[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
I am appalled! All humans must adapt to the consent plans of this small standards group! I for one do not plan to adapt - sorry about that! Peace ..tom jones On Thu, Dec 26, 2024 at 4:15 PM David Waite wrote: > > > > On Dec 26, 2024, at 10:38 AM, Tom Jones > wrote: > >

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
So - what trust infrastructure "needs to exist". That's a real question that deserves a real answer. Not clear who has the smarts and authority to do that. Peace ..tom jones On Thu, Dec 26, 2024 at 10:08 AM Pierce Gorman wrote: > What mechanism(s) are you referring to that

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
This problem was clearly demonstrated by the California mDL hackathon where the default presentation was ALL DATA. That is the easiest path, so it remains the one most taken. We have known since standards were first introduced that they immediately create a drive to the bottom. This will be the fat

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
binding to the holder. That would be a good thing - but the only way I know involves trusting the telco - which we all know is a dead end. What other mechanism can bind the holder to the device w/o the telco (or do we just nationalize the telcos again.) Peace ..tom jones On Tue, Dec 24, 2024 at

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
if by ID you mean ID number - then it is a tracking number. Isn't it super obvious - why are we pretending to be privacy enabling? Peace ..tom jones On Tue, Dec 24, 2024 at 10:15 AM Wayne Chang wrote: > Tom, how do you feel about private sector issued ID? > > Best, > Wayn

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
don't release the ID number. Peace ..tom jones On Tue, Dec 24, 2024 at 6:34 AM Watson Ladd wrote: > I see that people are uncomfortable with making any mandates, and so I've > tried to be purely descriptive in this proposal. I leave it to the WG to > decide where to put it, but

[OAUTH-WG] Re: SD-JWT linkability

2024-12-17 Thread Tom Jones
in OID4VP. In that case the selective disclosure will be irrelevant as the means to disclose the selection will be inadequate. So the SD-JWT may well technically work, but the first use will be fraudulent as the selection will not be by informed user consent. Peace ..tom jones On Tue, Dec 17, 2

[OAUTH-WG] Re: SD-JWT linkability

2024-12-17 Thread Tom Jones
> for one purpose to the police for another? This would legally not work > > > > *Von:* Tom Jones > *Gesendet:* Dienstag, 17. Dezember 2024 02:26 > *An:* Pierce Gorman > *Cc:* pe...@acm.org; IETF oauth WG > *Betreff:* [OAUTH-WG] Re: SD-JWT linkability > > > &

[OAUTH-WG] Re: SD-JWT linkability

2024-12-16 Thread Tom Jones
not be used for other purposes without the person's consent. Clearly information holders can do what they want with their own data. Peace ..tom jones On Mon, Dec 16, 2024 at 11:22 AM Pierce Gorman wrote: > I think I disagree. I assume an SD-JWT in a VP could be volunteered by a

[OAUTH-WG] Re: SD-JWT linkability

2024-12-16 Thread Tom Jones
admirable, but there are no UX people involved in the discussion. Peace ..tom jones On Wed, Dec 11, 2024 at 5:01 PM Watson Ladd wrote: > Dear all, > > I'd like to propose the following edit to resolve the concerns I have > around endorsing dangerous applications of SD-JWT: &g

Re: [blink-dev] Intent to Ship: Web Authentication API: PublicKeyCredential’s getClientCapabilities() method

2024-12-14 Thread Tom Jones
I worry about fingerprinting as well and would like to see it called out specifically. thx ..Tom (mobile) On Wed, Nov 20, 2024, 9:14 AM Alex Russell wrote: > Is there additional fingerprinting risk here? I'm happy to see this move > forward even if there is, but we should call it out. > > On Tu

git: f132be9bac5f - main - netgraph: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=f132be9bac5f29e844e8dde4f3a70f4c3c158221 commit f132be9bac5f29e844e8dde4f3a70f4c3c158221 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:31:58 + Commit: Tom Jones CommitDate: 2024-12-06 09:31

git: f132be9bac5f - main - netgraph: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=f132be9bac5f29e844e8dde4f3a70f4c3c158221 commit f132be9bac5f29e844e8dde4f3a70f4c3c158221 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:31:58 + Commit: Tom Jones CommitDate: 2024-12-06 09:31

git: cb21fa3d0d26 - main - ppp: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=cb21fa3d0d2640a6f48a21c406cac9dd07681052 commit cb21fa3d0d2640a6f48a21c406cac9dd07681052 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:22:51 + Commit: Tom Jones CommitDate: 2024-12-06 09:22

