[Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)

Repository Activity Summary Bot <do_not_reply@mnot.net> Sun, 21 February 2021 07:55 UTC

Return-Path: <do_not_reply@mnot.net>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 364CA3A17B4 for <privacy-pass@ietfa.amsl.com>; Sat, 20 Feb 2021 23:55:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnot.net header.b=VXE/5S8f; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=vZLVgBS4
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cPPseBpdUneA for <privacy-pass@ietfa.amsl.com>; Sat, 20 Feb 2021 23:55:52 -0800 (PST)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24B6A3A163D for <privacy-pass@ietf.org>; Sat, 20 Feb 2021 23:55:52 -0800 (PST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id CF2095C00D9 for <privacy-pass@ietf.org>; Sun, 21 Feb 2021 02:37:10 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162]) by compute1.internal (MEProxy); Sun, 21 Feb 2021 02:37:10 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mnot.net; h= content-type:mime-version:from:to:subject:message-id:date; s= fm2; bh=gRMOkF4KrMFa1iaSXj27M/6Xebbiftp7j13A3O8zZYU=; b=VXE/5S8f 0rtDfO7G0g4Y2B6t27Wpy5qYm1ySgJahlaHc8s6El56gnsp8Dtf1C6ulu005BQQ0 i0Dxq4WVzlvlxeLp88R0OsH0TpvTUksC2zTB5duYJOpvDQnQ/bXVT1Y0ggir0FO9 OKQmiaSnEuqgApK0JWGpJWnp5KOuyPJrf/kxaBVixrNzfkYQVbbQivhhKQsmhBI9 gPt8Sj8d0xpLzEknoTBHG8F5vgh4nbVwu9uyYYhK31eolRLPzYsDvvhe9f5DGF5U Btrur0RKve+aHctRfJJp4lZEgBtVZYRO+wY9Ima9zW3QAsaYrgV1sakPJZem4b4r fKa0tTnnEqnlAg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:message-id :mime-version:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=gRMOkF4KrMFa1iaSXj27M/6Xebbif tp7j13A3O8zZYU=; b=vZLVgBS4jphnZbKuX1l1OUEf5hmW/Trp7eaRE5j3dnztw TahhKbXv/jYKDACZTZucX69gF/4HTPm/YDhFJCOnPvdX4lZxX3P94jM0tqWX+3sX rUpFXoiTZMbfBDXCqvmJiLBrvWiw7Q7n0FSgw3WOLpdmEHbt1ukntrOj2h0QZnST lynf92KDDXwbnB7bR4CNPpFoFutnvRd6CfrcOJ4PQo4Xp8AFHBtJwS69VlPZy9yb EVVVrOsUofcR/lV1o6o2xPmQoomrCGMmOlJSinZxR2qDcFxCG9ymhmcjttzc+ARP wf1GiXKIMUs2OZcC8i7kdgVf+EkNmhjgaKXaLsfow==
X-ME-Sender: <xms:pg0yYOyZRCsKZGta_-9sjKlj4U5kS9upYlN4lW9xxMlBbai-USXR7Q> <xme:pg0yYKStBeTExzk5-F3vdAlMQ6134aF0J5L0TlmKzd-jGN-gshg6ZVfuG3Vy-ivD8 4LiHvyprJRMmYFoXA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrkedtgddujecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggghffvufesrgdttdertddtjeenuc fhrhhomheptfgvphhoshhithhorhihucettghtihhvihhthicuufhumhhmrghrhicuueho thcuoeguohgpnhhothgprhgvphhlhiesmhhnohhtrdhnvghtqeenucggtffrrghtthgvrh hnpeekfedvudetjedvfeekheeiveeugfefhfetteevgeffkefffeetffdvleehudeiteen ucffohhmrghinhepghhithhhuhgsrdgtohhmnecukfhppeegtddrjeelrdekuddrudeije enucevlhhushhtvghrufhiiigvpeeinecurfgrrhgrmhepmhgrihhlfhhrohhmpeguohgp nhhothgprhgvphhlhiesmhhnohhtrdhnvght
X-ME-Proxy: <xmx:pg0yYAWf_HL9hmaHd6BdqVRPt1Z5VL2ITX-eawPTrNUCiNoGBvRaNQ> <xmx:pg0yYEif7R-xUQ8PGiQ20zas-g57TozjZOXnJtCdL8CpXZpAwHqZLg> <xmx:pg0yYABG65euBGEcQZdRGMJPauTXIYTWP0jtR02kKrNRz7aa6vOQEg> <xmx:pg0yYJ5LToygI0N5ZWR53li8AVKX8J9IP64Mg1_E8PJgRkWflRtSZg>
Received: from fv-az267-815.internal.cloudapp.net (unknown [40.79.81.167]) by mail.messagingengine.com (Postfix) with ESMTPA id A0292240064 for <privacy-pass@ietf.org>; Sun, 21 Feb 2021 02:37:10 -0500 (EST)
Content-Type: multipart/alternative; boundary="===============5646598870298947546=="
MIME-Version: 1.0
From: Repository Activity Summary Bot <do_not_reply@mnot.net>
To: privacy-pass@ietf.org
Message-Id: <20210221073710.A0292240064@mailuser.nyi.internal>
Date: Sun, 21 Feb 2021 02:37:10 -0500
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/TnpwwiPHACIXif25WEM8w9e5UpE>
Subject: [Privacy-pass] Weekly github digest (Privacy Pass Working Group summary)
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Feb 2021 07:55:54 -0000



