
From nobody Mon Jan  3 09:30:27 2022
Return-Path: <benson_muite@emailplus.org>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CAFC3A0983; Mon,  3 Jan 2022 09:30:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=emailplus.org header.b=g2HY5F5s; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=JBb0Tk91
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MB5pcrZFOdkS; Mon,  3 Jan 2022 09:30:20 -0800 (PST)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52E973A0981; Mon,  3 Jan 2022 09:30:17 -0800 (PST)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 663915C018B; Mon,  3 Jan 2022 12:30:16 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Mon, 03 Jan 2022 12:30:16 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=emailplus.org; h=to:cc:from:subject:message-id:date:mime-version:content-type :content-transfer-encoding; s=fm2; bh=YMEz9E9ZPAU2vmZTQBgbTX6NrL jIM1c72lfkNqJkaFk=; b=g2HY5F5sdOVuE4f8Rlx/Wg87+Ocvds2EVeibG3hkcR 0zH0JJBHGdIDu5BUuuAJ0AJSwUWxLMJZop7DYe8bYPJ8Tns7i1W5mNoUZf5tVgCQ 2sIq4xc1KERZ55lKIUHPgjXOxZKaJbzPMjLz/1xfATg7HaKvHqZCxVGfJdc5tBMr 3LoezkOb968pn/vgDB8Vxe6dVddmYFZxuGOd9+ZcldwcXQ22Ibyjd+ve8lUw663G bxGOpDaCq8G6ar5NN6sjCGSM5BbaqrgDebI4SYIn0tcrltIPgqOi1qR3wA+OTDqs B+UuGF8m3ukv9lOelsp8+asfp50jKamZ/Hy3/5UiP/WA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:message-id:mime-version:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=YMEz9E 9ZPAU2vmZTQBgbTX6NrLjIM1c72lfkNqJkaFk=; b=JBb0Tk91EGB8reV3yDYoi1 C0QbLIQp58hxgjWTXlnS3w16a0f1f5UWCCbLwC7bnNwz7vlWDXOtDcgKXBYGYmFc UidvHuEft0bpneISJbkIa4bYNY7ykpmpPwgttJ1D4+E60GUK9m0i0/4Bdez8I7yg HH5Qc/owIHfhZeLmlfA3bXfBJpBLPA7GbMxNrqRppRG8nw4I7GaFE15M7tQKfbYb PgRilQXbtShDM+eo25OmbkCTHV5jjHacIWL/bP8UjsTMj9REtWPW15SX3RRcAoVI xMF3xNsj/8KrzRXjLOA8Kzht04eIg04+y+9Se4aemQzidGzXwNVvDsmrJWeCYYqQ ==
X-ME-Sender: <xms:qDLTYQ8mZcSRqQi7dwNfOnxgvTSDbL_Z8aqhOoeB40O3kWlczJ2vGg> <xme:qDLTYYvKDN-hvpvji2bLquMS1hk-oDMgpTJorBgkOpNrPp7bw_4dxpiLSDjZpjXcq Sj7xJfux0ZInkxZ>
X-ME-Received: <xmr:qDLTYWB376_i-RUxQ9GbjoArcM5dYYiSxRiTzkakPEFWyGVVeR3dUyWxhpktzwtXDd70ckSjXMFT4w>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvuddrudefuddguddttdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecuuegrugftvghpuhhtqdffohhmrghinhculddutd ejmdenucfjughrpefvhffukffffgggtgfgsehtjeertddtfeejnecuhfhrohhmpeeuvghn shhonhcuofhuihhtvgcuoegsvghnshhonhgpmhhuihhtvgesvghmrghilhhplhhushdroh hrgheqnecuggftrfgrthhtvghrnhepgfejudfggfdtteekkefgffefudegveffgffffeef lefgffdtheejfffgledujeegnecuffhomhgrihhnpehgihhthhhusgdrtghomhdpihgvth hfrdhorhhgpdhgihhthhhusgdrihhonecuuegrugftvghpuhhtffhomhgrihhnpegvmhgr ihhlphhluhhsrdhorhhgnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrg hilhhfrhhomhepsggvnhhsohhnpghmuhhithgvsegvmhgrihhlphhluhhsrdhorhhg
X-ME-Proxy: <xmx:qDLTYQeAmZ8nyau8LoP0OEAHYDA_2QMLxWFDFuXMhVIYU7cpkN4LAQ> <xmx:qDLTYVORGTJgFLl03fTc2GftU_zXKp4K_ZkaOl0d9C80GoWPMlME9Q> <xmx:qDLTYakO3sA7-bgbAxWCS8qiRWskXltmRRn5w7Gqqb-P-WLY_CVcuQ> <xmx:qDLTYXUgMHI-xVoIT1rev_uOaKSqIJW714rI7OnWlzQAkCgUDb4GkA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 3 Jan 2022 12:30:14 -0500 (EST)
To: hackathon@ietf.org
Cc: hackathon-chairs@ietf.org
From: Benson Muite <benson_muite@emailplus.org>
Message-ID: <278d1d98-608b-e893-5da3-53a173da7765@emailplus.org>
Date: Mon, 3 Jan 2022 20:30:09 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/SSj--9lDINsXltRuk51ofGz5H0Y>
Subject: [hackathon] 2FA requirement on GitHub
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2022 17:30:26 -0000

Joining the Hackathon GitHub organization requires two factor 
authentication. The recommended applications in the current GitHub 
documentation do not mention that TOTP is based on an open IETF standard[1]:
https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication
My attempt to fix this seem to have failed[2].

As the IETF process is quite rigorous, the specification is one that 
many people can implement.[3][4][5]

Is there any certifying body for 2FA applications or requirements on 
TOTP authenticators for using to join the Hackathon GitHub organization?

[1] https://datatracker.ietf.org/doc/html/rfc6238
[2] https://github.com/github/docs/pull/11604
[3] https://github.com/Netthaw/TOTP-MCU
[4] https://github.com/lucadentella/TOTP-Arduino
[5] https://freeotp.github.io/