git: cb21fa3d0d26 - main - ppp: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=cb21fa3d0d2640a6f48a21c406cac9dd07681052 commit cb21fa3d0d2640a6f48a21c406cac9dd07681052 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:22:51 + Commit: Tom Jones CommitDate: 2024-12-06 09:22

git: ef18594985c0 - main - natd: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=ef18594985c0d569650b44b0ba0171a6fd8703a5 commit ef18594985c0d569650b44b0ba0171a6fd8703a5 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:21:06 + Commit: Tom Jones CommitDate: 2024-12-06 09:21

git: ef18594985c0 - main - natd: Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=ef18594985c0d569650b44b0ba0171a6fd8703a5 commit ef18594985c0d569650b44b0ba0171a6fd8703a5 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:21:06 + Commit: Tom Jones CommitDate: 2024-12-06 09:21

git: b6c90b909905 - main - ipfw : Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=b6c90b909905a48c6f8ad027ff259e64d5d0e762 commit b6c90b909905a48c6f8ad027ff259e64d5d0e762 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:17:34 + Commit: Tom Jones CommitDate: 2024-12-06 09:18

git: b6c90b909905 - main - ipfw : Enable support for EIM NAT

2024-12-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=b6c90b909905a48c6f8ad027ff259e64d5d0e762 commit b6c90b909905a48c6f8ad027ff259e64d5d0e762 Author: Damjan Jovanovic AuthorDate: 2024-12-06 09:17:34 + Commit: Tom Jones CommitDate: 2024-12-06 09:18

git: 61bf830cbb26 - main - libalias: Add support for EIM NAT

2024-12-05 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=61bf830cbb260c2a046cb44421d319184393e028 commit 61bf830cbb260c2a046cb44421d319184393e028 Author: Damjan Jovanovic AuthorDate: 2024-12-05 16:19:13 + Commit: Tom Jones CommitDate: 2024-12-05 16:19

git: 61bf830cbb26 - main - libalias: Add support for EIM NAT

2024-12-05 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=61bf830cbb260c2a046cb44421d319184393e028 commit 61bf830cbb260c2a046cb44421d319184393e028 Author: Damjan Jovanovic AuthorDate: 2024-12-05 16:19:13 + Commit: Tom Jones CommitDate: 2024-12-05 16:19

FreeBSD Network Status Report for Week 48 2024

2024-11-29 Thread Tom Jones
Hi hackers, I have written a 10th Network status report, you can find it here: https://adventurist.me/posts/00337 And all previous posts are collected at this url: https://adventurist.me/tag/networkstatus One thing we would like to know is how people are coming across these reports. Is it from

FreeBSD Network Status Report for Week 48 2024

2024-11-29 Thread Tom Jones
Hi hackers, I have written a 10th Network status report, you can find it here: https://adventurist.me/posts/00337 And all previous posts are collected at this url: https://adventurist.me/tag/networkstatus One thing we would like to know is how people are coming across these reports. Is it from

Network Status Report Week 45 2024

2024-11-08 Thread Tom Jones
Hi, I have written a 7th Network Status Report, which you can find here: https://adventurist.me/posts/00333 All prior reports are here: https://adventurist.me/tag/networkstatus https://adventurist.me/fbsd-networkstatus.xml Please let me know by email if you find any of the typos I have hidden t

Network Status Report Week 45 2024

2024-11-08 Thread Tom Jones
Hi, I have written a 7th Network Status Report, which you can find here: https://adventurist.me/posts/00333 All prior reports are here: https://adventurist.me/tag/networkstatus https://adventurist.me/fbsd-networkstatus.xml Please let me know by email if you find any of the typos I have hidden t

Goings on in the Network Stack

2024-10-11 Thread Tom Jones
Hi folks, For the past three weeks on a Friday I have been writing some commentary on what has been happening in the FreeBSD Network Stack. The commentary is primarily based on main branch commits, but also includes some other stuff from the community I gather via mailing lists, phab reviews and b

