00:02:52 jkmathes has joined #IDBrowser 00:04:33 wbaker has joined #idbrowser 00:06:17 steve_schultze has joined #idbrowser 00:11:01 q+ dirk 00:11:22 zolli has joined #idbrowser 00:11:37 yoiwa has joined #idbrowser 00:11:44 josephboyle has joined #idbrowser 00:12:23 mark has joined #idbrowser 00:13:52 tlr has joined #idbrowser 00:14:02 thanks scribe for fixing the perms 00:14:32 meeting: W3C workshop on Identity in the Browser 00:14:34 rrsagent, make minutes 00:14:34 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html tlr 00:16:03 yes, in my opinion we should introduce because it does incrementally improve a number of aspects of *exiting* browser login / password functionality 00:16:06 nico has joined #idbrowser 00:16:49 you could use by itself for URL-based login systems such as OpenID or RelMeAuth 00:16:52 current discussion: labeling of form fields for credential capture (when the password manager learns creds) and credential presentation (when the pw mgr fills creds in) 00:17:33 q+ tlr 00:17:38 q+ john 00:17:42 and you could use it with for traditional login (the browser could convert email addresses to mailto: URLs in an 00:17:42 ack dirk 00:17:58 q+ paul 00:18:11 q+ a1 00:18:48 "we dont want to assume the browser is in the TCB because it's susceptible to malware" 00:19:00 btw - I prefer over because already exists in HTML5 (i.e. that bikeshed fight has already been fought - so let's just re-use the existing pattern/decision) 00:19:01 (who's the speaker?) 00:19:31 fine, then those sites that don't want to assume the browser can simply not use those types 00:19:36 q+ adams 00:19:55 "if you're relying on something that can be easily compromised, that causes more harm than good" 00:20:00 (speaker?) 00:20:19 falls back to in browsers that don't support it, which is pretty much exactly what you want 00:20:19 Dan Schutzer, FSTC/BITS 00:20:37 hober, exactly 00:20:40 thanks 00:21:14 "to prevent fraud we need end-to-end security" 00:21:41 ack tlr 00:22:02 that was Dominique (sp?) 00:22:13 Speaker from Bank of America, Dominique Nguyen 00:22:33 jimklo has joined #idbrowser 00:23:19 response: "allowing the browser to get involved in credential presentation, letting the site tell us that we must not do that... we could generate really good passwords for the user, wouldn't that be better?" 00:23:43 "you're telling your users to remember memorabe passwords, [implication: that's bad]" 00:24:21 q+ tyler 00:24:22 dan: "the concern is about the link in the chain" 00:25:03 00:25:42 "in the browser case they can tell they are using firefox..." 00:25:57 dan: "but they can't tell if they're using bank of america" 00:26:27 00:26:29 ack john 00:27:31 john linn: ""we're taking as a premise that the browser is central, so we have to trust it, so it has to be trustworthy, but it's not less vulnerable to attack" 00:28:17 dominique: if you can improve the browser, that'd be the first step 00:28:58 response: I do want to assume the browser is trusted, working hard to make it trustworthy, but it's a very valid point 00:29:37 "it's the simplest possible answer. if I carry a keyfob, that adds value, but there's a large chunk of the market where we can't do that" 00:30:28 00:31:09 q+ a2 00:31:09 00:31:46 00:32:17 so, I'm not that good a scribe :( 00:32:56 ack paukl 00:32:59 harry: if I'd told you that JavaSript would become so universal 10 years ago, you'd have said "impossible!"... 00:33:10 ack tyler 00:33:22 harry: so we can do good things that seem impossible now 00:33:59 dsinger_ has joined #idbrowser 00:34:02 00:34:24 00:34:37 00:35:02 q+ plh 00:35:04 00:35:07 ack pal 00:35:10 ack a1 00:35:16 sam: as a user I wish you would [let us] 00:35:48 <... comments about viability risk> 00:36:54 00:37:06 S/viability/liability/ 00:37:35 um, why are non-lawyers arguing/discussing liability? 00:37:47 00:38:07 tantek: because we have to to some degree? 00:38:09 appeal to meeting chairs: please rule this topic (liability) out of scope for this meeting 00:38:16 tantek, tom smedinghoff is definitely a lawyer :) 00:38:20 oh ok 00:38:23 then the rest of us 00:38:30 q+ 00:38:30 00:38:47 nico - we don't have sufficient expertise to have a meaningful discussion - hence request for out-of-scoping the topic 00:38:49 00:38:50 ack plh 00:38:56 ack pal 00:38:58 ack paul 00:38:59 ack adams 00:39:33 phillip: we don't have an internet security problem, we have a bank security problem (pointing to passwords printed on credit cards :) 00:40:03 phillip: separate accounts for spending vs. money mgmt [I missed something] 00:40:32 phillip: 00:40:39 phillip said: login is different than the transaction PW 00:40:47 q+ dirk 00:40:53 q+ tom 00:40:55 ok, so restated 00:40:58 q+ a3 00:41:14 ack a2 00:42:02 brian: you mentioned intermediate steps... I think one might be to have fewer passwords, and reduce the number of servers that they must be shared with, also password verifiers, and this could be done without having to solve the federated problem 00:43:06 ack PhilHunt 00:43:25 <...> 00:43:52 00:44:44 sam: I'll be talking tomorrow, but I think that the password manager could be the granddaddy for a good ID manager; let's not throw out something that's useful today that we could make into something great tomorrow> 00:45:04 http://www.w3.org/2011/05/25-idbrowser-minutes.html still showing diagnostics not content 00:45:17 (did I understand correctly>) 00:45:22 hallambaker has joined #idbrowser 00:45:49 00:46:31 ack dirk 00:46:41 00:46:56 00:47:02 q+ nico 00:47:03 finally! real-world examples of security problems instead of handwaving! 00:47:11 password compromises come from servers, not browsers 00:47:14 e.g. Gawker, Sony 00:47:17 heh 00:47:30 ack tom 00:47:36 PHB has joined #idbrowser 00:48:10 I believe Tom crafted the legal work behind EV certs, so we have one actual lawyer in the audience. 00:48:43 00:49:41 ack a3 00:49:54 <"snopes facts" -- do we have data on hackings?> 00:51:07 00:51:27 00:51:41 q+ dan 00:52:03 ack nico 00:52:06 00:53:25 q+ bob 00:53:27 q+ a1 00:53:57 I said that server issues are mostly out of scope here... and I asked if Craig had intended to distinguish between initial and non-initial credentials (think tickets) 00:54:10 and I said that I like that distinction 00:54:36 craig: 00:55:38 dan: at iiw there was a comment made by... eric saxe? that he was more worried about people's passwords being terrible than about phishing 00:55:58 so, fixing phishing but keeping passwords may be a problem 00:56:06 s/missed it/using 2-factor authentication we could use trusted location and devices 00:56:11 s/saxe?