From nobody Mon Jan  3 11:41:01 2022
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76D313A0ADA; Mon,  3 Jan 2022 11:40:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.812
X-Spam-Level: 
X-Spam-Status: No, score=-2.812 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.714, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f7w3adsYV41q; Mon,  3 Jan 2022 11:40:57 -0800 (PST)
Received: from mail-pj1-x1029.google.com (mail-pj1-x1029.google.com [IPv6:2607:f8b0:4864:20::1029]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 27A833A0AD2; Mon,  3 Jan 2022 11:40:57 -0800 (PST)
Received: by mail-pj1-x1029.google.com with SMTP id c9-20020a17090a1d0900b001b2b54bd6c5so16903678pjd.1;  Mon, 03 Jan 2022 11:40:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;  h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=58CipXKEpg5OBr/M4xK/RshRl0Xh5iacty/zlPYXEEY=; b=Om9kKDRNl83osPntefaFrUtqHP+eEGJVs598z7Tg9AjyIQPVowcfWt7GjG90aGEMDa VO4XNU7jmBnvnpzkBf/MQxaoKCTgmx06aUcoLcVFA3jcWBBRfmXdbLeyFIR46ojHg0jy rnmRcyCvjwTGEWpOiiULKe1uttEU6/HzFFs3Jubyx+95KT/ZTKDCJ8ID2F5msptDy3Ju T/3YZnRa0FEuLsZ8HKw3YURRx/8NBfBpel1l2TNFPsOk3dt9tEgQ4aT+8R73tylyHy1c Ixk7dk1rW8VHTQPzR4txMqLZl4Tgn8B3/6B9HPYy7iFvf7wyzHET7yvVV/XmU5GB6YRy 1E+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=58CipXKEpg5OBr/M4xK/RshRl0Xh5iacty/zlPYXEEY=; b=5sJnj11ksteQ/Om4PM5LugU3s1vrLMlyN5AEjJCE2KYBe//lin/w9R+eCjgt+kYc6/ siCBMJGQ+va/Nzvqo6zNxrdACajzSwoNLmzsag0sXXxStN9Ai4IJ/ru+Lw7svK+OIs5F iG56+4WZGzpi7SsDoqil+dTHigwTtisQKrge/XpGm6SqDyaiK7wXBQvc/Fo6bvZfVLkd Q92KmAROejyT3Cbrmg/iBJBlKpSZBwwCvLzdJ9qJIIxaOMiTRkFBZxxg2jf5LtaqX0VV AbdHvD8ufCt8B0hfA2g/baXAUWh8kUHUT4dz9i8VIa+Q8iY47LbFY6/KwEHtdFUP1Vmb oRnw==
X-Gm-Message-State: AOAM530RMGk14oOv0aD9Rmmpf2BrquNozhZ1oSbshAYoz/MNCVo3dngy HskZYrK9+0NMRMk8xQ5HgsfjWv6RGX5SEg==
X-Google-Smtp-Source: ABdhPJzhVAxK660v7P55mwV16FYlWhlxtcjTTRt4VLL49XX7RGsOZp3LN2c1UquK9Vk6WDv++Tc9ug==
X-Received: by 2002:a17:902:74c1:b0:148:b010:5391 with SMTP id f1-20020a17090274c100b00148b0105391mr47137318plt.155.1641238855567;  Mon, 03 Jan 2022 11:40:55 -0800 (PST)
Received: from ?IPv6:2406:e003:1071:1701:80b2:5c79:2266:e431? ([2406:e003:1071:1701:80b2:5c79:2266:e431]) by smtp.gmail.com with ESMTPSA id f18sm2929493pgf.65.2022.01.03.11.40.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 03 Jan 2022 11:40:54 -0800 (PST)
To: Benson Muite <benson_muite@emailplus.org>, hackathon@ietf.org
Cc: hackathon-chairs@ietf.org
References: <278d1d98-608b-e893-5da3-53a173da7765@emailplus.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <661c4252-4052-c5a8-be57-bc07a0c95081@gmail.com>
Date: Tue, 4 Jan 2022 08:40:50 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0
MIME-Version: 1.0
In-Reply-To: <278d1d98-608b-e893-5da3-53a173da7765@emailplus.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/F758qnxOc9LlNT6UYMki4ECsndM>
Subject: Re: [hackathon] 2FA requirement on GitHub
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jan 2022 19:41:00 -0000

Benson,
On 04-Jan-22 06:30, Benson Muite wrote:
> Joining the Hackathon GitHub organization requires two factor
> authentication. The recommended applications in the current GitHub
> documentation do not mention that TOTP is based on an open IETF standard[1]:

s/standard/document/

RFC6238 is not a standard.
"Status of This Memo

    This document is not an Internet Standards Track specification; it is
    published for informational purposes."

This doesn't change your underlying point, of course, but RFC1796.title.

    Brian


> https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication
> My attempt to fix this seem to have failed[2].
> 
> As the IETF process is quite rigorous, the specification is one that
> many people can implement.[3][4][5]
> 
> Is there any certifying body for 2FA applications or requirements on
> TOTP authenticators for using to join the Hackathon GitHub organization?
> 
> [1] https://datatracker.ietf.org/doc/html/rfc6238
> [2] https://github.com/github/docs/pull/11604
> [3] https://github.com/Netthaw/TOTP-MCU
> [4] https://github.com/lucadentella/TOTP-Arduino
> [5] https://freeotp.github.io/
> 
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon
> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe
> 