Goings on in the Network Stack

2024-10-11 Thread Tom Jones
Hi folks, For the past three weeks on a Friday I have been writing some commentary on what has been happening in the FreeBSD Network Stack. The commentary is primarily based on main branch commits, but also includes some other stuff from the community I gather via mailing lists, phab reviews and b

git: 99adbd1b3f3b - main - gpioc: Fix handling of priv data during open

2024-09-26 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=99adbd1b3f3b2c198a8994c9681655978a7d9a1f commit 99adbd1b3f3b2c198a8994c9681655978a7d9a1f Author: Tom Jones AuthorDate: 2024-09-26 09:13:41 + Commit: Tom Jones CommitDate: 2024-09-26 09:16:17

git: 99adbd1b3f3b - main - gpioc: Fix handling of priv data during open

2024-09-26 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=99adbd1b3f3b2c198a8994c9681655978a7d9a1f commit 99adbd1b3f3b2c198a8994c9681655978a7d9a1f Author: Tom Jones AuthorDate: 2024-09-26 09:13:41 + Commit: Tom Jones CommitDate: 2024-09-26 09:16:17

[OAUTH-WG] Re: SD-JWT and Unlinkability

2024-09-21 Thread Tom Jones
that doesn't answer the question about users randomly selecting some to store and some to reject. This seems to me like user private information. As is most of the feedback to the issuer from the wallet. Peace ..tom jones On Sat, Sep 21, 2024 at 7:30 AM Daniel Fett wrote: > Hi Dick, &

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-18 Thread Tom Jones
As I tried to make clear in an earlier post - there is no such thing as a TLS cert. Various attributes MUST be included in TLS certs and that combination is well known and easy to request. thx ..Tom (mobile) On Wed, Sep 18, 2024, 12:44 PM Michael Jones wrote: > Hi Richard, > > > > We clearly ha

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-17 Thread Tom Jones
es of the PKI for the actual purpose of the key and cert. Peace ..tom jones On Tue, Sep 17, 2024 at 1:01 PM Vladimir Dzhuvinov wrote: > I frankly don't see how the central premise of PIKA - the reliance on a > TLS web domain certificate - can be made to work in practice. > > >

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-16 Thread Tom Jones
now. Peace ..tom jones On Mon, Sep 16, 2024 at 12:56 PM Michael Jones wrote: > I regret to have to report that the issues that I believe resulted in the > first call for adoption failing, despite being discussed on-list and at > IETF 120, have not been addressed in the specification >

git: 855c3dacfc6a - main - imx clk: Skip reconfiguring the clock if we don't have a new best_parent

2024-09-16 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=855c3dacfc6a1565a75086e64a154dece3ccf5fa commit 855c3dacfc6a1565a75086e64a154dece3ccf5fa Author: Tom Jones AuthorDate: 2024-09-16 14:43:31 + Commit: Tom Jones CommitDate: 2024-09-16 14:45:26

git: 855c3dacfc6a - main - imx clk: Skip reconfiguring the clock if we don't have a new best_parent

2024-09-16 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=855c3dacfc6a1565a75086e64a154dece3ccf5fa commit 855c3dacfc6a1565a75086e64a154dece3ccf5fa Author: Tom Jones AuthorDate: 2024-09-16 14:43:31 + Commit: Tom Jones CommitDate: 2024-09-16 14:45:26

git: 40d0f179a8a9 - main - imx8mp: Add clock tree

2024-09-13 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=40d0f179a8a9900ccfe37a04495aee783387809b commit 40d0f179a8a9900ccfe37a04495aee783387809b Author: Tom Jones AuthorDate: 2024-09-13 08:18:55 + Commit: Tom Jones CommitDate: 2024-09-13 08:18:55

git: 40d0f179a8a9 - main - imx8mp: Add clock tree

2024-09-13 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=40d0f179a8a9900ccfe37a04495aee783387809b commit 40d0f179a8a9900ccfe37a04495aee783387809b Author: Tom Jones AuthorDate: 2024-09-13 08:18:55 + Commit: Tom Jones CommitDate: 2024-09-13 08:18:55

git: be9fefafc280 - main - imx_ccm: Rearrange clock control module driver

2024-09-13 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=be9fefafc2801ef449a0f3205c9397ba35425323 commit be9fefafc2801ef449a0f3205c9397ba35425323 Author: Tom Jones AuthorDate: 2024-09-11 12:51:10 + Commit: Tom Jones CommitDate: 2024-09-13 08:15:19

git: be9fefafc280 - main - imx_ccm: Rearrange clock control module driver

2024-09-13 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=be9fefafc2801ef449a0f3205c9397ba35425323 commit be9fefafc2801ef449a0f3205c9397ba35425323 Author: Tom Jones AuthorDate: 2024-09-11 12:51:10 + Commit: Tom Jones CommitDate: 2024-09-13 08:15:19