Issues
------
* ietf-wg-privacypass/base-drafts (+0/-6/💬17)
  8 issues received 17 new comments:
  - #50 Accommodating two round protocols (5 by alxdavids, chris-wood, dvorak42)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/50 [architecture] [protocol] 
  - #48 Describe privacy implications of underlying transport protocol(s) (2 by alxdavids, chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/48 [architecture] 
  - #47 Describe negative consequences of centralization (1 by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/47 [architecture] 
  - #46 Remove exposure of token in proxied-verifier (1 by alxdavids)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/46 [architecture] [protocol] 
  - #45 Improve documentation on centralization (1 by alxdavids)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/45 [architecture] 
  - #44 Specify redemption mode in public config (4 by alxdavids, chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/44 [architecture] [http-api] [not-ready] 
  - #39 Determine threshold for metadata bits (bytes?) (1 by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/39 [architecture] 
  - #20 Guidance on issuer selection (2 by alxdavids, chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/issues/20 [architecture] 

  6 issues closed:
  - Guidance on issuer selection https://github.com/ietf-wg-privacypass/base-drafts/issues/20 [architecture] 
  - Describe privacy implications of underlying transport protocol(s) https://github.com/ietf-wg-privacypass/base-drafts/issues/48 [architecture] 
  - Token expiration https://github.com/ietf-wg-privacypass/base-drafts/issues/49 [architecture] 
  - Describe negative consequences of centralization https://github.com/ietf-wg-privacypass/base-drafts/issues/47 [architecture] 
  - Expand metadata discussion https://github.com/ietf-wg-privacypass/base-drafts/issues/51 [architecture] [protocol] 
  - Determine threshold for metadata bits (bytes?) https://github.com/ietf-wg-privacypass/base-drafts/issues/39 [architecture] 



Pull requests
-------------
* ietf-wg-privacypass/base-drafts (+4/-4/💬5)
  4 pull requests submitted:
  - First attempt at solving #50. (by alxdavids)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/62 
  - Add token expiration discussion. (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/61 
  - Add metadata discussion. (by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/60 
  - Fix some issues with the notation (by claucece)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/59 

  2 pull requests received 5 new comments:
  - #62 First attempt at solving #50. (4 by alxdavids, chris-wood, claucece)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/62 
  - #60 Add metadata discussion. (1 by chris-wood)
    https://github.com/ietf-wg-privacypass/base-drafts/pull/60 

  4 pull requests merged:
  - Add token expiration discussion.
    https://github.com/ietf-wg-privacypass/base-drafts/pull/61 
  - Add metadata discussion.
    https://github.com/ietf-wg-privacypass/base-drafts/pull/60 
  - Fix some issues with the notation
    https://github.com/ietf-wg-privacypass/base-drafts/pull/59 
  - Align with voprf draft
    https://github.com/ietf-wg-privacypass/base-drafts/pull/58 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/ietf-wg-privacypass/base-drafts