/sachs 00:56:27 q+ a4 00:56:32 ack dan 00:56:33 00:56:43 ack bob 00:57:03 bob, sam: well, there's the lying endpoint problem 00:57:12 hartmans has joined #idbrowser 00:57:31 bob: the servers could make statements about what kinds of practices they want from the clients, that could be useful 00:57:59 00:58:18 ack a1 00:59:02 ack a4 00:59:11 , 00:59:29 a1 speaker is David Chadwick, University of Kent, UK 00:59:38 00:59:39 fjh has joined #idbrowser 00:59:49 (TPMs??) 01:00:02 q+ nico 01:00:05 q+ plh 01:00:09 01:00:18 01:00:58 so, yes, TPMs 01:01:16 q+ brian 01:01:16 Speaker was Mark Watson, Netflix 01:01:17 01:01:53 harry: surprising consensus about password managers 01:02:25 ack nico 01:02:27 ack plh 01:03:23 01:03:41 (I think that was a comment in relation to the privacy considerations regarding TPMs) 01:03:44 q+ tlr 01:03:57 q+ dan 01:04:00 01:04:11 q+ sam 01:04:14 01:04:52 ack brian 01:04:59 jimklo_ has joined #idbrowser 01:05:04 sam: don't see how to do that without violating privacy; also, go to an underround electronics sop sometime, see the counterfeits 01:05:24 ack dan 01:05:24 01:05:25 ack sam 01:05:43 q- 01:05:44 dan: 01:06:10 01:06:19 s/missed it, sorry/fingerprinting does have legitimate uses sometimes 01:06:28 craig: it's more complicated for users to deal with hardware IDs 01:06:38 scribe: thanks 01:06:53 I'm missing this too 01:07:06 Can get to a pretty solid proof that the browser visiting the site NOW is the same as the browser that visited a month ago 01:08:19 bob: basically, it's hard to manage all these IDs, and it's a big DB, and maybe you don't manage it well, and you could lose your users stuff, and so device IDs is hard to deploy 01:09:02 harry: asking about crypto APIs 01:09:12 so, a hum 01:10:10 andersR: access to credential stores is critical element 01:10:27 nico1 has joined #idbrowser 01:10:38 phb: frameworks are a way to avoid making choices. standards are about making choices. 01:10:48 crocker: discuss more tomorrow 01:11:01 ??: framework gives choice of what mechanism to use 01:11:09 ?? is Nico 01:11:16 s/??/Nico/ 01:11:39 y 01:11:53 harry: so more on this tomorrow 01:12:01 tlr: sounds like we need to flesh out scope of api discussion tomorrow 01:12:04 harry: attaching ID to session states (?) 01:12:08 incognito mode 01:12:18 is this something that's of interest to people 01:12:22 identity attached to session state / login/logout functionality 01:12:36 sam: useful, but not necessarily in scope 01:12:52 01:13:11 harry: I just remember ppl mentioning multiple personane 01:13:14 ... 01:13:42 comments about lack of competitiveness regarding incognito mode 01:15:09 dan: nothing prevents users from using pw managers 01:15:30 reply: well, stock browsers don't let you 01:15:35 for bank creds 01:15:49 01:16:25 01:16:54 harry: asking about consensus regarding the annotations concept 01:17:44 01:18:33 01:18:45 01:19:07 01:19:33 (basically making the cookie a derivative credentials) 01:19:50 phl: 01:20:07 hannes: 01:20:28 bob: that's of a piece with my comment about labeling session IDs 01:20:29 what was the specific RFC for suggested labels? 01:20:33 does anyone know it? 01:20:44 or could the person who spoke with Hixie please dig it up from their email etc. and post it? 01:20:55 tantek: it was said to be 3127 01:21:18 I'm falling behind on scribing 01:21:33 Hixie's argument is sound. Re-inventing a previously failed standard is not a rational path unless you can point out key reasons for failure that your re-invention is specifically addressing. 01:21:38 harry: agenda for tomorrow 01:21:55 I thought "3127" was said like an example of an RFC #, not the actual #. 01:22:08 tantek: I thought so too 01:22:17 root around for it? 01:22:30 harry: we might want to re-bake the agenda 01:23:18 who was the Google person that claimed he spoke with "Ian Hixie" [sic] 01:23:20 ? 01:23:27 perhaps we can ask him for the specific RFC # 01:23:33 I'd like to track this down 01:23:54 RFC 3127 is "Authentication, Authorization, and Accounting: Protocol Evaluation" (Informational) 01:34:49 rrsagent, make minutes 01:34:49 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html karen 01:36:39 nico1 has left #idbrowser 01:38:10 Harry: we don't have complete agreement 01:38:23 ...but have more proposals for scope; would like to have that list...10 proposals 01:38:42 .Speaker: I did not get the sense...third party; token use 01:38:50 Harry: It was brought up several times; we can revisit that 01:38:59 ...discussion went away from that; like mobile discussion 01:39:08 TLR: We have room for that in the Beyond the Browser session 01:39:17 Speaker: talking about that as opposed to tokens 01:39:22 TLR: Use case will bring it up 01:39:31 Bob: Bring up browser support for IP discovery 01:39:36 ...hoping that may be in 01:39:40 ...and other concrete suggestions 01:39:50 Harry: I think it rather naturally comes into it today 01:39:54 ...Dinner at Shivas 01:40:04 800 California Street, #100 01:40:17 Buffet dinner starts at 7:00pm 01:40:25 Trent: Please pick up your trash 01:40:33 Meeting adjourned 01:40:37 rrsagent, make minutes 01:40:37 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html karen 01:40:56 yoiwa has left #idbrowser 01:41:45 karen has left #idbrowser 01:47:36 AndroUser2 has joined #idbrowser 03:20:04 Zakim has left #idbrowser 03:41:01 hartmans has joined #idbrowser 04:02:36 lowenthal has joined #idbrowser 04:27:07 Vladimir has joined #idbrowser 04:41:09 bblfish has joined #idbrowser 05:03:45 hhalpin has joined #idbrowser 05:21:46 mixedpuppy has joined #idbrowser 16:17:14 RRSAgent has joined #idbrowser 16:17:14 logging to http://www.w3.org/2011/05/25-idbrowser-irc 16:17:29 ...is problem about too many passwords; or not at all; too weak 16:17:33 PHB has joined #idbrowser 16:17:35 ...everyone will have different POVs 16:17:44 ...no stopping; how do we know when online identity is solved 16:17:49 ,..it's not a check-mate end 16:18:02 ...related to that, solutions are not true or false; something is better than another 16:18:10 ...cannot have a proof for sovling online identity 16:18:25 tyler has joined #idbrowser 16:18:25 ...maybe say something about crypto 16:18:25 ...but the overall thing is fuzzier 16:18:26 http://en.wikipedia.org/wiki/Wicked_problem 16:18:30 ...Next problem is that there is not an immediate test of what will happen 16:18:38 ...everything has unfortunate side effects 16:18:44 ...If we roll out @@auth 16:18:52 ...could push into malware and have other repercussions 16:18:58 Anyone got a link to the Workshop wiki handy? 