Re: [blink-dev] Intent to Prototype: Rewriter API

2024-09-12 Thread Tom Jones
yes there is a misunderstanding - i got the idea that the website's api could ask for the AI model it wanted - that would be a disaster. What does the website's API specifical have access to? I was about to ask the W3C security guy to take a look at this. Peace ..tom jones On Thu, Se

Re: [blink-dev] Intent to Prototype: Rewriter API

2024-09-11 Thread Tom Jones
they found one that would give access to my stuff. This is nuts. Please stop it now. Peace ..tom jones On Thu, Aug 22, 2024 at 5:05 PM Domenic Denicola wrote: > > > On Fri, Aug 23, 2024 at 2:45 AM Tom Jones > wrote: > >> It seems to me that the security and privacy r

git: e1b1984abb8b - main - pfctl: Add endpoint-independent test to the list of tests

2024-09-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=e1b1984abb8b673d43082660a5ae740741f85df6 commit e1b1984abb8b673d43082660a5ae740741f85df6 Author: Tom Jones AuthorDate: 2024-09-06 13:06:57 + Commit: Tom Jones CommitDate: 2024-09-06 13:09:12

git: e1b1984abb8b - main - pfctl: Add endpoint-independent test to the list of tests

2024-09-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=e1b1984abb8b673d43082660a5ae740741f85df6 commit e1b1984abb8b673d43082660a5ae740741f85df6 Author: Tom Jones AuthorDate: 2024-09-06 13:06:57 + Commit: Tom Jones CommitDate: 2024-09-06 13:09:12

git: 390dc369efaa - main - pf: Add support for endpoint independent NAT bindings for UDP

2024-09-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=390dc369efaaeca2802baf168ddbd7a40e3afcc8 commit 390dc369efaaeca2802baf168ddbd7a40e3afcc8 Author: Tom Jones AuthorDate: 2024-09-06 11:59:09 + Commit: Tom Jones CommitDate: 2024-09-06 12:48:04

git: 390dc369efaa - main - pf: Add support for endpoint independent NAT bindings for UDP

2024-09-06 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=390dc369efaaeca2802baf168ddbd7a40e3afcc8 commit 390dc369efaaeca2802baf168ddbd7a40e3afcc8 Author: Tom Jones AuthorDate: 2024-09-06 11:59:09 + Commit: Tom Jones CommitDate: 2024-09-06 12:48:04

git: d8fffc3704a0 - main - imx_gpio: Add gpio compat string for imx8 SOCs

2024-09-05 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=d8fffc3704a0d7f4ea5b866f689e58480ddebaa1 commit d8fffc3704a0d7f4ea5b866f689e58480ddebaa1 Author: Tom Jones AuthorDate: 2024-09-04 15:32:56 + Commit: Tom Jones CommitDate: 2024-09-05 13:51:37

git: d8fffc3704a0 - main - imx_gpio: Add gpio compat string for imx8 SOCs

2024-09-05 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=d8fffc3704a0d7f4ea5b866f689e58480ddebaa1 commit d8fffc3704a0d7f4ea5b866f689e58480ddebaa1 Author: Tom Jones AuthorDate: 2024-09-04 15:32:56 + Commit: Tom Jones CommitDate: 2024-09-05 13:51:37

Re: USBasp no longer works with FreeBSD 14.1 / avrdude 7.3

2024-08-29 Thread Tom Jones
Can you create a bug to track this and assign it to me (thj@) ? I see the same error with a chv32 programmer, but as a regression it is more important to track down than new hardware being weird. On Mon, Aug 19, 2024, at 19:23, Axel Rau wrote: > Hi, > > Once a year, I flash some ATtinys. > For

Re: [blink-dev] Intent to Prototype: Rewriter API

2024-08-22 Thread Tom Jones
It seems to me that the security and privacy risks in this proposal are gigantic. Cross site scripting attacks have been difficult to block and now the suggestion is to allow some AI, which may change from day to day to insert attacks. Peace ..tom jones On Wed, Aug 21, 2024 at 11:28 PM Domenic

[OAUTH-WG] Re: oauth-selective-disclosure-jwt Pull 451 is insufficient

2024-08-22 Thread Tom Jones
I completely agree that education of users is not an answer to any security question. Be the change you want to see in the world ..tom On Thu, Aug 22, 2024 at 10:08 AM Watson Ladd wrote: > Hello, > > I would like to point out that the issuer verifier problem still > remains open, even given th