From nobody Wed Jan  5 01:26:16 2022
Return-Path: <benson_muite@emailplus.org>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A0843A0AD1; Wed,  5 Jan 2022 01:26:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.811
X-Spam-Level: 
X-Spam-Status: No, score=-2.811 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.714, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=emailplus.org header.b=LG2575t5; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=HdoiV/1B
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YkTRzzRh7OYI; Wed,  5 Jan 2022 01:26:10 -0800 (PST)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B3C13A0AD8; Wed,  5 Jan 2022 01:26:09 -0800 (PST)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id 092CD5C010A; Wed,  5 Jan 2022 04:26:09 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Wed, 05 Jan 2022 04:26:09 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=emailplus.org; h=subject:to:cc:references:from:message-id:date:mime-version :in-reply-to:content-type:content-transfer-encoding; s=fm2; bh=m osfGVRUli8j2AncoiEoig19MJ1E8r0Juxmq3P0W1u8=; b=LG2575t5iyeddUU4a Gn7PzqZ7JuYHXBHBk1JW2xomJsPMbhJSfRippF1RgdLOi/p3sUC/wtEX99dEGqdF WOETvIie9dvQc6IVKycbUiiGb7Vb+dnOnHwxZA649d5WibM4mUvvLiOXlgKfDgPt Uc4RMwMPYEVOekstQazVD2soNSDXb+3UgCcnEPy2g3wGAuZBb8BFkravHXtyNGtf nbdtcxBw1+hSiNhqW2FILeItjElaBNnKGaaY8iiLnHs4nFPQ1yMVpsgaW0qbJzSJ b5Ez/x9HOGeoNDgGRPQ5NanSqnK6fl4r8Ldmt/9M1MUR5jYfuSJH9Ms8Ps/S77L9 NNXmg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=mosfGVRUli8j2AncoiEoig19MJ1E8r0Juxmq3P0W1 u8=; b=HdoiV/1BQ6lcDALZ7EvK4KdZb5oAko9yi+IN/H36CK7PQXajY8z4ZCUln 6467dZ1wSPobJPsxUvxUql/+2vK1GZTuDHXDhe3hBfF/XMZXQFH/cm7rCFNhHPdz b+GR6InVqN5KL5ukWfeEYWDSga5TTHpgAKDPa9ZBHT1phV/8CYDWKOyj3xGsTkBc nkqeuQhFHnkceRm53j5o+YgJmJx3nV1vObc6MMDPx8NSeZ0ZagAKpd2wR6ss8TW8 96DI4HjwSr5idB91Nv2lwJvfqCpQnd1ZBGet4l0ROQCI3fXVuirdsaN21OBzAK6F zFECwkMDHSjxdglDus0oA9kdPkyEg==
X-ME-Sender: <xms:MGTVYWPb8bWVVv-AoCHkWha4jL7sGMu8m0Eacq8GmObu-5takqMJrQ> <xme:MGTVYU93TyQKJzn05g9lFT2oY1_Q4r88H9eFpkK1tEaOkiVATaODPZlj2JQFk5gvE vWLjYasUYebwSko>
X-ME-Received: <xmr:MGTVYdQeO1EIZNCxTLCaQ1FmsOszdNkqmmNGgO5Yd7HOzdj9yU6FLVhzzdXqPUEFou3zc8FQBIR0Dg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvuddrudefhedgtdegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenuceurggutfgvphhuthdqffhomhgrihhnucdluddtje dmnecujfgurhepuffvfhfhkffffgggjggtgfesthekredttdefjeenucfhrhhomhepuegv nhhsohhnucfouhhithgvuceosggvnhhsohhnpghmuhhithgvsegvmhgrihhlphhluhhsrd horhhgqeenucggtffrrghtthgvrhhnpeduudffhffggedvjeekjeejueekvdfhhfetfefh veevvdeuueeikeduhedtuddtfeenucffohhmrghinhepghhithhlrggsrdgtohhmpdhgih hthhhusgdrtghomhdpihgvthhfrdhorhhgpdhgihhthhhusgdrihhonecuuegrugftvghp uhhtffhomhgrihhnpegvmhgrihhlphhluhhsrdhorhhgnecuvehluhhsthgvrhfuihiivg eptdenucfrrghrrghmpehmrghilhhfrhhomhepsggvnhhsohhnpghmuhhithgvsegvmhgr ihhlphhluhhsrdhorhhg
X-ME-Proxy: <xmx:MGTVYWsEMjx_pffPXqRU5MHNFwIkuMuk2_X3EnE9Z9w0JByxdGMZUA> <xmx:MGTVYefHK6pYijnMnry2k60qIz2PTG9gQH9C3eGqn98GyuJ-GoH2Bw> <xmx:MGTVYa1DGOaiRetF0Wi056LJ8RP7BD5iQZKAtHhWDdg2dWb_pxFveA> <xmx:MWTVYSES_wZNLpeD0PeEpysG0URV6mnF5tsLHNcBZtYK5r-iugsuzg>
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Wed, 5 Jan 2022 04:26:06 -0500 (EST)
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, hackathon@ietf.org
Cc: hackathon-chairs@ietf.org
References: <278d1d98-608b-e893-5da3-53a173da7765@emailplus.org> <661c4252-4052-c5a8-be57-bc07a0c95081@gmail.com>
From: Benson Muite <benson_muite@emailplus.org>
Message-ID: <a86bd2af-160e-619b-2701-c492842d92c3@emailplus.org>
Date: Wed, 5 Jan 2022 12:26:02 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1
MIME-Version: 1.0
In-Reply-To: <661c4252-4052-c5a8-be57-bc07a0c95081@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/KG6SlzCvkFnzcXotaEdY6azBNro>
Subject: Re: [hackathon] 2FA requirement on GitHub
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2022 09:26:15 -0000

On 1/3/22 10:40 PM, Brian E Carpenter wrote:
> Benson,
> On 04-Jan-22 06:30, Benson Muite wrote:
>> Joining the Hackathon GitHub organization requires two factor
>> authentication. The recommended applications in the current GitHub
>> documentation do not mention that TOTP is based on an open IETF 
>> standard[1]:
> 
> s/standard/document/
> 
> RFC6238 is not a standard.
> "Status of This Memo
> 
>     This document is not an Internet Standards Track specification; it is
>     published for informational purposes."
> 
Thanks. GitLab 2FA documentation [6] does have a link to RFC6238

[6] 
https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html

> This doesn't change your underlying point, of course, but RFC1796.title.
> 
>     Brian
> 
> 
>> https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication 
>>
>> My attempt to fix this seem to have failed[2].
>>
>> As the IETF process is quite rigorous, the specification is one that
>> many people can implement.[3][4][5]
>>
>> Is there any certifying body for 2FA applications or requirements on
>> TOTP authenticators for using to join the Hackathon GitHub organization?
>>
>> [1] https://datatracker.ietf.org/doc/html/rfc6238
>> [2] https://github.com/github/docs/pull/11604
>> [3] https://github.com/Netthaw/TOTP-MCU
>> [4] https://github.com/lucadentella/TOTP-Arduino
>> [5] https://freeotp.github.io/
>>
>> _______________________________________________
>> hackathon mailing list
>> hackathon@ietf.org
>> https://www.ietf.org/mailman/listinfo/hackathon
>> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe
>>


From nobody Fri Jan 14 08:42:44 2022
Return-Path: <jricher@mit.edu>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C85E23A292F for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 08:42:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.499
X-Spam-Level: 
X-Spam-Status: No, score=-1.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.399, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5u55hNhTTL7d for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 08:42:39 -0800 (PST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7ACC33A293B for <hackathon@ietf.org>; Fri, 14 Jan 2022 08:42:39 -0800 (PST)
Received: from smtpclient.apple (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 20EGgaNc003881 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <hackathon@ietf.org>; Fri, 14 Jan 2022 11:42:37 -0500
From: Justin Richer <jricher@mit.edu>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Message-Id: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu>
Date: Fri, 14 Jan 2022 11:42:36 -0500
To: hackathon@ietf.org
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/wB-nq3-10rjjOXE3UvbHLnP7kf0>
Subject: [hackathon] GNAP Interoperability Hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2022 16:42:42 -0000

For the IETF113 hackathon, the editors of the GNAP specification are =
proposing a project to get several different implementations of GNAP =
built and working with each other:

'''GNAP: Grant Negotiation and Authorization Protocol'''
   * Champion(s)
     * Justin Richer, Aaron Parecki, Fabien Imbault
   * Project(s)
     * Build and connect implementations of GNAP across different =
platforms. We plan to have implementations of the AS, Client, and RS =
available for people to extend and use, and to deploy against with other =
components.
     * Interop profile for the hackathon consists of the "redirect" =
interaction start method, the "redirect" interaction finish method, and =
key proofing provided by the combination of HTTP Signatures with =
RSA-PSS-SHA512 and a Content-Digest with SHA-512 hash (for requests with =
bodies).
     * Other modes (user-code, push) and signature methods (JWS) will be =
partially supported by some libraries and are encouraged.