16:19:00 ...Cannot look into future or rewind the past 16:19:07 ...Everything happens in the real world as we speak 16:19:26 ...If you screw up privacy like Google did, it's challengin 16:19:42 ...You get damaged by this if you screw up; you lose credibility 16:19:50 ...It's not like science where you can celebrate failure 16:19:54 ...In real life, it's bad 16:20:00 ...If passport failed for Microsoft 16:20:17 ...some people wrote it off, so they were blackballed 16:20:24 ...You cannot sit down and choose six different things 16:20:33 ...We have seen a dozen things already in this Workshop 16:20:50 ...In science you want to say you have a set of techniques, such as building a bridge 16:20:56 ...but this space is essentially different 16:21:07 ...Identity on the Web is not like identity in the real world; no real person's face 16:21:16 ...Not like identity in Internet with one admin domain 16:21:22 ...what worked here won't work there 16:21:34 ...reasons for failure are over-determined 16:21:49 hodges has joined #idbrowser 16:21:51 ...Did infocard fail due to user experience; too complex a mental model; don't know 16:21:54 ...cannot rewind the past 16:21:58 ...All I wanted to do 16:22:03 ...really interesting framework 16:22:08 ...I'll put up references 16:22:23 ...Some white papers you can read 16:22:32 fjh has joined #idbrowser 16:22:37 ...They have some frameworks for how to address problems to build shared understanding 16:22:44 ...And most important, capture that somewhere 16:22:51 ...So next time you can pick up from where you left off 16:22:56 ...and not recreate all the past conversations 16:23:15 ...So for today, think about what I said here; we all have different stakes, viewpoints, backgrounds 16:23:25 ...Be careful when you say the problem is not x it's y 16:23:32 ...their assumptions and values are different 16:23:36 ...Other obvious anecdote 16:23:43 ...Think about the rules for passports 16:23:51 s/passports/passwords 16:23:55 ...Think about how you pick it 16:24:10 ...All these security experts thought different approaches would work to select them 16:24:19 ...No consensus, but all defensible positions 16:24:25 ...So important to have this context 16:24:36 Q: Any data to back up assertions 16:24:41 A: no 16:24:41 tantek has joined #idbrowser 16:24:56 Harry: let's hold questions until end of session 16:25:04 that was me that asked "Did any of them have data to support their assertions?" 16:25:10 answer was "no" 16:25:21 so there will be some way to recover these irc logs ? 16:25:33 Next Speaker: Philipp Hollam Baker, Comodo 16:25:42 Topic: Simulation & Design for Deployment 16:25:47 (in reference to the room full of Google security experts all recommending different ways to make "good" (strong) passwords) 16:26:11 Problem is how do you get that problem deployed; Internet has 20 billion users 16:26:29 I think that was 2 billion 16:26:30 ...how I deal with this problem is I design simulations 16:26:42 ...and identify which audiences need to address protocol 16:26:52 ...and I simulate; use stuff from control system world 16:26:59 ...can use software or even Excel 16:27:04 ...Do need to test assumptions 16:27:09 ...If you think viral marketing will take off 16:27:19 ...if you are talking viral or network effect, you are fooling yourself 16:27:25 ...Chicken and egg problem 16:27:32 ...getting to critical mass is really hard 16:27:40 ...Simply having Microsoft say it won't work 16:27:46 ...some things will kill your proposal 16:27:53 ...One is deployment deadlock 16:28:00 ...If servers do this or that 16:28:08 wbaker has joined #idbrowser 16:28:12 ...stopped working when Web had a million users 16:28:13 bblfish_ has joined #idbrowser 16:28:22 ...Digest authentication was proposed seven days after basic 16:28:32 ...Basic was deployed and enmeshed in Web six days after it was proposed 16:28:44 ...I proposed digest on next day and it took five years to get into browsers 16:28:46 fjh_ has joined #idbrowser 16:28:51 ...Once something works well, it's hard to replace 16:29:07 ...Getting to web sites 16:29:17 yoiwa has joined #idbrowser 16:29:18 ...I won't use your identity scheme if it does save time 16:29:31 ...Users are aware of razor and blades model 16:29:47 ...Unlike other workshops, I am seeing technology proposals not business proposals 16:30:03 ...First proposal is to put the account manager in the cloud 16:30:14 ...we can do it securely and user never needs to know what is going on 16:30:22 ...can get access; can support legacy browsers 16:30:30 ...Why start here? User can do on their onw 16:30:36 ...I know companies looking at this 16:30:44 ...they don't need participation of any other party 16:30:52 ...I'm doing this to save my time, not establish a bus model 16:30:55 ...Could do in two ways 16:31:07 ...just solve this problem, make easy to store passwords in the cloud 16:31:20 ...But then write protocols to go slightly more sophisticated 16:31:32 ...allow a secure authentication mechanism 16:31:42 ...not choose too many or invent something new unless I have to 16:31:50 steve_schultze has joined #idbrowser 16:31:59 ...if I can coopt OpenID or SAML people I can do it faster 16:32:07 ...phase two builds out on phase one 16:32:17 ...Finally, this was originally proposed as phase three 16:32:23 ...putting user names and passwords in the cloud 16:32:34 ...don't put pw into password manager 16:32:42 ...Who here does not have a smart phone? 16:32:48 [one hand] 16:33:01 Philipp: Ok, so you all know you can get AUTH 16:33:14 ...congrats, you have now simulated a 1960s technology on a smart phone 16:33:23 ...this thing has a display, keyboard, voice input 16:33:26 ...could we do more? 16:33:35 ...I'm buying my phase kit off eBay 16:33:48 ...so instead of typing passcode, would be nice to have been asked 16:33:51 ...I mentioned voice 16:33:55 ...for applications that demand it 16:34:09 ...Take a picture of person taking purchase; put in a pin number 16:34:18 ...we could have voice recognition or voice recog biometrics 16:34:22 ...We have a really powerful toool 16:34:29 ...This could start to deploy now in the enterprise 16:34:41 ...i looked up $20 per year for one-time password tokens 16:34:55 ...This requires no software; can be done quickly and enterprises can adopt unilaterally 16:34:57 ...thank you 16:35:49 Harry: up next is Sam Hartman from Painless Security 16:36:03 ...I would like to talk about the value of the browser in supporitng identity management 16:36:09 bkihara has joined #idbrowser 16:36:13 ...and in supporting the kinds of things that Phil 16:36:21 ...making things easier to deploy so we get innovation 16:36:23 ...to start off 16:36:33 ...One of things to realize is things platform can do 16:36:39 ...you cannot write Java Script 16:36:46 ...platform mediates cross application and site information 16:36:54 ...yesterday Bob talked about the identity selection problem 16:37:07 ...When he was talking he said it is hard for service providers to drive the selection problem 16:37:20 ...The platform is in postion to know what the identities are that are broader than one site 16:37:29 ...site is in position to reasonably know about the identities 16:37:42 ...So together you can have the platform; a good understanding of what the identities are 16:37:57 ...better