FreeBSD VPP Port

2024-08-12 Thread Tom Jones
Hi Folks, Thanks to help from jrm@ since the end of last week VPP is now available as a FreeBSD port. https://cgit.freebsd.org/ports/commit/?id=8ac9dd794c8fafcd763dc541c13790bcc23699b3 The port is based on VPP 2024.06 with some minor changes to enable DPDK on FreeBSD. >From a FreeBSD system i

[OAUTH-WG] Re: We cannot trust Issuers

2024-07-31 Thread Tom Jones
There are many cases of verifiers colliding with issuers. Police recording all traffic stops looking for patters of abuse. One time time and similar use restrictions on tokens. Patterns of use that indicate fraud or abuse of financial or tracking by third parties. Password or vendor relations apps.

[Acme] Re: [Rats] Re: Re: [EXTERNAL] Re: Explaining the "PKIX Evidence" draft,

2024-07-25 Thread Tom Jones
Why aren't we talking about going to DANE instead? thx ..Tom (mobile) On Thu, Jul 25, 2024, 3:34 PM Matthew McPherrin wrote: > My primary concern with "moving beyond the CSR" is that it's a defacto > standard which is widely supported today, so we should make sure that (at > least for the most

[OAUTH-WG] Re: Call for adoption - PIKA

2024-07-03 Thread Tom Jones
I have opposed channel-binding or token-binding from the beginning as they serve very different puppies and typically fall under different management within large enterprises. I have tried to push for a simple way to test the validity of a signature for decades into the future as that is typical fo

[OAUTH-WG] Re: Security Bug | Unintended usage of "state" parameter can lead to Header Injection Attacks

2024-07-01 Thread Tom Jones
I am utterly appalled by this statement " opaque value, OAuth implementors usually don't sanitize the value." No web site should ever use any data from the user's device without full validation as it is *completely untrustworthy*. Treating this head value differently than any other header value is

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-12 Thread Tom Jones
> >>>>> TLS is not removed, we use X.509 based pki on the web, therefore also >>>>> using federation. >>>>> >>>>> TLS is used to establish confidentiality with an endpoint, >>>>> establishing trust to a subject only because it c

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Tom Jones
This whole problem did not need to happen. When the federation spec was being created I asked them not to deviate unnecessarily from pki. But the very guys that are on this thread told me that they were not a pki and so there was no reason for them to follow existing rules. This is entirely a probl

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
Question - how does all this interact with the password manager? Can the RP ask if they have an entry in the PM first? Or is that too much of a privacy issue? Also when calling for an app, wouldn't it matter if the app were web vs native? Which one does this thread discuss? ..tom On Tue, May 21,

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
/1n7HobJ6QTsNld5rn1uuIiNw0A__L44ug/edit?usp=sharing&ouid=109794657323597753486&rtpof=true&sd=true ..tom On Thu, May 9, 2024 at 10:01 AM Sam Goto wrote: > > > On Thu, May 9, 2024 at 9:07 AM Tom Jones > wrote: > >> Has anyone considered what information the RP verif

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
Has anyone considered what information the RP verifier should supply for FedCM to function well on the behalf of both the verifier and the user? thx ..Tom (mobile) On Thu, May 9, 2024, 8:06 AM Dick Hardt wrote: > The NASCAR problem is rooted in the RP does not know which provider(s) the > user

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-11 Thread Tom Jones
Right. Google treats email as a guid for user name. Any old guid should work. thx ..Tom (mobile) On Sat, May 11, 2024, 3:22 PM Dick Hardt wrote: > > > On Wed, May 8, 2024 at 4:07 PM Sam Goto > wrote: > >> That's easier to answer: the browser needs name/email/picture to >> construct an account

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-08 Thread Tom Jones
Y'all are missing another option. (re Sam's Comments) The user is given a user agent to use on their own device when accessing enterprise data. I know of two that are shipping today. https://www.getprimary.com/ Now it is possible to access other sites with these browsers as well - in fact they spec

Re: [PATCH] freebsd: Add support for multiple dpdk instances on FreeBSD

2024-05-07 Thread Tom Jones
>> on testing this out the biggest gap I see is that we need a documentation >> update for it. In V3 can you please update the FreeBSD GSG doc with some >> details about how to use this feature. >> >> Also, on first run using testpmd, the application failed to start, as I was >> missing a file

Re: [PATCH] freebsd: Add support for multiple dpdk instances on FreeBSD

2024-05-03 Thread Tom Jones
you think is best. Sorry for the patch confusion, I'll try to keep the sequence obvious going forward. Tom On Fri, May 3, 2024, at 14:03, Bruce Richardson wrote: > On Fri, May 03, 2024 at 09:46:15AM +, Tom Jones wrote: >> Add support to the contigmem module on FreeBSD for mul