 =E2=80=94 Justin


From nobody Fri Jan 14 10:06:27 2022
Return-Path: <eckelcu@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 963853A2DD0 for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:06:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.595
X-Spam-Level: 
X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FnrpDxMb; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=h1XiV37Z
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id POcFR4nb2nXA for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:06:22 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BEFB3A2DCE for <hackathon@ietf.org>; Fri, 14 Jan 2022 10:06:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2180; q=dns/txt; s=iport; t=1642183582; x=1643393182; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=FnrpDxMbhKbYbk3w9byqPsTxHrQWONlM7lMRO3Hitk+fAlX9QB+T1UmL Pv7bo/pUxrZfw8iNPbzZVKMsjJdzN3yUs57PC4C6IvTR+5W6qjnUTK9kv PnV1bWLqh1IVBmhamZF2XbV9FUq36VRDoWvgZ/6I/iIPHvpibE2RrvRe8 o=;
IronPort-PHdr: =?us-ascii?q?A9a23=3A0Zr9WRCyjcfOsX/rbjcwUyQVaBdPi9zP1kY95?= =?us-ascii?q?pkmjudIdaKut9TnMVfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKW?= =?us-ascii?q?kwJjMwMlFkmB8iIQUTwMP/taXk8G8JPHF9o9n22Kw5bAsH7MlbTuXa1qzUVH?= =?us-ascii?q?0aXCA=3D=3D?=
IronPort-Data: =?us-ascii?q?A9a23=3AdVUplKvAbxlHkVqutLvGwJkRCufnVHhcMUV32?= =?us-ascii?q?f8akzHdYApBsoF/qtZmKWmBO/eDZGb3Lt1xbN/noxwOscTUyNNjSAJrrS5kR?= =?us-ascii?q?ntHgMeUXt7xwmUckM+xwmwvdK/shiknQoGowPscEzmM9n9BDpC79SMmjfjRG?= =?us-ascii?q?uKnYAL5EnkZqTFMGX9JZS1Lw4bVsqYw6TSIK1vlVeHa+qUzC3f9s9JACV/43?= =?us-ascii?q?orYwP9ZUFsejxtD1rA2TagjUFYzDBD5BrpHTU26ByOQroW5goeHq+j/ILGRp?= =?us-ascii?q?gs1/j83Ad+j1738aEBPHfjZPBOFjTxdXK3Kbhpq/3NplP1kcqtHLx4L0F1ln?= =?us-ascii?q?PgpoDlJnZG7SgotNbDkk+UGWB4eGCZ7VUFD0O+WeSnk4ZzNlyUqdFOpmZ2CF?= =?us-ascii?q?noePYQT+e9rAWZI3f0VND5LaQqM78q02rOwSuR2rsEiMI/mMJ53h53K5Vk1F?= =?us-ascii?q?t48SpzFBq7N/9Idg3E7h9tFGrDVYM9xVNamVzyYCzUnB7vdIMtWcD+Uu0TC?=
IronPort-HdrOrdr: =?us-ascii?q?A9a23=3A3Rw2Sa+qtmmXIkbi7eFuk+GIdr1zdoMgy1?= =?us-ascii?q?knxilNoENuE/BwxvrBoB1E73DJYW4qKQ4dcdDpAtjmfZtFnaQFobX5To3SIj?= =?us-ascii?q?UO31HYb72KjLGSggEIfhefygcz79YaT0ETMqyUMbE+t7eH3ODaKadj/DDkyt?= =?us-ascii?q?HTuQ629R4EJmsGB9ACnmVE40SgYzBLrWJ9dPwE/e+nl7J6Tk2bCA0qh6qAdx?= =?us-ascii?q?04dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1StFTtokjc3O?= =?us-ascii?q?GOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RH4Fq/QpF591H2m?= =?us-ascii?q?xayeUkkC1QZ/ibLEmhJV1dlCGdnTUIFgxesUMKh2Xo3EcL6vaJNQ7SQ/Ax9b?= =?us-ascii?q?6xNCGpt3bJeLpHofx2N6XzjesJMfqIplWO2/HYEx5tjUa6unwkjKoaiGFeS5?= =?us-ascii?q?IXbPtLoZUY5149KuZNIMprgLpXY9WGIfusrsq+S2nqIkwxf1MftuCETzA2BF?= =?us-ascii?q?OLU0ICssua33xfm2141VIRwIgakm0b/JwwRpFY76CcW54Y2o1mX4sTd+ZwFe?= =?us-ascii?q?0BScy4BijERg/NKnubJRDiGLscM3zAppbr6PE+5f2sepYP0Jwu8a6xH29wpC?= =?us-ascii?q?o3YQbjGMeO1JpE/lTER3i8Ry3kzoVE651wqtTHNfHW2O24ORgTeueb0oEi6/?= =?us-ascii?q?zgKr+O0chtcorexEPVaPF04zE=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BPAAAIu+Fh/49dJa1aDg4BAQEBAQE?= =?us-ascii?q?HAQESAQEEBAEBQIFFBwEBCwGBUVYHEgFkWjcxhEeDRwOEWWCFDoMFln+EH4E?= =?us-ascii?q?ugSUDVAsBAQENAQEqCwwEAQGEQEUCF4MzAiU0CQ4BAgQBAQESAQEFAQEBAgE?= =?us-ascii?q?GBIEJE4VoDYZCAQEBAQIBAQEQEREMAQEMIAsBBAsCAQgOCgICIwMCAgIlCgE?= =?us-ascii?q?UARACBA4BBAEcBAGCYgGCZQMNIQEOn2IBgToCih96gTGBAYIIAQEGBASCUoI?= =?us-ascii?q?5GII2AwaBECoBgw2EDw+HByccgg2BFSccgmc+gmMBAQIYgUUBgxg3gi6SUQF?= =?us-ascii?q?bdXiVeqoJCoNEn00FLqdulkGhSEsBhB8CBAIEBQIOAQEGgWE7gVlwFTsqAYI?= =?us-ascii?q?+PhMZD44gCxeDT4UUhQVFdBEnAgYBCgEBAwmQLQEB?=
X-IronPort-AV: E=Sophos;i="5.88,289,1635206400"; d="scan'208";a="890938860"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Jan 2022 18:06:21 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 20EI6Kg2027222 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 14 Jan 2022 18:06:21 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 14 Jan 2022 12:06:20 -0600
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 14 Jan 2022 12:06:20 -0600
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 14 Jan 2022 12:06:20 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MaUYVRjJBArLdnCP7P7tIJZF1si/3qc+/rVJa8/dA0nvSCdR2Rq5J+HBpXvS8C/H+79aQw8b3hCsUgNt8/oZpbQ6AkwrrCNsAbjKp5QP8HJjsKy+Z58fyn+V4UGJxOcYdrbyAcIL3ctgDRjseWfywVliuNog12vZWUwg82Nq+cUy/s+JGWUZdyFfLZdnFOMa+Xpy6Zh52JhrLnUMwpthsW9PnbFcDrqaHCnYsdb0paRAlTzmVzt8baqQBhHP+pOB6AXlMSX6AUohqymZM5iQvY1HCr6tKbvh4a4SMrOheYz1ALlbjH7/jX0jTBfVA56sl1cBOnSiYpnRDfRdshq52g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=VLCS3t/otvZOnTpRk5ed9nUL2OtV39mJV50FMaXz4HJ87q/zGVubmaqzj1sxu19xcQcS+TJhxmUgtUrlNI71VIAfe8xZFZ/QTAFQQQB01J37SUcSnyM8l2zSgewHJkjB2+cE8iIdXlkYqFMfPUESbml+I0DtVyVyqMDLFXu2W2npgVQ82N1hna77i1ytru5GqDMoaoizXbZhKqti8emyuAsIyFn5cjhgDUyFphij4N6LMrhgzrPmuGCmRMBlQQHAz3voixKr8k/ZgOChhGAFSGvKwZymSVMaM4BnQWaQUuJc6bhsFHfw2EWwbCCKILjErUuQDfVgdNe+lmfV6rStgA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=h1XiV37ZGD+KsjWEQstyrw06zvea+z+chszcK27rkb4XruPWFmM4RgZth4yZUcFkaqrVa2g6XvKEIUQuhC/CVvN44BEjl+4mtK1SekyO6TYDI06VeAADw+ulu4yR7WmTpJn5eb/F2rS4ixw6RxkP4Yw+isVlvfWcXio3FNjj5Xg=