position to ask user who they want to be today versus a site asking it the possibilities 16:38:14 ...Another thing the platform can be in a position to do 16:38:35 ...some sites can manage iphones to traditional desktops 16:38:44 ...can be in enterprise or individuals 16:38:45 AndroUser has joined #idbrowser 16:38:49 jimklo has joined #idbrowser 16:38:51 dveditz has joined #idbrowser 16:38:53 ...platform can enforce policy that is broader 16:39:03 ...Also platform can cross identity beyond justthe web browser 16:39:09 ...ID not just in some app 16:39:13 ...used in some web resources 16:39:17 ...you need the platform's involvement 16:39:23 ...as we discussed yesterday 16:39:38 ...there are cases where the browser is used less, particularly the mobile environment 16:39:44 ...Cannot just treat as a web id problem 16:39:48 ...finally something the platform can do 16:39:52 ...that can enable security 16:39:59 ...Something that one of first presentations talked about 16:40:02 ...channel bindings 16:40:10 ...is about tying two security relationships together 16:40:21 ...Can allow you to have an association with some web site 16:40:30 ...and can confirm even the certificate has changed 16:40:36 steve_schultze has joined #idbrowser 16:40:39 ...Also valuable in device authentification 16:40:47 ...if user has inserted himself into device 16:40:53 ...could break some use cases 16:41:13 ...the platform could tie these sorts of identification together 16:41:20 ...Would be nice to pick one like OpenID 16:41:24 ...but we cannot just pick one 16:41:26 Vladimir_ has joined #idbrowser 16:41:28 jimklo_ has joined #idbrowser 16:41:31 ...Different organizations... 16:41:43 ...If you tell me I have to change from one thing to something else 16:41:48 ...why is that in my best interest? 16:41:52 fjh_ has joined #idbrowser 16:41:57 ....Lots of properties to these identity management systems 16:42:06 ...attempt to consume lots of identities 16:42:21 ...Some aspects are part of system and a critical part of using 16:42:21 it 16:42:27 ...like Kerberos using it 16:42:34 bkihara_ has joined #idbrowser 16:42:37 ...things based on URIs versus naming things based on other approaches 16:42:48 ...and sometimes those differences are important to people 16:42:53 ...if we don't have a way to dispose 16:43:06 ...and force all identity management to be the same, we will defeat choice of using them 16:43:17 ...ont he other hand, important 16:43:24 jtrentadams has joined #idbrowser 16:43:25 ...not to have to know ... 16:43:37 ...permit only when you need to take advantage of the special properties 16:43:48 ..I come from identity management background outside of the Web 16:43:52 ...a lot of things going on there 16:43:57 bkihara_ has joined #idbrowser 16:44:10 ...I think that we have a real opportunity for a convergence of these approaches with what is going on the Web 16:44:14 dpranke has joined #idbrowser 16:44:21 ...the best identity management story we have seen is cases where there is a real decoupling from the application 16:44:41 ...plug in new security mechanism, or deployment and mechanism will work within new environment without being aware of it 16:44:51 ...Major desktop systems have this such as Microsoft 16:45:00 ...Take a look of hosted services on Windows Live 16:45:08 ...where they inveneted a new service 16:45:22 ...They were not previously aware 16:45:34 ...At IETF we are working on things 16:45:44 ...A single way of looking at Open IDE, OAUTH, SAML, Kerberos and public key 16:45:59 ...the application won't get any of those the same, but can delve into detail 16:46:08 ...and take advantage of specifics of the mechanism if necessary 16:46:23 ...also at IETF, project Moonshot is looking at how to create an identity management mechanism 16:46:28 ...uses SAML to look at things 16:46:38 ...intended to work well in a federated environment 16:46:47 ...address privacy issues we are talking about 16:47:07 ...address mechanisms that are highly integrated into platform 16:47:22 ...Basically, what I am proposing to look at 16:47:33 ...is an approach where the application and platform can both contribute 16:47:44 ...application can take advantage of identity coming from that 16:47:57 ...and can provide set of mechanisms; can inject an identity into the system 16:48:03 ...not about solving users typing id into system 16:48:10 ...about enabling credentials in future 16:48:14 ...that are not passwords 16:48:17 ...Final recommendation 16:48:24 ...more detail from previous slide 16:48:28 ...Ok 16:48:45 Harry: We are going to begin discussion on Platform issue for ten minutes 16:48:55 ...then continue with Device discussion and then take a break 16:49:19 CarlH: Identity really is a wicked problem 16:49:19 q+ 16:49:28 ...I think it will require inconsistency robustness 16:49:32 Zakim has joined #idbrowser 16:49:34 q+ 16:49:34 ...cannot be algorithmic solution 16:49:41 ...like credit cards, do you pass this charge or not? 16:49:49 ...evidence for or against and make the decision 16:49:59 ...if it is a wicked problem, this is where you need to go 16:50:02 ...may be onlly thing to do the job 16:50:07 ? Comment on ??? 16:50:19 ...Smartphone, you don't use browser, just native apps 16:50:31 ...does not mean browser should not handle identity 16:50:34 ...there is trust 16:50:42 ...could be done relatively easily 16:50:46 ...like OpenID a mechanism 16:50:58 ...think of bringing app into smartphone 16:51:08 ...you redirect to identity provider and redirects using a custom URI 16:51:14 ...what is missing is the first leg 16:51:21 ...what it means for first app to redirect 16:51:26 ...when you have direct access to begin with 16:51:35 ...maybe that is something the browser providers should think about 16:51:39 what makes a browser "trusted"? 16:51:42 Sam: I agree that use pattern could be supported 16:51:51 ...i want to see a way to invoke that pattern 16:52:08 zolli has joined #idbrowser 16:52:13 JeffH: I just wanted to support notion of identity spams far outside this thing called the browser 16:52:25 ...many of apps on smartphones are browsers...mobile code 16:52:34 ...that environment is getting married to the platform 16:52:41 ...agree we need to think about this more holistically 16:52:48 Q? you may not trust that 16:52:53 JeffH: that is a big problme 16:52:58 Nico: I want to echo that there are 16:53:05 ...browser apps and HTTP applications 16:53:13 ...dapper and that sort of thing 16:53:19 ...Browser apps use HTTP 16:53:31 JeffH: there are protocols in wide use beyond HTTP 16:53:48 Q: another approach is to use standardized mechanisms out to the platform 16:53:52 ...such as what Microsoft has done 16:53:56 ...with identification 16:54:01 ...beyond multifactor things 16:54:13 ...browser can react in more robust way; and can you channel that back 16:54:20 ...browser can still be the locus 16:54:36 Sam: that's great if I trust the browser or if I have an identity for which it's the locus 16:54:42 ...but in enterprise that does not make sense 16:54:51 ...If I am an unintended app, the browser is wrong place for it 16:55:02 ...as a human, the browser is wrong choice for my ID locus 16:55:12 ...you have described an important use pattern 16:55:22 ...but many different approches, as Dirk described 16:55:28 Ben Adida: one point Phil made 16:55:41 ...it's not just crypto 16:55:44 ...hate to bring up SONY; when you concetrate a lot of data into the cloud. 