[PATCH] freebsd: Add support for multiple dpdk instances on FreeBSD

2024-05-03 Thread Tom Jones
Add support to the contigmem module on FreeBSD for multiple concurrent files, this enables running multiple dpdk instances with the nic_uio driver. Add relevant parts in dpdk to support this. Signed-off-by: Tom Jones --- config/rte_config.h | 2 + kernel/freebsd/contigmem

[PATCH] freebsd: Add support for multiple dpdk instances on FreeBSD

2024-05-02 Thread Tom Jones
Add support to the contigmem module on FreeBSD for multiple concurrent files, this enables running multiple dpdk instances with the nic_uio driver. Add relevant parts in dpdk to support this. Signed-off-by: Tom Jones --- config/rte_config.h | 2 + kernel/freebsd/contigmem

Re: serial/ulscom: response timeout using pySerial/esptool.py

2024-04-25 Thread Tom Jones
Can you isolate out the extraneous stuff and loop tx and rx on a CP2101 board and send bytes through? I did a bunch of development on an esp8266 board in the last few weeks and had no issues, but I’ve no idea if it were the same usb serial chip. I’ll have a dig around and see if I have someth

[EVDL] NEMA 14-50 Receptacles for EVSE, EV Charging

2024-04-14 Thread Tom Jones via EV
available, and the rework was more than I could handle. So, if you have any suggestions, that would be great. Thanks, Tom Jones ___ Address messages to ev@lists.evdl.org No other addresses in TO and CC fields HELP: http://www.evdl.org/help/

Re: [blink-dev] Intent to Prototype: Document-Isolation-Policy

2024-04-08 Thread Tom Jones
There is a huge demand for protecting data that's shared with users Any help in strong binding data to origin and blocking sharing would a big win. thx ..Tom (mobile) On Mon, Apr 8, 2024, 1:20 AM Yoav Weiss (@Shopify) wrote: > This is very interesting! > > Do I understand correctly and the mai

Re: [OAUTH-WG] [SPICE] SPICE Revocation

2024-04-06 Thread Tom Jones
There is a huge hole here. Revocation of (for example) driving privileges should not impact the use of the cred for other purposes. The revocation idea can lead to cancelation of the person. Some that violates the fundamental rights of human beings. Revocation is basically discrimination. thx ..To

Re: [OAUTH-WG] Type Metadata for SD-JWT VC

2024-04-03 Thread Tom Jones
So now we are proposing types of types of types of data elements. I feel really bad about this as I introduced the first semantic tag into EDI back in the 1980s. I can't believe it has come to this. I can't believe that anyone imagines giving this sort of specification to different programmers and

Re: vnet with interfaces

2024-03-28 Thread Tom Jones
On Tue, Mar 26, 2024, at 18:31, Benoit Chesneau wrote: > How does work VNET with interfaces? Is this as efficient as using pci > passtrough in a vm ? Overhead should be minimal, while the device is logically missing from the default vnet there isn't any more "in the way" for actual usage. Ma

git: 73fdbfb91121 - main - netmap: Address errors on memory free in netmap_generic

2024-03-26 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=73fdbfb911215795c55c89870ebc5d9197bf2a23 commit 73fdbfb911215795c55c89870ebc5d9197bf2a23 Author: Tom Jones AuthorDate: 2024-03-26 09:52:07 + Commit: Tom Jones CommitDate: 2024-03-26 09:55:55

git: 73fdbfb91121 - main - netmap: Address errors on memory free in netmap_generic

2024-03-26 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=73fdbfb911215795c55c89870ebc5d9197bf2a23 commit 73fdbfb911215795c55c89870ebc5d9197bf2a23 Author: Tom Jones AuthorDate: 2024-03-26 09:52:07 + Commit: Tom Jones CommitDate: 2024-03-26 09:55:55

Re: [PATCH] net/vmxnet3: Don't enable rx queue interrupts on FreeBSD

2024-03-21 Thread Tom Jones
On Thu, Mar 21, 2024, at 10:15, David Marchand wrote: > Hello Tom, > > On Thu, Mar 21, 2024 at 11:00 AM Tom Jones wrote: >> >> Commit 29a1c9107bb disabled interrupts on FreeBSD for the vmxnet3 driver >> as they are not supported. Rx queue interrupts were missed by th