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com (2603:10b6:a03:2af::17) by SN6PR11MB3261.namprd11.prod.outlook.com (2603:10b6:805:c1::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.11; Fri, 14 Jan 2022 18:06:18 +0000
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::4071:7411:6a4d:8449]) by SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::4071:7411:6a4d:8449%4]) with mapi id 15.20.4888.012; Fri, 14 Jan 2022 18:06:18 +0000
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: Justin Richer <jricher@mit.edu>
CC: "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: [hackathon] GNAP Interoperability Hackathon
Thread-Index: AQHYCWXWu1tMvE6gEEOIOePW1Ne2a6xi0A6A
Date: Fri, 14 Jan 2022 18:06:18 +0000
Message-ID: <B47889F9-94FE-494B-85EE-DA745E47C9CC@cisco.com>
References: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu>
In-Reply-To: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailer: Apple Mail (2.3654.120.0.1.13)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 69493de3-ec50-4664-cdb4-08d9d7889041
x-ms-traffictypediagnostic: SN6PR11MB3261:EE_
x-microsoft-antispam-prvs: <SN6PR11MB326180379E85D19173BC8C70B2549@SN6PR11MB3261.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:1284;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:SJ0PR11MB5053.namprd11.prod.outlook.com; PTR:; CAT:NONE;  SFS:(366004)(71200400001)(86362001)(8676002)(8936002)(38070700005)(2616005)(5660300002)(33656002)(966005)(6486002)(38100700002)(36756003)(316002)(122000001)(6512007)(508600001)(4326008)(6506007)(53546011)(76116006)(66476007)(66446008)(6916009)(83380400001)(66556008)(2906002)(64756008)(186003)(66946007)(45980500001); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ZHJHc2QrMVcvV2tkOUxZRVh5b1pmR3FUaS84WnNYRndIakE0MVZLUHpPcEdG?= =?utf-8?B?bHJ6RTU3QjFUa01DbTFPMFlXbk9RYUV5S3g0Q3hRT29oTWtyQzRGd2NKRG9R?= =?utf-8?B?ZlRXdmJDU3V1NE83Y081ODVmZ25BT1VzSW9RZ2JSNXNObHp4b1B4NVVUUUxh?= =?utf-8?B?N3JuWi9RUjl2N2VFMDd4MmhNK3o4blg5RjZYRG1KNVJiZDVmekJlMlNRdmdK?= =?utf-8?B?UHNrTE1JQzdXVGptYnJHMWd3aXpRZEg1bm1telJLTDY0M29GUWpsM2VPOUp6?= =?utf-8?B?cFN1NXJPMksrZmgvVERWNC9lREVJOTJ4VDVWOGpnYUluRnBzT3BzYVJvdVlZ?= =?utf-8?B?Mk5meUFVc2ZSaGJLVEtBTUEyanJsQ2Z0eEtKZkZnMWtZYkVMangwajZucjh2?= =?utf-8?B?c1RaRHdOaTh0UHM2YzYxQzhoRVN3N3JZaStUditzQXcyT3FIMFdubkpsKzlO?= =?utf-8?B?dytpeXFPdWxVWS9qeDdkZVBsWFYwQ2xCS3hMYWlFSElGVzR0WGZyREdoY1J5?= =?utf-8?B?VTBHS0Nwem9LM3Y5eXpKcWNIU281RXYxdC90cUlEcDJQekJsQU5GVEZ3aDhy?= =?utf-8?B?V1hIbElreksrbEhRMzBUWk5QZUptRmYzbXNjYXQ0MWpLMWZhNWZCWDF4L083?= =?utf-8?B?QS91cm1RbkRqU2xXNnFQZW9vNloyR2JVUXp5RWRQcVl6MHRUV1hEU2RtZGl0?= =?utf-8?B?NWZ3aFlUK0M4NmFnOWU1eUllWHUyRFVGNG1OMnRYK2lkTkhrSG9iQUliUnU5?= =?utf-8?B?VkNGcGFnQXE4Ty9ETElsVlNxY3BtNm9ya2FNdGZOZ1d4RWwzNG9UdkZpbytH?= =?utf-8?B?K0p0SnJYMUovWGdBSi9GUktoR1pFNmV4dWU4dDFMR1RPdWsyeDRxSGk5ZC9Y?= =?utf-8?B?TWdpSEZ0RUdVYVNXbUovS2lGVy9DNmwxeXJuNk8rL3pqTUpibWVhaXdzd0x5?= =?utf-8?B?YUtrMkgwc3lEWDF4eU1WMElTendKMHNUUklHMTdBZU1ZVkZMaUxLeHlpeGFt?= =?utf-8?B?Yi9OYmF5cnM2RVNXT3RuVUczS0hyK1VxM0pwenpIR2crakZlUkhJQ3hsSEpw?= =?utf-8?B?UHhEaENRckVQL1ZlRURVeXk5SjA4NTQ5RjdxbGltQW1Zd2VoaUVYSEd6QTU0?= =?utf-8?B?WlBWTWpBZTlWTjlRd0lNeHRablZxT2ZyZDUwd3lDcWxrRUZQODhXZjNpTXY1?= =?utf-8?B?eWtYempLL2VhUytBRUgvUTVuRmlNUkFKQkFOMWtITEY1VkdsL2tmb3NBdWhq?= =?utf-8?B?WXg5OTB5cGJXUUwrUVVpbWhwcFdvTG9aa1E3VERVSjNYaEdXa3FXV01YWlUr?= =?utf-8?B?dE5iWUJQeWlLMXFja0ptbTVoRmpTVmxNNllaKzVFL3lNT3VvbEJHbWU1eWgz?= =?utf-8?B?YmFaSlBZRDM3YSsxTXA3ZmJudVZkS0JkZ1crM3dJbEFlaExPM3JoRFhHZUh1?= =?utf-8?B?RWZwdXRLSDBZZXU5YXJtRE9nU2RaelgrS2ZUQXVIL1c0Rk9YMUpiTE9DUUlz?= =?utf-8?B?RThsalVzLzFUcUMva2xBRFMwVDRHdDJWQ3RUb2pTM0xrT2Jpa1ZON2tTQVBR?= =?utf-8?B?WTdsTCtGMm1GUEY0bElpK1BqMjhQbmVEbDMxOHRyL3hRWGhWdHdVSnRQbUIw?= =?utf-8?B?cm5iS24xYVUrbSt3ak0xZzRUQjVDZDFxVWhhS3hsdWpnSExvZk43Z1lnMWt2?= =?utf-8?B?SCt6NW1PbFU5SmdQdEI2UGl6ZDVlUTJJQmRaNVN5SFBMbmZRb1JORzVkMlZ6?= =?utf-8?B?TGJBK1E4djRnOTB3Q3JBVFI4SzY1WWFUMXc5cnh5TktpeGtyNlFZazhLVmZ3?= =?utf-8?B?UkIzOElLb2pXNXp3TnJhRHNJbjBwVTEvcDg3c2lvVUltUkxvZTJLNkVKMmhW?= =?utf-8?B?UXpYZkhuVVlxVkpLTXkrMTh5dmVEOXptS0t4S3h5SFJGVS9lZ1QvSGNnMGRr?= =?utf-8?B?azROeDkzUDBFcWF1eGw3L0t1WkZFU1VFbVYrbzU4aEozUENQNytTM1h3eFo0?= =?utf-8?B?RDh2ZDJpYXFWZkdnL2xlZGdROUtSZ1AzSTVYR3VrVitqLzJsaFB2anJFSVVI?= =?utf-8?B?eXppV2gxR3JrOEpXbmZreGYwUjZuY1JLckI3T2pjVi80TEtoMWRUemNmRGt5?= =?utf-8?B?OUxmanVYSW95VWw1SURKTHExQ2M0OHQvRVFwZG90OEdRK0JLUDB5SmRwNVdG?= =?utf-8?B?Sk1YSy85R3Ayd25oV2dZV3FGQ1FWZXpnQTNuVE94Q29MNTJ4STUvOUtGZSta?= =?utf-8?Q?KAZCDks+0Y1NFnVMJZpzGJUX5QeG6XvtWS7LZLPW+4=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <213F62BDCE516240A761669A52786608@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5053.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 69493de3-ec50-4664-cdb4-08d9d7889041
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2022 18:06:18.4298 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3WmSSMh9hv+AwV4bZ89MNSFmtZpX1yTzTWd/DUgr2M+7mrVGr5w++wZb27eAKzeUuTB516vqnu1LNqTLqSMy8w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR11MB3261
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/GZiOvzep-P7K8STlHjUBfRJIujc>
Subject: Re: [hackathon] GNAP Interoperability Hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2022 18:06:26 -0000
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==