16:55:48 ...can be more complicated 16:55:55 PhilHB:decide what you can accept 16:56:04 ...such as accepting, storing credit card data 16:56:09 ...and whether to store in unencrypted 16:56:24 ...I just had my credit card suspended from Michael's retailer because it was hacked 16:56:33 Harry: we will close the queue now 16:56:47 Speaker is Direck Balfanz, Google 16:56:47 bkihara_ has joined #idbrowser 16:56:54 Dirk: I want to do a demo 16:57:06 ...so thanks, Sam, a lot of what you said will be a great introduction 16:57:12 ...to what I will talk about on Android 16:57:20 ...how we are using it on installed apps as well as browser 16:57:25 ...and talk about how to do this more generally 16:57:35 ...So what does the account manager on Android do? 16:57:49 ...so the way it works is you write plug-ins called authenticators 16:58:02 ...app users an API to say I want a ? complete to talk to some service provider 16:58:15 ...which of these plug-ins and what account installed on device this token should be fo 16:58:23 ...plug-in does magic and returns to server 16:58:29 ...so plug-ins store user credentials 16:58:32 ...let me show you 16:58:36 ...here is an Android device 16:58:45 ...and so the account manager here as a bit of a UI 16:58:56 ...two accounts currently installed on this device and I can add more 16:58:59 ...add a Google account 16:59:05 ...I can say take me to a browser 16:59:15 ...let me use a more complicated login procedure at Google 16:59:20 steve_schultze has joined #idbrowser 16:59:37 ...this in an account that has OpenID turned on, so I get redirected to Yahoo! 16:59:54 ...You could imagine other things like two-factor id, or log-in challenges that complicate things 17:00:38 [checking network] 17:00:42 ...Let's try again 17:00:55 rrsagent, make minutes 17:00:55 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html karen 17:01:05 @karen -- u doing valiant yeoman's work there :) 17:01:07 ...I can readwrite to Yahoo 17:01:33 ...So what you will hopefully see, is an installed app AUTH flow 17:01:45 ...could have been something more complicated like a two-factor authentification 17:01:54 ...device gets an AUTH token for this account 17:01:59 ...so now a third 17:02:08 ...installing on account manager and seeing what is there 17:02:17 ...store account credentials, don't have to see it again 17:02:24 ...type into phone and don't have to do it again 17:02:33 ...uses an API for the accoutn manager which remembers your passwrod 17:02:36 ...takes care of rest 17:02:44 ...no need for app to take care of ? 17:02:52 ...one of APIs it provides 17:02:58 ...apps can show you this list of accounts 17:03:07 ...installed lists, some confusions 17:03:11 ...link with same accoutns 17:03:17 ...So what an app typically does 17:03:25 ...it calls the account manager to ask what is installed 17:03:28 ...then you pick account 17:03:39 ...after you choose, use the acc't manager and talks to server side 17:03:42 ...What we did in Honecomb 17:03:49 ...we added acc't manager to device 17:03:56 ...here is browser, I am not logged in yet 17:04:08 ...I want to log into my Picasa Web account 17:04:14 ...so now at Google log-in page 17:04:22 ...the browser slid in that butter bar 17:04:28 ...use that to log in 17:04:38 ...now logged into my Picasa account 17:04:48 ...you notice what happened is the log-in page was still there 17:04:51 ...I could log in manually 17:04:55 ,..but it offered me the choice 17:05:04 ...Also works with relying parties 17:05:33 ...they way this works 17:05:47 ...is that the server sends a header that says I support logins with google account 17:06:01 ...openID relying party can also use header 17:06:01 ...using my account manager 17:06:07 ...get taken to OpenID approval page on Google 17:06:17 ...being a relying party, the site could have asked for my id, photo 17:06:26 ...my address book; so appropriate to show an approval page 17:06:34 ...shows OpenID back to the relying party 17:06:37 ...using the account manager 17:06:45 ...two more slides 17:07:01 ...plug-ins run their own proprietary protocols 17:07:18 ...one acc't manager you don't have to write prop. protocols, but could do in a standardized way 17:07:24 ...uses OAuth to install acccounts 17:07:36 ...one, standardize ways to get credentials into account manager 17:07:54 ...second thing we need is a standardized way to use that credential, that OAUTh token 17:08:02 ...to access something, it's downscoping 17:08:05 ...go to service provider 17:08:10 ...to hand to the app 17:08:15 ...third thing I demonstrated 17:08:26 ...one of tokens is not standard OAuth is URL 17:08:30 ..and it logs in the user 17:08:35 ...one-time use 17:08:42 ...that magic token makes the user get logged in 17:08:50 ...hit and get back in return a URL 17:08:54 ...will log in the user 17:09:00 ...Google has such a URL 17:09:09 ...other have them, too, so we could standardize on those 17:09:12 ...no crypto 17:09:24 ...not standardize how I authenticate to my ID 17:09:32 ...browser used standard mark-up 17:09:40 ...just need standardized way for OAuth token 17:10:08 ...Once I hit that login URL, I can hit it @@ 17:10:20 ...Yesterday we talked about special cookies, I don't think we need those 17:10:34 Harry: I like the "do need to standardize and don't need to" list 17:10:42 Sam: you don't need to standardize X for your use case 17:10:49 ...great to innumerate for each use case 17:11:06 ...but annoying when you say we don't need to standardize at all, because there are more than one use case 17:11:09 Harry: goog point 17:11:12 s/goog/good 17:11:26 BenA: for that web login URL, do envision some special header 17:11:39 ...so it's coming from more than redirecting? Coming from outside browser? 