[PATCH] net/vmxnet3: Don't enable rx queue interrupts on FreeBSD

2024-03-21 Thread Tom Jones
Fixes: 40d5676ff1ea ("net/vmxnet3: fix initialization on FreeBSD") Cc: sta...@dpdk.org Signed-off-by: Tom Jones --- drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c b/drivers/net/vmxnet3/vmxnet3_ethdev.c i

[PATCH] net/vmxnet3: Don't enable rx queue interrupts on FreeBSD

2024-03-21 Thread Tom Jones
ff-by: Tom Jones --- drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c b/drivers/net/vmxnet3/vmxnet3_ethdev.c index 2707b25148..ce7c347254 100644 --- a/drivers/net/vmxnet3/vmxnet3_ethdev.c +++ b/drivers/net/vm

[PATCH] net/vmxnet3: Don't enable rx queue interrupts on FreeBSD

2024-03-21 Thread Tom Jones
ff-by: Tom Jones --- drivers/net/vmxnet3/vmxnet3_ethdev.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/vmxnet3/vmxnet3_ethdev.c b/drivers/net/vmxnet3/vmxnet3_ethdev.c index 2707b25148..8b12967fa2 100644 --- a/drivers/net/vmxnet3/vmxnet3_ethdev.c +++ b/drivers/net/vm

git: 3db693f7da8a - main - pf: Correct SPDX identifier

2024-02-23 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9 commit 3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9 Author: Tom Jones AuthorDate: 2024-02-23 15:58:38 + Commit: Tom Jones CommitDate: 2024-02-23 15:58:38

git: 3db693f7da8a - main - pf: Correct SPDX identifier

2024-02-23 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9 commit 3db693f7da8a1aaf0a8887e7791ebb5d67c7a2d9 Author: Tom Jones AuthorDate: 2024-02-23 15:58:38 + Commit: Tom Jones CommitDate: 2024-02-23 15:58:38

git: b9870ba93ea9 - main - pf: Add a TCP rdr test on IPv6

2024-02-23 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=b9870ba93ea90a12f5a5727c80f7958b17f9afcc commit b9870ba93ea90a12f5a5727c80f7958b17f9afcc Author: Tom Jones AuthorDate: 2023-10-06 13:19:31 + Commit: Tom Jones CommitDate: 2024-02-23 13:47:35

git: b9870ba93ea9 - main - pf: Add a TCP rdr test on IPv6

2024-02-23 Thread Tom Jones
The branch main has been updated by thj: URL: https://cgit.FreeBSD.org/src/commit/?id=b9870ba93ea90a12f5a5727c80f7958b17f9afcc commit b9870ba93ea90a12f5a5727c80f7958b17f9afcc Author: Tom Jones AuthorDate: 2023-10-06 13:19:31 + Commit: Tom Jones CommitDate: 2024-02-23 13:47:35

CFT: VPP on FreeBSD

2024-02-12 Thread Tom Jones
Hi freebsd-net, I have been working for the last few months of porting VPP to FreeBSD and this work is now ready for very early testing. This porting work is sponsored by the FreeBSD Foundation in partnership with RG Nets. If you would like to experiment with VPP on FreeBSD then you can work fr

Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

2024-02-09 Thread Tom Jones
Not sure if techies care, but that really needs to be a four party transaction where the subject of a credential may not be the holder of the device where the credential is held. Your are thereby excluding appropriately 15% of humanity. This is, frankly, unconscionable and you must accommodate all

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-status-list-01.txt

2024-02-06 Thread Tom Jones
I think the proposal should be renamed as optimized data mining. AIs around the world will love the idea. Herd privacy is utter nonsense and has been from the beginning. On Tue, Feb 6, 2024, 5:08 AM Denis wrote: > Comments on draft-ietf-oauth-status-list-01.txt > > The text states: > > *11.* *Pr

Re: where is happening the development of vpp of freebsd?

