example.com?. This is a duplicate of EID
> 4819, which is still in Reported state (see
> https://www.rfc-editor.org/errata/eid4819). Keep this in mind during your
> review.
>
> You may review the report at:
> https://www.rfc-editor.org/errata/eid7716
>
> Please see https://www.rfc-editor.org/how-to-verify/ for further
> information on how to verify errata reports.
>
> Further information on errata can be found at:
> https://www.rfc-editor.org/errata.php
>
> Thank you.
>
> RFC Editor/rv
>
>
>
> > On Nov 29, 2023, at 8:56 AM, RFC Errata System <
> rfc-editor@rfc-editor.org> wrote:
> >
> > The following errata report has been submitted for RFC6749,
> > "The OAuth 2.0 Authorization Framework".
> >
> > --------------------------------------
> > You may review the report below and at:
> > https://www.rfc-editor.org/errata/eid7716
> >
> > --------------------------------------
> > Type: Editorial
> > Reported by: Alex Wilson <hello@alexwilson.io>
> >
> > Section: 4.2.2
> >
> > Original Text
> > -------------
> >   For example, the authorization server redirects the user-agent by
> >   sending the following HTTP response (with extra line breaks for
> >   display purposes only):
> >
> >     HTTP/1.1 302 Found
> >     Location: http://example.com/cb#access_token=2YotnFZFEjr1zCsicMWpAA
> >               &state=xyz&token_type=example&expires_in=3600
> >
> >
> > Corrected Text
> > --------------
> >   For example, the authorization server redirects the user-agent by
> >   sending the following HTTP response (with extra line breaks for
> >   display purposes only):
> >
> >     HTTP/1.1 302 Found
> >     Location:
> http://client.example.com/cb?access_token=2YotnFZFEjr1zCsicMWpAA
> >               &state=xyz&token_type=example&expires_in=3600
> >
> >
> > Notes
> > -----
> > - Host example.com should be client.example.com to be consistent with
> other examples.
> > - A hash is used for the query parameters when a question mark should
> have been used.
> >
> > Instructions:
> > -------------
> > This erratum is currently posted as "Reported". (If it is spam, it
> > will be removed shortly by the RFC Production Center.) Please
> > use "Reply All" to discuss whether it should be verified or
> > rejected. When a decision is reached, the verifying party
> > will log in to change the status and edit the report, if necessary.
> >
> > --------------------------------------
> > RFC6749 (draft-ietf-oauth-v2-31)
> > --------------------------------------
> > Title               : The OAuth 2.0 Authorization Framework
> > Publication Date    : October 2012
> > Author(s)           : D. Hardt, Ed.
> > Category            : PROPOSED STANDARD
> > Source              : Web Authorization Protocol
> > Area                : Security
> > Stream              : IETF
> > Verifying Party     : IESG
> >
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> ------------------------------
>
> End of OAuth Digest, Vol 181, Issue 56
> **************************************
>