17:11:47 Dirk: If any random web site 17:12:07 ...saying I support Google logins, and if not relying party, browser will redirect to Google 17:12:11 ...and I won't see it 17:12:15 BenA: I'll take it offline 17:12:21 Q: when Google ? to Yahoo 17:12:25 ...is Google aware of it? 17:12:37 DirK: no, fires off an OAuth flow 17:12:42 ...I need to log in a user 17:12:51 ...if OpenID, I need to redirect to Yahoo 17:13:23 Harry: closed queue, now prsenting is Mark Watson, Netflix 17:13:42 Mark Watson: also joining me is Mitch Zollinger, the real security expert 17:13:49 ...Provider a user perspective today 17:14:05 ...When it comes to device authentification, some things not possible 17:14:41 ... if you define a browser as an id environment, and we (netflix) ship browsers to all sorts of devices 17:14:46 ... you just don't see the chrome 17:14:56 ... what does secure actually mean 17:15:07 ... our service and a bunch of others rely on guarantees of device behavior 17:15:11 ... this is not a normal part of the web 17:15:21 ... this makes sure we install a reputable browser 17:15:33 ...examples are HD content 17:15:43 ...not just our requirement of our service 17:15:49 ...Other areas are financial services data 17:15:57 ...that is out of scope of right now 17:16:07 ...Could imagine other examples such as electronic medical records 17:16:14 ...haven't thought a lot, but there are others 17:16:26 ...how do we determine if device has properties to get the proper content 17:16:36 ...We have restrictions on the number of devices per account 17:16:42 ...that is a business decision we took 17:17:05 ...What do we mean by device authentification, staying at requirements level 17:17:05 lowenthal has joined #idbrowser 17:17:16 ...One, we need to id the type of device accessing the service 17:17:30 ...we don't care if YouTube sees different identifiers for that device 17:17:43 ...we use it to make authorization decisions and to restrict access 17:17:53 ...we need to tell what properties the device has 17:18:12 ...may come from some software, which is weaker and does not provide guarantees 17:18:23 ...We need to determine the security properties 17:18:28 ...could be done with software or hardware 17:18:41 ...Strength of identity is implicit in the identity itself 17:18:54 ...for example, we have a trusted relationship with a device manufacturer 17:18:59 ...and can make decisions 17:19:00 ...privacy 17:19:13 ...device identifier is personally identifiable information 17:19:18 AndroUser2 has joined #idbrowser 17:19:21 AndroUser2 has joined #idbrowser 17:19:26 ...You need some type of user consent to give out to a given destination 17:19:37 ,,maybe dialogue boxes with certification is not best way 17:19:52 ...services need to be secure to users satisfaction 17:19:55 Vladimir_ has joined #idbrowser 17:20:04 ...that user is going to right .com 17:20:17 ...We are not saying these are "the" requirements; they are our requirements 17:20:17 fjh has joined #idbrowser 17:20:21 ...not trying to generalize 17:20:24 ...we need input from others 17:20:33 ...that could be universally applicable 17:20:49 ...Java Script APIs for service device authentication is one possible approach 17:20:55 jimklo has joined #idbrowser 17:20:57 ...First, possiblity to derive a temporary key 17:21:08 ...those temp keys should not be visible to Java Script code 17:21:19 ...should be secure to whatever level...of the platform device 17:21:23 ...Build whatever protocols you want 17:21:26 ...to make them secure 17:21:40 ...There are some services not possible today on the Web platform 17:21:48 ...secure device authentification is one 17:21:58 ...on browser side others interested in working on this 17:22:05 Harry: Let's go next to Intel presentation 17:22:15 ...then Q&A and then go to a shorter break 17:22:20 are the slides online somewhere? 17:22:50 Speaker is Jack Matheson, Intel's application and security products group 17:23:00 Jack: this is a new area whe just christoned 17:23:07 ...mostly talking about platform problems 17:23:12 ...that is my interest and it is important 17:23:26 ...First I would like to acknowledge the notion of trust in this relationship 17:23:35 ...establish trust between you and your services 17:23:38 ...long-term support 17:23:46 @karen -- at some point pls announce to group -- perhaps write on the flip chart -- how we can go access these IRC logs from ystdy & today. thanks! 17:23:59 ...Trust is predicated on user and their device 17:24:08 ...Problem here is a lot of things 17:24:19 ...think of device ids, hardware state or testing it 17:24:26 ...talking about a trusted third party to verify it 17:24:29 ...that's a big problem 17:24:35 ...not just in enterprise but also consumer 17:24:39 ...More philosophically 17:24:47 ...it's a problem because a device is owned by a user 17:24:56 ...not user centric but network centric 17:25:04 ...need a tie between the platform and the privacy of the user 17:25:13 ...that is not nec. solved by attestation 17:25:18 ...you can ping me later about hat 17:25:25 ...mostly stating problems today 17:25:33 ...Leads to second problem 17:25:43 ...if you want mass adoption, you need platform that gets to masses 17:25:48 ...why the platform is so important here 17:25:52 ...My interest in this workshop 17:26:02 ...I titled this hardware relevance 17:26:07 ...I think of browser 17:26:22 ....user agent has direct access to platform 17:26:30 ...hybrid solutions, software-device interactions 17:26:40 ...primary is low cost 17:26:46 ...If someone snaps a picture 17:26:57 ...it is very cheap to put on and it is massively adopted 17:27:03 ...everyone has a camera phone now 17:27:09 ...other things I will gloss over 17:27:16 ...Think of user-centric privacy 17:27:24 ...if a trusted third party is not user centric 17:27:35 ...and I have seen experiments of putting within device itself 17:27:50 ...Problem all of them face is that people in business of devices, hardware and platforms 17:28:03 ...no one wants to introduce legacy 17:28:04 ...solutions in platform 17:28:11 ...no one wants to support 17:28:30 ...So the problem here is that platform vendors want to support identity in a secure, user-centric way, but not in a proprietary way 17:28:34 ...closing example 17:28:36 ...TPN 17:28:45 ...way in which it got accepted is awesome 17:28:55 ...people who worked in trusted computing got together 17:29:03 ...so every laptop has a TPM chip 17:29:21 ...just the perfect example of why we need workgroups to create identity standards that are applicable to the platform 17:29:26 Harry: now go to questions 17:29:35 ...20 minutes then break 17:29:54 PHB: going back to other discussion about platforms 17:30:06 ...we have not decided about how to represent the account identifier 17:30:11 ...OpenID uses a URi 17:30:15 ...and type in.. 17:30:26 ...look on web, way we federate accounts 17:30:46 ...if we can make that decision to use that same mechanism to represent an account across SAML, and OpenID and OAUth 17:30:53 ...we could all make that play nicely and simply 17:30:57 ...and how one relates to another 17:31:07 JeffH: Phil makes a good point 17:31:11 ...a bit confused 17:31:20 ...what we people use to id ourselves in an online context 17:31:36 ...may or may not be mapped to what