From nobody Fri Jan 14 10:30:17 2022
Return-Path: <jricher@mit.edu>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D97713A2EFD for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:30:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level: 
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.399, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KumRGYIfNJQn for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:30:11 -0800 (PST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 319313A2EF9 for <hackathon@ietf.org>; Fri, 14 Jan 2022 10:30:11 -0800 (PST)
Received: from smtpclient.apple (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 20EIU7u3014454 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 14 Jan 2022 13:30:07 -0500
From: Justin Richer <jricher@mit.edu>
Message-Id: <3429BAE5-515C-4D28-9FF8-1A01D3FBED41@mit.edu>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A690FE6E-E0F0-4CB4-ABC9-76C35A27B4A4"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Fri, 14 Jan 2022 13:30:07 -0500
In-Reply-To: <B47889F9-94FE-494B-85EE-DA745E47C9CC@cisco.com>
Cc: "hackathon@ietf.org" <hackathon@ietf.org>
To: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
References: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu> <B47889F9-94FE-494B-85EE-DA745E47C9CC@cisco.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/jItQyjutuAU-hmeJ_QWA9tnfGcw>
Subject: Re: [hackathon] GNAP Interoperability Hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2022 18:30:16 -0000

--Apple-Mail=_A690FE6E-E0F0-4CB4-ABC9-76C35A27B4A4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Ok, I have done this now =E2=80=94 =
https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.html =
<https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.html> =
is the core draft from the WG. This was my first time proposing a =
project for the hackathon, so apologies if I missed a few things. :)

 =E2=80=94 Justin

> On Jan 14, 2022, at 1:06 PM, Charles Eckel (eckelcu) =
<eckelcu@cisco.com> wrote:
>=20
> Hi Justin,
>=20
> Thanks for bringing this project to the Hackathon and making it the =
first project added to the wiki!
> Are there IETF drafts associated with the GNAP specification? If so, =
it would be helpful to add those to the project description in the wiki =
as well.
>=20
> Cheers,
> Charles
>=20
>> On Jan 14, 2022, at 8:42 AM, Justin Richer <jricher@mit.edu> wrote:
>>=20
>> For the IETF113 hackathon, the editors of the GNAP specification are =
proposing a project to get several different implementations of GNAP =
built and working with each other:
>>=20
>> '''GNAP: Grant Negotiation and Authorization Protocol'''
>>  * Champion(s)
>>    * Justin Richer, Aaron Parecki, Fabien Imbault
>>  * Project(s)
>>    * Build and connect implementations of GNAP across different =
platforms. We plan to have implementations of the AS, Client, and RS =
available for people to extend and use, and to deploy against with other =
components.
>>    * Interop profile for the hackathon consists of the "redirect" =
interaction start method, the "redirect" interaction finish method, and =
key proofing provided by the combination of HTTP Signatures with =
RSA-PSS-SHA512 and a Content-Digest with SHA-512 hash (for requests with =
bodies).
>>    * Other modes (user-code, push) and signature methods (JWS) will =
be partially supported by some libraries and are encouraged.
>>=20
>>=20
>>=20
>> =E2=80=94 Justin
>>=20
>> _______________________________________________
>> hackathon mailing list
>> hackathon@ietf.org
>> https://www.ietf.org/mailman/listinfo/hackathon
>> Unsubscribe: mailto:hackathon-request@ietf.org?subject=3Dunsubscribe
>=20


