[Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 10 April 2022 22:50 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEE883A15C5 for <privacy-pass@ietfa.amsl.com>; Sun, 10 Apr 2022 15:50:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.709
X-Spam-Level:
X-Spam-Status: No, score=-6.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b=Catje1tP; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b=Rm0JG41y
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQWtyE3HJuGo for <privacy-pass@ietfa.amsl.com>; Sun, 10 Apr 2022 15:50:47 -0700 (PDT)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C78E3A15C4 for <privacy-pass@ietf.org>; Sun, 10 Apr 2022 15:50:47 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id CB91A5C00F0 for <privacy-pass@ietf.org>; Sun, 10 Apr 2022 18:13:23 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Sun, 10 Apr 2022 18:13:23 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:date:from:from:in-reply-to:mime-version:reply-to :sender:subject:subject:to:to; s=fm2; bh=o56E3OcgH9UmlbN3uzfMsV/ 4BHSV6EfVjCmnnvhk51g=; b=Catje1tP9/oaufZfqErp4n+A03E1qsFRDPcEl3F FuFbeB+YsOJL4kQ6x7c6VugfnbqmmiDxYwYgkuB4V2I38TLm+uHqeZten1QZusWS NZqfGz+2COABU5QxIeQRO4MPureu7ahXrfQLsUG58BKkYy+172x2S8Zn/B7C4tl+ RPO3LAI2TPs4x2BQCe6D9AGgFpt3+ZlCalsWJ6smkk6ktZFhiUPjsiP9r0yhvpjK 1qh3d8P5HXOuBfqBxC2y3ZTMjklvu0h97AfHnBwH7uWfYk4rq5nC4KjIx6ll8SiJ lhh8PFPp1TIEH0uTuD3/Si6FvAljrBwI0oA/9o3C0b1ZGdg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:from :in-reply-to:mime-version:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=o56E3OcgH9UmlbN3uzfMsV/4BHSV6EfVjCmnnvhk51g=; b=Rm0JG41y dcHywPrnC53yjdXVwbpaNeGNUTfUPkSQiIM1tYMNLlzPx4FjINnNnPgKtshNF5mG 7n6NLcm7IJDQOziqJMpU07py18iApduAvgxaRU4MlDvsmYew7zAlDqp0/i79NLrl O5PyXVoJfxZadtrxN9i4oyilEYOb3xCCnSbVW07IQtpvs5Bq9Jr5i+4ewhXg/eT3 z88lcOZlZ14+FoI4XbtGfiRg9Li5JUc/lrFyTnVhYXcJt0JdfzOi0rLrUs5YkETn uksBTXE/d+jfnz3vVIsOfP9bdFhxAnl6aMV0jvvlHiX6kXXs1znRZtZXIfuKuBog CneH2KL40D+EXQ==
X-ME-Sender: <xms:g1ZTYjx9-tbeTscmn_MgGOwRb_a25qiB1MZ2Au-wP2rSgf0XBBFUEQ> <xme:g1ZTYrRWcVhvFzfubjU70S5MXN2BC1mxJfXcNlKvCcDSFm0EuYdQsraxOd_T1-k4M 3AJd6KrPitmgKb9oQ>
X-ME-Received: <xmr:g1ZTYtX6d3n3ANvmdNFcX4KG_E4s_vJzeBdYWlcCnik45oozWqmZnB-9Gwueyma03kTLkv9QhaJKbMJl5lyHgruC9tLUjK3pH_1LDRLbDUrpbu9oEqYH0Hjef3SPzRMxamP3>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudekhedgtdefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucfpohcuuggrthgvuchfihgvlhguucdlgeelmdenuc fjughrpegtggfhvffusegrtddtredttdejnecuhfhrohhmpeftvghpohhsihhtohhrhicu tegtthhivhhithihucfuuhhmmhgrrhihuceuohhtuceoughopghnohhtpghrvghplhihse hmnhhothdrnhgvtheqnecuggftrfgrthhtvghrnhepkeefvdduteejvdefkeehieevuefg fefhteetveegffekffefteffvdelheduieetnecuffhomhgrihhnpehgihhthhhusgdrtg homhenucevlhhushhtvghrufhiiigvpedvnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu ohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:g1ZTYtiWsLrAvhFtqASvhBzpgd9H4n9FpAc4CU_iRF4I0wi_ZfTgvw> <xmx:g1ZTYlAOGsDKJTL-tG1_0pRHPCRdK74EW5HjmFoYnGJDgN_Cf40Viw> <xmx:g1ZTYmKUmkYvYLA_79GMBBahRE_zDaQmNbUh6ulX_1-UkH52U4kXwA> <xmx:g1ZTYoq9V-Hc3l44l2l2-x4JEI_Pyvx-bKeQ9A8CWvCviUSasSUFwQ>
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <privacy-pass@ietf.org>; Sun, 10 Apr 2022 18:13:23 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============1898796874532939935=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: privacy-pass@ietf.org
Message-Id: <20220410225047.4C78E3A15C4@ietfa.amsl.com>
Date: Sun, 10 Apr 2022 15:50:47 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/4RQr2WSD-dlMVqHEvikohNkgfkA>
Subject: [Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Apr 2022 22:50:52 -0000



Issues
------
* ietf-wg-privacypass/base-drafts (+1/-0/💬0)
  1 issues created:
  - Look at greasing Client / Origin interactions (by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/113 [auth-scheme] 



Pull requests
-------------
* ietf-wg-privacypass/base-drafts (+3/-2/💬0)
  3 pull requests submitted:
  - Add challenge and redemption test vectors (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/116 
  - Remove issuance protocol requirements (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/115 
  - Editorial: describe origin and client behavior more clearly (by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/114 [auth-scheme] 

  2 pull requests merged:
  - Revert back to VOPRF for basic private issuance
    https://github.com/ietf-wg-privacypass/base-drafts/pull/111 [protocol] 
  - Editorial: describe origin and client behavior more clearly
    https://github.com/ietf-wg-privacypass/base-drafts/pull/114 [auth-scheme] 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/ietf-wg-privacypass/base-drafts