internally in the system is known as an account identifier under the hood 17:31:44 ...he is talking about user identifiers 17:31:48 ...we could leverage those 17:31:54 ...but not nec what gets mapped under hood 17:32:04 ...people wield multiple identifiers 17:32:17 Phil: comes to how you interpret; whether you use DNS 17:32:31 ...identify provider at xyz.com or Fred a pqr.com 17:32:40 yoiwa has joined #idbrowser 17:32:41 ...have to decide if we are going to use the DNS and nothing else 17:33:00 CarlH: In cases where customer has own equipment 17:33:10 ...it looks identity management should be in the platform 17:33:14 ...and be just another app 17:33:18 ...like Google chrome 17:33:23 ...could be standardized 17:33:31 ...to do that and have these apps work together 17:33:41 ...me having 40K apps on my iPhone that won't work together is crazy 17:33:47 ...so apps must work together on the platform 17:33:55 ...I didn't hear a revocation story from Dirk 17:34:05 Dirk: I had the step of provisioning the account 17:34:08 ...just an OAuth flow 17:34:17 ...what fell out was an OAuth 17:34:27 ...service provider can show tokens 17:34:33 Carl: could be tricky to explain 17:34:40 CraigWi has joined #idbrowser 17:34:49 Dirk: page not very good, hard to discover; I think Facebook is doing a better job 17:34:54 q+ 17:34:57 ...service provider knows the token has been issued 17:35:07 Carl: should provide a reasonable summary 17:35:25 DirK: could be a sitation to voluntarily give up token 17:35:37 Carl: How can we explain to users what they have given out and what they can take back? 17:35:44 DirK: with Android, you can uninstall 17:35:53 ...but revocation you have to do on server provider side 17:36:02 Dave: a couple things 17:36:10 ...Jeff's comment of email address, I am a big fan of that 17:36:18 from a question yesterday, the Microsoft Security Intelligence Report is at http://www.microsoft.com/security/sir/default.aspx 17:36:18 ...if you use the @ sign you apply an email address 17:36:33 ...i dno't have an obvious solution, but we need simplifying assumptions 17:36:37 ...improve usability 17:36:48 ...bigger point, there may be low hanging fruit to improve usability 17:37:03 ...to point that improving usability is worth doing 17:37:06 hhalpin has joined #idbrowser 17:37:07 ...consistency is important 17:37:15 q+ craig 17:37:18 q+ nico 17:37:18 Harry: Phil 17:37:18 ack Phil 17:37:25 q+ a2 17:37:25 ack me, that was a while ago 17:37:25 PHB: I agree with what Dave just said 17:37:35 ...I tried using ? in mark-ups 17:37:39 ack benadida 17:37:43 ...most sites require you to use an email account 17:38:00 ...If you want to aggregate more than a small number of accounts; this may not be your sole email 17:38:13 ...but it must have to have some email like properties and be used as a customer service account 17:38:16 q+ 17:38:22 Dave: it's a limiting assumption 17:38:36 Dirk: an email address should be a standard attribute because it is pervasive 17:38:46 ...I don't think it should be "the" identifier of the account 17:38:48 ack CraigWi 17:38:51 ...just an attribute 17:38:52 ack craig 17:38:53 ack Craig 17:39:04 Craig: security analysis report 17:39:10 ...acc't manager in Honeycomb 17:39:16 ...MS has a full suite of capabilities 17:39:21 ...Windows probably sends 17:39:41 ...further investments in that space, plug-in model, may be worth noting 17:39:47 ...Phil said about deployment 17:39:52 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html tlr 17:39:58 ...deployment was both fantastic opportunity and failure 17:40:04 ...we thought we could get on all machines 17:40:09 ...but was first version, not improved 17:40:19 ...with need for deployment to evolve systems 17:40:19 Brad has joined #idbrowser 17:40:23 ...we won't get it right 17:40:33 gape has joined #idbrowser 17:40:34 ...do get broad deployment and good site of timeline usability is important 17:40:46 Sam: a solutoin for some use cases is to have a compoenent of web app 17:40:52 ...a library you can grad 17:41:00 ...you have evolution points within the platform 17:41:07 ...which could give you a better story 17:41:13 ...either one can bring new features to the other 17:41:15 ack Nico 17:41:17 hannes has joined #idbrowser 17:41:18 ack Tyler 17:41:19 ack nico 17:41:22 ack tyler 17:41:22 Tyler: question for Netflix 17:41:28 ...you are user web technologies 17:42:02 Mark: we do have user interface stuff in web environment 17:42:10 ...video streaming is pretty much under covers 17:42:22 ...we could put together a proposal of a Java Scipt API requirements 17:42:33 Tyler: A strawman proposal would be good 17:42:54 Harry: yes, we really do need strawman proposals to make work move forward; for more or less every group of passcode features in scope 17:43:03 ...we are trying to determine how much of device id is in scope 17:43:04 ack a2 17:43:30 Q: Online acc't manager would also fall back to same issues as yesterday 17:43:33 ...go into form fill 17:43:35 Phil: yes and no 17:43:36 PhilWolff has joined #idbrowser 17:43:43 ...if site makes it too difficult for me, I don't use 17:43:50 ...like Huffington Post 17:43:50 PhilWolff has joined #idbrowser 17:43:56 ...I will give up if it's too difficult 17:44:08 ...yes, there are idiot web managers that want to control the user experience 17:44:16 ...and then they become unemployed 17:44:20 Q: they are still there 17:44:33 Phil: some you cannot reach; if you can get 80-90 percent in, better than zero 17:44:42 Q: we make one, I agree, but still suffer 17:44:44 ...no standard 17:45:10 Q: for Intel, from hardware platform perspective, where are the manufacturers in coming up with a standard 17:45:16 ...why not start at platform and build up 17:45:30 ...where are we? What is Intel, AMD, as an industry 17:45:38 A: No agreement what we need 17:45:51 ...people like me who approach more philosophically and the business side 17:46:07 ...no one will use Id priviledges unless there is mass adoption 17:46:23 Q: sort of schizophrenic 17:46:33 A: lots of things Intel is working on 17:46:40 Q: no standards body working on that? 17:46:48 Harry: at W3C we work on more Webby things 17:46:57 Q: For Google we talked about the "ok" button 17:47:08 who's the guy asking these good questions? 17:47:11 ...Ok comes onto screen so fast; you grant permission to get information 17:47:21 ...have you thought through usability of those who don't want to give approval? 