2024-02-03 Thread Tom Jones
On Sat, Feb 3, 2024, at 20:20, Benoit Chesneau wrote: > I there any public source repository for the development of VPP on > FreeBSD? Any link to follow?  > > Benoît I’m working to upstream changes right now and plan to start a development branch early next week. - Tom

Re: [OAUTH-WG] [Technical Errata Reported] RFC7591 (7782)

2024-01-26 Thread Tom Jones
The whole thing is pointless as the client owner (as opposed to the subject for which client status is requested) can just define the instances to be the same. There can be no way to attest to the validity of such an assertion. thx ..Tom (mobile) On Fri, Jan 26, 2024, 10:42 AM Justin Richer wrot

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-23 Thread Tom Jones
gt; required. > > Key binding is basically the secured version of a W3C VP, but restricted > to a single credential, instead of multiple credentials. > > Key binding is not required afaik. > > Therefore presentation can be forwarded / reused. > > OS > > On Tue, Jan

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-22 Thread Tom Jones
't process VCs, their > computers do. (Hence the terminology of User Agent, not user, in the > W3C) > > > > On Sun, Jan 21, 2024 at 4:46 PM Tom Jones > wrote: > > > > I should have added - if you get a verifiable presentation from a wallet > with a verifi

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
it is far from complete. https://tcwiki.azurewebsites.net/index.php?title=Verifiable_Presentation#Full_Text_or_Meme ..tom On Sun, Jan 21, 2024 at 1:03 PM Tom Jones wrote: > Technically oauth is about authorization not authentication. And > technically attestation is provided by rats a

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
; Best > > Don > > And for the record I am not a technologist. I am a person who tries to > solve business problems. > > > > On 2024-01-21 11:08, Tom Jones wrote: > > yes - i see that's what you are doing and think it is not only wrong, but > misleading. &g

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
texts. . (like proof -> a cryptographic ability that is verifiable) Perhaps you don't care that these are incorrect uses of the word? ..tom On Fri, Jan 19, 2024 at 10:46 AM wrote: > You present evidence as proof. > > > On 2024-01-19 12:50, Tom Jones wrote: > > > Proo

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-19 Thread Tom Jones
Proof seems to be yet another term for which we already have other terms. Can anyone explain the difference between: proof presentation evidence. ..tom On Fri, Jan 19, 2024 at 4:28 AM Denis wrote: > Hi Giuseppe, > > Ciao Denis, > > Thank you! By points. > > First, I still have a vocabulary pro

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-18 Thread Tom Jones
al carries the > status.status_attestation object this is the element that gives to the RP > the hint to looks in the vp_tokens for the status attestation. > > and they all lived happily ever after, please help me find some problem > > > -- > *Da:*

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-18 Thread Tom Jones
The big problem is that standards bodies all over the spectrum are creating attestations without even bothering to see what is happening in other communities. The verifier will have many attestations to choose from and will thus choose to do nothing with any of them. Perhaps it is time to ask a ver

Re: [OAUTH-WG] [Errata Rejected] RFC7519 (5648)

2024-01-11 Thread Tom Jones
Pronounce jwt as tho it were a Welsh word. It comes out close. More like joot thx ..Tom (mobile) On Thu, Jan 11, 2024, 6:53 PM RFC Errata System wrote: > The following errata report has been rejected for RFC7519, > "JSON Web Token (JWT)". > > -- > You may re

Re: [OAUTH-WG] Request to add a profile parameter to +jwt and +sd-jwt

2023-11-28 Thread Tom Jones
JWT > > Secevents or a JWT credential might define parameterization. For example, > a credential might describe itself as having particular types/profiles of > claims about a subject, such as being usable as a driving license and as a > primary government-issued identification. > >

Re: [OAUTH-WG] Request to add a profile parameter to +jwt and +sd-jwt

2023-11-28 Thread Tom Jones
I agree with Mike. This exercise seems to add confusion rather than clarity. thx ..Tom (mobile) On Tue, Nov 28, 2023, 10:05 AM Michael Jones wrote: > Orie, you wrote: > > > > TLDR; TallTed believes that the convention in the JWT BCP is not correct: > > https://datatracker.ietf.org/doc/html/rfc8

Re: [OAUTH-WG] [External Sender] Call for adoption - Identity Chaining

2023-11-14 Thread Tom Jones
This sounds like an attempt to re-enable 3rd party cookies. Are you seriously considering allowing access to a user's camera from one client to another w/o user consent? This is the sort of stuff that gives the web a bad name! ..tom On Tue, Nov 14, 2023 at 10:20 AM Atul Tulshibagwale wrote: > I

Re: [blink-dev] Re: Intent to Prototype: Web environment integrity API

2023-11-02 Thread Tom Jones
I appreciate the problems and am disappointed that the project was abandoned. I come from a different space, the Open Wallet Foundation, where a very similar problem is evolving (see the IETF RATS efforts as an example). In my view the problem is that the client should not need to trust the server

  1   2   3   4   5   6   7   8   9   10   >