--Apple-Mail=_A690FE6E-E0F0-4CB4-ABC9-76C35A27B4A4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Ok, =
I have done this now =E2=80=94 <a =
href=3D"https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.h=
tml" =
class=3D"">https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-0=
8.html</a>&nbsp;is the core draft from the WG. This was my first time =
proposing a project for the hackathon, so apologies if I missed a few =
things. :)<div class=3D""><br class=3D""></div><div class=3D"">&nbsp;=E2=80=
=94 Justin<br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Jan 14, 2022, at 1:06 PM, Charles Eckel =
(eckelcu) &lt;<a href=3D"mailto:eckelcu@cisco.com" =
class=3D"">eckelcu@cisco.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hi =
Justin,<br class=3D""><br class=3D"">Thanks for bringing this project to =
the Hackathon and making it the first project added to the wiki!<br =
class=3D"">Are there IETF drafts associated with the GNAP specification? =
If so, it would be helpful to add those to the project description in =
the wiki as well.<br class=3D""><br class=3D"">Cheers,<br =
class=3D"">Charles<br class=3D""><br class=3D""><blockquote type=3D"cite" =
class=3D"">On Jan 14, 2022, at 8:42 AM, Justin Richer &lt;<a =
href=3D"mailto:jricher@mit.edu" class=3D"">jricher@mit.edu</a>&gt; =
wrote:<br class=3D""><br class=3D"">For the IETF113 hackathon, the =
editors of the GNAP specification are proposing a project to get several =
different implementations of GNAP built and working with each other:<br =
class=3D""><br class=3D"">'''GNAP: Grant Negotiation and Authorization =
Protocol'''<br class=3D""> &nbsp;* Champion(s)<br class=3D""> =
&nbsp;&nbsp;&nbsp;* Justin Richer, Aaron Parecki, Fabien Imbault<br =
class=3D""> &nbsp;* Project(s)<br class=3D""> &nbsp;&nbsp;&nbsp;* Build =
and connect implementations of GNAP across different platforms. We plan =
to have implementations of the AS, Client, and RS available for people =
to extend and use, and to deploy against with other components.<br =
class=3D""> &nbsp;&nbsp;&nbsp;* Interop profile for the hackathon =
consists of the "redirect" interaction start method, the "redirect" =
interaction finish method, and key proofing provided by the combination =
of HTTP Signatures with RSA-PSS-SHA512 and a Content-Digest with SHA-512 =
hash (for requests with bodies).<br class=3D""> &nbsp;&nbsp;&nbsp;* =
Other modes (user-code, push) and signature methods (JWS) will be =
partially supported by some libraries and are encouraged.<br =
class=3D""><br class=3D""><br class=3D""><br class=3D"">=E2=80=94 =
Justin<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">hackathon mailing list<br class=3D""><a =
href=3D"mailto:hackathon@ietf.org" class=3D"">hackathon@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/hackathon<br =
class=3D"">Unsubscribe: =
mailto:hackathon-request@ietf.org?subject=3Dunsubscribe<br =
class=3D""></blockquote><br class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_A690FE6E-E0F0-4CB4-ABC9-76C35A27B4A4--


From nobody Fri Jan 14 17:27:42 2022
Return-Path: <guest271314@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8CCB3A1B69 for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 17:27:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.847
X-Spam-Level: 
X-Spam-Status: No, score=-6.847 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Igog0gOm80n6 for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 17:27:35 -0800 (PST)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 057303A1B65 for <hackathon@ietf.org>; Fri, 14 Jan 2022 17:27:34 -0800 (PST)
Received: by mail-qt1-x835.google.com with SMTP id 14so5160184qty.2 for <hackathon@ietf.org>; Fri, 14 Jan 2022 17:27:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=k0yrcFG24jVo25w0OAEnpSDnygRy7E/kAmjcWCcJ8yE=; b=RLlgOfOO8a+7SNZPHAJyhLkj/EQCfBA2SbZFyEhVi4WY401uFCyIaJH1AWuIJiRYNt +n0df5+dETKscj94WfaLPblddKTCkNyJ3XT/xWLoxdgc0D49vq8I4DliPxvNJ/lAdxlE oxrzfvWN1zNaFfYdqm4LuokAejfGloKGsYgKIrrdkAibHbhPXHG5/HOG6WMfayj9aGD2 TiJJyZSnPgNiuBCb5pdiOYWtIzA/IRjx39ETJtTEGQD22q1KlPfE7ecIPfpRarJrAnve tUmc5t7WfpgE3xiECDB1ocVLLClxtzhaDsNugY/hgaKv9ZEIYQD9sED4WA/TnUffGyYV xaPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=k0yrcFG24jVo25w0OAEnpSDnygRy7E/kAmjcWCcJ8yE=; b=ugxuwXO2ktWWkH3B2zGP8x23CFdVzatxAZ+/MghNKlVIlzkOIPTKl8XkyHjGzJNyFl JDglQQWkq8wE1oNL3xSh8F62uM9FolCkfqOALzgb+ABbsbxa68QgivjJLBVg+0vTmUCq 4YvAFxeDihzvRO4QiEGyXKaqqE05x0Oy/mPIKxanUed3ARlYFBfLGWyJEa7mgbaLpVnI Kq+JZn3Vx8RKYQ53qobYu4Xmd5QFBOvuR5bqAl4ylrj766UxfcYOmj3Ib69K14NrK0Ay NospMJcmnXYC2rZB0IHmGwQNeimDflaH5u0Mpx6MgdvcU1Li1IuwGFZ9I0eViIlLvnTz 9HUA==
X-Gm-Message-State: AOAM532NjjzYgwvaHfJCMwTg8okyslg901fTKxTlr+5UDowq4vbOlYNC qw8FZrJxVsc7LZcq8krSaCgNSdwYR4FcI2HnfWc=
X-Google-Smtp-Source: ABdhPJyxr+KkTGiqyIDi6YvrWjbxOv46lIS4LqR7F/V1xwm9/NkQv3CXMbCtyo5Py1Mx/0cTIfSBEhRQrk1MLenNLF8=
X-Received: by 2002:ac8:7d86:: with SMTP id c6mr9824767qtd.250.1642210053111;  Fri, 14 Jan 2022 17:27:33 -0800 (PST)
MIME-Version: 1.0
References: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu> <B47889F9-94FE-494B-85EE-DA745E47C9CC@cisco.com> <3429BAE5-515C-4D28-9FF8-1A01D3FBED41@mit.edu>
In-Reply-To: <3429BAE5-515C-4D28-9FF8-1A01D3FBED41@mit.edu>
From: guest271314 <guest271314@gmail.com>
Date: Fri, 14 Jan 2022 17:27:22 -0800
Message-ID: <CA+syWAOi0PuQGTEtv9ibCD9wozrKLRUY+Zr7Ahute5=6Vx2qQQ@mail.gmail.com>
To: Justin Richer <jricher@mit.edu>
Cc: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>, "hackathon@ietf.org" <hackathon@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dcc28505d594d25d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/DFJKtqPEaeZhO8fqQQmvBi7yAAs>
Subject: Re: [hackathon] GNAP Interoperability Hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Jan 2022 01:27:40 -0000

--000000000000dcc28505d594d25d
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Interesting. Native Messaging provides similar functionality, in browser
extensions. It would be useful if that data exchange could be achieved on
any site in spite of CSP and CORS or extension code.

