- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Tue, 15 Sep 2020 17:00:38 +0000
- To: public-webauthn@w3.org
- Message-Id: <E1kIEJq-0004AY-Fr@uranus.w3.org>
Issues
------
* w3c/webauthn (+0/-2/💬10)
2 issues received 10 new comments:
- #1477 need "how to install bikeshed in one's local webauthn repo clone" instructions (1 by equalsJeffH)
https://github.com/w3c/webauthn/issues/1477 [type:process]
- #1457 New platform authenticators are making discoverable credentials regardless of residentKey=false passed to Create() (9 by arianvp, equalsJeffH, sbweeden)
https://github.com/w3c/webauthn/issues/1457 [stat:Discuss] [type:technical]
2 issues closed:
- The risk of attacker may can identify whether if the account support FIDO or not https://github.com/w3c/webauthn/issues/1475 [stat:pr-open] [type:editorial]
- Virtual authenticator support for extensions https://github.com/w3c/webauthn/issues/1471 [stat:pr-open] [type:technical]
Pull requests
-------------
* w3c/webauthn (+2/-3/💬6)
2 pull requests submitted:
- Add note about fixed/empty user handles (by agl)
https://github.com/w3c/webauthn/pull/1483
- Remove the Psuedo-Random Function extension (by jcjones)
https://github.com/w3c/webauthn/pull/1481
5 pull requests received 6 new comments:
- #1483 Add note about fixed/empty user handles (2 by agl, lgarron)
https://github.com/w3c/webauthn/pull/1483
- #1480 Add security consideration on detecting non-WebAuthn accounts (1 by equalsJeffH)
https://github.com/w3c/webauthn/pull/1480 [subtype:RP-impl-cons] [type:editorial]
- #1476 Update "feature policy" refs to new name "permissions policy" (#1473) (1 by jcayzac)
https://github.com/w3c/webauthn/pull/1476 [type:editorial]
- #1474 Abstracting the concept of Privacy CA/Attestation CA into Anonymization CA (1 by equalsJeffH)
https://github.com/w3c/webauthn/pull/1474 [subtype:attestation] [type:editorial]
- #1470 Make largeBlobs explicit during create. (1 by agl)
https://github.com/w3c/webauthn/pull/1470 [type:editorial] [type:technical]
3 pull requests merged:
- Add security consideration on detecting non-WebAuthn accounts
https://github.com/w3c/webauthn/pull/1480 [subtype:RP-impl-cons] [type:editorial]
- Update .spec-data .bikeshed-include cache
https://github.com/w3c/webauthn/pull/1479 [type:process]
- Virtual authenticators extension support
https://github.com/w3c/webauthn/pull/1472 [subtype:FeatureProposal] [type:technical]
Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webauthn
--
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Tuesday, 15 September 2020 17:00:40 UTC