[Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 16 April 2023 08:10 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAB11C1516F2 for <privacy-pass@ietfa.amsl.com>; Sun, 16 Apr 2023 01:10:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.394
X-Spam-Level:
X-Spam-Status: No, score=-2.394 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=mnot.net header.b="CHQEYXLZ"; dkim=fail (2048-bit key) reason="fail (message has been altered)" header.d=messagingengine.com header.b="GqtnQJrE"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kitwusS_IqLa for <privacy-pass@ietfa.amsl.com>; Sun, 16 Apr 2023 01:10:48 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 103B1C1526FF for <privacy-pass@ietf.org>; Sun, 16 Apr 2023 01:10:48 -0700 (PDT)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id E3AD45C0306 for <privacy-pass@ietf.org>; Sun, 16 Apr 2023 03:31:54 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Sun, 16 Apr 2023 03:31:54 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h=cc :content-type:content-type:date:from:from:in-reply-to :mime-version:reply-to:sender:subject:subject:to:to; s=fm1; t= 1681630314; x=1681716714; bh=bwRfrbR2DDyyrEhylYbV1Kq08AL9jzS+ZlM akftFLuM=; b=CHQEYXLZ2viznhJkeWvc8HXQ9S0nPlhP24IczQbI96FAd2BuTTn 2kwCKF6FSlK3uHvtouA9gWQqBu5pF9p3j/GZMPid+poaCCsOzzyTvhBdLILGZKKG 06UE832ec1ekxBKB4c/iJ1iCF1Ce3hPmz7rM5hUInQdH64Dxc80OS0WADlB3eH/+ H4bFa0EHEll+cPAIVkGa+cS/KPL6OfDYpNxcI0I2TXJWAYHcVu2RTZ+UXIxCHZVp W/3n/pKrXBa4HhkNBBkuDkvwooM9oWeSPvRFMmsXtRXnGxGMJheIVLiffNySby+v cp1voyAzyfArdcLirXfhd1FggDyGYA/DvIg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:content-type:date :feedback-id:feedback-id:from:from:in-reply-to:mime-version :reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1681630314; x= 1681716714; bh=bwRfrbR2DDyyrEhylYbV1Kq08AL9jzS+ZlMakftFLuM=; b=G qtnQJrE4BBngCKAh3w+QR7x4i0E6jYbIv2FLTE/8vlF8lrYUmx12csvRTqJJjLTP oZNvIk7pbmsbFKEs3kV6pnOn+v+fTRuOWSwQxYWCW6KCz0YVuxYrpjpMaNk0qCRl UBp6K2rRlNVYlFFWbS6+OHICpywb0AhR3O1lfdVOZiQJX7Gkmu/bTTK7IqZV60B3 uiJlffI/mU4mO/bReQAj36oqcChF1MHsHHqQf38oF6Yf5tEchr8K5almDolcI6Kq yQpUbwXjGXHkmCRInSJZCnDg25E0z/4eeF/aVk0EmllLgfCY8R5WHZLOVme2jvxp v3h5excvnWlLoR1ZWOMNg==
X-ME-Sender: <xms:aqQ7ZI7ffstPTv0TC7rZaBKMfWDrA43ANJcFdmkAUKsEKjb580ogoA> <xme:aqQ7ZJ7fvCQdyBqnamkcxcN1TkicJHUgsKbtUI80IsJsMJBSwK3qY4ZC9q3tGOzHh 9MLUT2s0wssUctiUA>
X-ME-Received: <xmr:aqQ7ZHeCW3apEXGZDLlDEMjVsrRZT444EbVC_DE7n9hbsQl1WNyQ_fqMSKZzBw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrvdelfedguddvvdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecupfhoucgurghtvgcufhhivghlugculdegledmne cujfgurheptggghffvufesrgdttdertddtjeenucfhrhhomheptfgvphhoshhithhorhih ucettghtihhvihhthicuufhumhhmrghrhicuuehothcuoeguohgpnhhothgprhgvphhlhi esmhhnohhtrdhnvghtqeenucggtffrrghtthgvrhhnpeekfedvudetjedvfeekheeiveeu gfefhfetteevgeffkefffeetffdvleehudeiteenucffohhmrghinhepghhithhhuhgsrd gtohhmnecuvehluhhsthgvrhfuihiivgepudenucfrrghrrghmpehmrghilhhfrhhomhep ughopghnohhtpghrvghplhihsehmnhhothdrnhgvth
X-ME-Proxy: <xmx:aqQ7ZNLixFjOsMgWKwifUIZM0C14xsIoE8tuu3JpfS3pdhMYPxlcag> <xmx:aqQ7ZMIDeSEYQp_nnM6G5SLkJNtHSGgjSyp94Qp6HM6v3zEEYVUnIg> <xmx:aqQ7ZOyBpS3xDRYFuYm5rL2F4qVw6OzEg5TECLejJEdIhQbp2gpRRQ> <xmx:aqQ7ZDko1u4aVJakme5g3rjyp5-WodEUBwrrtXXWLpZhZliITQPTYg>
Feedback-ID: i1c3946f2:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA for <privacy-pass@ietf.org>; Sun, 16 Apr 2023 03:31:54 -0400 (EDT)
Content-Type: multipart/alternative; boundary="===============8751451249855924102=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: privacy-pass@ietf.org
Message-Id: <20230416081048.103B1C1526FF@ietfa.amsl.com>
Date: Sun, 16 Apr 2023 01:10:48 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/D-IeMWwZX1fwf2FrkPlwLUZZ6VI>
Subject: [Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Apr 2023 08:10:53 -0000



Issues
------
* ietf-wg-privacypass/base-drafts (+1/-1/💬3)
  1 issues created:
  - Future issuance protocol requirements (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/354 

  3 issues received 3 new comments:
  - #353 Address Developer Ergonomics by providing UA feedback for malformed challenges (1 by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/353 
  - #352 Relax base64url padding requirement (1 by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/352 
  - #351 Add guidance on the frequency that an origin should issues PrivateToken challenges (1 by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/351 

  1 issues closed:
  - Address Developer Ergonomics by providing UA feedback for malformed challenges https://github.com/ietf-wg-privacypass/base-drafts/issues/353 



Pull requests
-------------
* ietf-wg-privacypass/base-drafts (+2/-2/💬0)
  2 pull requests submitted:
  - Recommend sending a minimal number of challenges (by tfpauly)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/356 [auth-scheme] 
  - TokenChallenge validation steps (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/355 

  2 pull requests merged:
  - Recommend sending a minimal number of challenges
    https://github.com/ietf-wg-privacypass/base-drafts/pull/356 [auth-scheme] 
  - TokenChallenge validation steps
    https://github.com/ietf-wg-privacypass/base-drafts/pull/355 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/ietf-wg-privacypass/base-drafts