On Fri, Jan 14, 2022 at 10:30 AM Justin Richer <jricher@mit.edu> wrote:

> Ok, I have done this now =E2=80=94
> https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.html is
> the core draft from the WG. This was my first time proposing a project fo=
r
> the hackathon, so apologies if I missed a few things. :)
>
>  =E2=80=94 Justin
>
> On Jan 14, 2022, at 1:06 PM, Charles Eckel (eckelcu) <eckelcu@cisco.com>
> wrote:
>
> Hi Justin,
>
> Thanks for bringing this project to the Hackathon and making it the first
> project added to the wiki!
> Are there IETF drafts associated with the GNAP specification? If so, it
> would be helpful to add those to the project description in the wiki as
> well.
>
> Cheers,
> Charles
>
> On Jan 14, 2022, at 8:42 AM, Justin Richer <jricher@mit.edu> wrote:
>
> For the IETF113 hackathon, the editors of the GNAP specification are
> proposing a project to get several different implementations of GNAP buil=
t
> and working with each other:
>
> '''GNAP: Grant Negotiation and Authorization Protocol'''
>  * Champion(s)
>    * Justin Richer, Aaron Parecki, Fabien Imbault
>  * Project(s)
>    * Build and connect implementations of GNAP across different platforms=
.
> We plan to have implementations of the AS, Client, and RS available for
> people to extend and use, and to deploy against with other components.
>    * Interop profile for the hackathon consists of the "redirect"
> interaction start method, the "redirect" interaction finish method, and k=
ey
> proofing provided by the combination of HTTP Signatures with RSA-PSS-SHA5=
12
> and a Content-Digest with SHA-512 hash (for requests with bodies).
>    * Other modes (user-code, push) and signature methods (JWS) will be
> partially supported by some libraries and are encouraged.
>
>
>
> =E2=80=94 Justin
>
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon
> Unsubscribe: mailto:hackathon-request@ietf.org?subject=3Dunsubscribe
>
>
>
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon
> Unsubscribe: mailto:hackathon-request@ietf.org?subject=3Dunsubscribe
>

--000000000000dcc28505d594d25d
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Interesting. Native Messaging provides similar functionali=
ty, in browser extensions. It would be useful if that data exchange could b=
e achieved on any site in spite of CSP and CORS or extension code.</div><br=
><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, J=
an 14, 2022 at 10:30 AM Justin Richer &lt;<a href=3D"mailto:jricher@mit.edu=
">jricher@mit.edu</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex"><div style=3D"overflow-wrap: break-word;">Ok, I have done =
this now =E2=80=94 <a href=3D"https://www.ietf.org/archive/id/draft-ietf-gn=
ap-core-protocol-08.html" target=3D"_blank">https://www.ietf.org/archive/id=
/draft-ietf-gnap-core-protocol-08.html</a>=C2=A0is the core draft from the =
WG. This was my first time proposing a project for the hackathon, so apolog=
ies if I missed a few things. :)<div><br></div><div>=C2=A0=E2=80=94 Justin<=
br><div><br><blockquote type=3D"cite"><div>On Jan 14, 2022, at 1:06 PM, Cha=
rles Eckel (eckelcu) &lt;<a href=3D"mailto:eckelcu@cisco.com" target=3D"_bl=
ank">eckelcu@cisco.com</a>&gt; wrote:</div><br><div><div>Hi Justin,<br><br>=
Thanks for bringing this project to the Hackathon and making it the first p=
roject added to the wiki!<br>Are there IETF drafts associated with the GNAP=
 specification? If so, it would be helpful to add those to the project desc=
ription in the wiki as well.<br><br>Cheers,<br>Charles<br><br><blockquote t=
ype=3D"cite">On Jan 14, 2022, at 8:42 AM, Justin Richer &lt;<a href=3D"mail=
to:jricher@mit.edu" target=3D"_blank">jricher@mit.edu</a>&gt; wrote:<br><br=
>For the IETF113 hackathon, the editors of the GNAP specification are propo=
sing a project to get several different implementations of GNAP built and w=
orking with each other:<br><br>&#39;&#39;&#39;GNAP: Grant Negotiation and A=
uthorization Protocol&#39;&#39;&#39;<br> =C2=A0* Champion(s)<br> =C2=A0=C2=
=A0=C2=A0* Justin Richer, Aaron Parecki, Fabien Imbault<br> =C2=A0* Project=
(s)<br> =C2=A0=C2=A0=C2=A0* Build and connect implementations of GNAP acros=
s different platforms. We plan to have implementations of the AS, Client, a=
nd RS available for people to extend and use, and to deploy against with ot=
her components.<br> =C2=A0=C2=A0=C2=A0* Interop profile for the hackathon c=
onsists of the &quot;redirect&quot; interaction start method, the &quot;red=
irect&quot; interaction finish method, and key proofing provided by the com=
bination of HTTP Signatures with RSA-PSS-SHA512 and a Content-Digest with S=
HA-512 hash (for requests with bodies).<br> =C2=A0=C2=A0=C2=A0* Other modes=
 (user-code, push) and signature methods (JWS) will be partially supported =
by some libraries and are encouraged.<br><br><br><br>=E2=80=94 Justin<br><b=
r>_______________________________________________<br>hackathon mailing list=
<br><a href=3D"mailto:hackathon@ietf.org" target=3D"_blank">hackathon@ietf.=
org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/hackathon" targ=
et=3D"_blank">https://www.ietf.org/mailman/listinfo/hackathon</a><br>Unsubs=
cribe: mailto:<a href=3D"mailto:hackathon-request@ietf.org" target=3D"_blan=
k">hackathon-request@ietf.org</a>?subject=3Dunsubscribe<br></blockquote><br=
></div></div></blockquote></div><br></div></div>___________________________=
____________________<br>
hackathon mailing list<br>
<a href=3D"mailto:hackathon@ietf.org" target=3D"_blank">hackathon@ietf.org<=
/a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/hackathon" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/listinfo/hackathon</a><b=
r>
Unsubscribe: mailto:<a href=3D"mailto:hackathon-request@ietf.org" target=3D=
"_blank">hackathon-request@ietf.org</a>?subject=3Dunsubscribe<br>
</blockquote></div>

--000000000000dcc28505d594d25d--