17:47:28 Dirk: Google screens are the standard 17:47:33 ...that we implemented 17:47:46 ...whatshould go on those consent screens is an interesting problem 17:47:54 ...informed consent; versus check boxes 17:48:02 ...yes, it's an interesting problem we are looking at 17:48:10 ...but a bit orthogonal to identity in the browser 17:48:16 ...to me it seems like a trust issue 17:48:22 ...either I trust or I don't 17:48:25 ...if I trust, they are ok 17:48:43 Sam: more like I trust them or I trust them; have you ever said no? 17:48:52 Dirk: yes, I have said not 17:49:13 Q: If you install an app that asks for phone calls when you want to play a game, you still say yes 17:49:27 Dirk: I look at number of stars, who recommended it 17:49:34 Harry: Nico, Dominique 17:49:47 Nico: to comment on the Android, I want to say, no I don't want that priviledge 17:49:59 ...I liked your presentation 17:50:07 ...you exemplified what you can do with a framework and APIs 17:50:14 ...some of what you showed is somewhat I envision 17:50:22 ...so you, me and him need to get together 17:50:29 Dirk: you are not only one who wants that feature 17:50:45 Dominique: I am curious to know scheme of user creating account 17:50:49 ...how do you deal with elevations 17:50:55 ...transactions may have a higher value 17:51:00 ...how do you protect that information 17:51:13 ...if someone else assume the account of that indiv, but not real person, how do you tell? 17:51:24 Dirk: first part of question goes into transaction based authorization 17:51:33 ...at that point in time I need additional authorization from the user 17:51:48 ...When you install account, an OAuth token could be used 17:51:56 ...but not powerful enough to approve all transactions 17:52:15 on a technical level, an "oauth token" is a "capability" 17:52:16 ...then service provider sees they are using an OAuth; could send an sms to them 17:52:23 Dominique: so resides at service provider? 17:52:33 Dirk: yes, service provider decides about OAuth token 17:52:55 Q: What if developer asks to turn feature off? 17:53:06 Harry: to summarize 17:53:08 Did anyone answer the question raised by Intel about hardware baking in identity protocols that fail to update and keep up? 17:53:10 ...needs to work with platform 17:53:17 ...account manager, account manager 17:53:22 ...help Phil's cloud scheme 17:53:24 ...show of hands 17:53:29 ...should we scope ourselves 17:53:34 ...outside browser mechanisms 17:53:39 ...The statement is 17:53:42 ...scoping statement 17:53:58 ...strong consensus about account managers working outside browsers and in the cloud 17:54:04 ...yes, we should go outside browser 17:54:18 [half room says yes] 17:54:23 [no hands for no] 17:54:38 ...Next, yes device ID should be within scope 17:54:46 [about half room shows hands] 17:54:50 [a few no hands] 17:55:04 Sam: another question, is it valuable to see what IETF is doing 17:55:06 ...and try to align 17:55:08 jimklo has joined #idbrowser 17:55:18 Nico: in a device, identity comes from platform or the hardware 17:55:30 Sam; yes, I agree; but is it desirable for us to work with IETF 17:55:43 Harry: I assume answer is yes to work with IETF 17:55:54 Mark: you are also thinking about platform capability 17:56:01 ...whether keys represent you or the device 17:56:04 my thought is that the particular notion of "device id" that the netflix folks are arguing for is imv a somewhat separable problem 17:56:11 Sam; on Android, device id cuold be another account 17:56:17 nico: we want to bake a framework in 17:56:22 ...another one for user id 17:56:26 ...want ability to have them 17:56:42 John Linn: these two topics are valid area of standardization, yes 17:56:52 ...if it's W3C or others to approach, should discuss 17:56:53 also, there may be existing work that can be leveraged for "device id" and it isn't necessarily something that needs to be reinvented 17:56:55 Harry: good point 17:57:01 ...one of reason ISOC is co-chairing 17:57:13 ...is I do believe W3C is happy to coordinate with IETF in this area 17:57:25 JeffH: this device Id stuff could largely be done from a protocol perspective 17:57:30 (also, the W3C liaison to the IETF is sitting in the second row and nodding) 17:57:32 ...in other contexts, don't reinvent it 17:57:43 Harry: we will have a protocol discussion in the afternoon 17:57:48 ...sorry ten minute break 17:57:55 rrsagent, make minutes 17:57:55 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html karen 17:58:03 rrsagent, make mintues 17:58:03 I'm logging. I don't understand 'make mintues', karen. Try /msg RRSAgent help 18:03:12 dpranke has joined #idbrowser 18:07:14 fjh has joined #idbrowser 18:07:40 wbaker has joined #idbrowser 18:13:01 josephboyle has joined #idbrowser 18:19:11 bkihara has joined #idbrowser 18:20:11 rrsagent, draft minutes 18:20:11 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html tlr 18:20:21 tlr has changed the topic to: http://www.w3.org/2011/05/25-idbrowser-minutes.html 18:21:17 PHB has joined #idbrowser 18:21:44 Standing in for Kaliya 18:21:49 ScribeNick: PHB 18:22:01 Ideas for user centricity - 18:22:15 Usability is important 18:22:37 This group is not the default, people can act out online without consequences 18:22:44 nico has joined #idbrowser 18:22:48 People use multiple personas, particularly women 18:23:28 Ways to let people manage their own data online 18:23:50 Critical thing is to allow users to have multiple persona 18:23:55 I'm curious why women might have more online personas than men, and where's the data to back that up :) 18:24:13 Organized conference earlier this year - she is geeky 18:24:34 Users had 2 facets by default 18:24:45 ah, there's the data 18:25:04 Women had an average of 6 facets, some must have had far more to make average 18:25:23 Being seen vs being watched vs being stalked 18:25:46 Being seen is bidirectional 18:25:58 Being watched is unidirectional 18:26:06 mixedpuppy has joined #idbrowser 18:26:15 Being stalked is aggregating across multiple sources 18:26:25 bblfish has joined #idbrowser 18:27:01 Personal data services 18:27:02 fjh has joined #idbrowser 18:27:16 users control their own data, users can share and trade in ways that they control 18:27:21 Is "stalking" an established term in this space 18:27:24 Can get free flights!! 18:28:41 I fear it may be overly charged or polarizing 18:29:30 zolli has joined #idbrowser 18:29:50 Mary-Ann Hona 18:29:54 Hondo 18:30:06 The IBM presentation 18:30:11 The Nexus of identity 18:31:00 Users want two control knobs 18:31:16 one is transparency 18:31:44 Presenting aggregate IBM opinion is hard (!) 18:31:48 yes to everything 18:32:08 Lets do whatever we can to improve usability scalability security 18:32:14 dveditz has joined #idbrowser 18:32:17 hhalpin has joined #idbrowser 18:32:40 In addition to the base products, research into vulnerabilities 18:33:00 acquired company now our X-force group, usability & security 18:33:35 track vulnerabilities, policies, risk based policies and controls 18:33:55 Hodder: ID managers should help users apply/admin personae from the browser, not just authentication. 18:33:58 what exactly wold a well behaved mobile app look like? 18:34:13 identity support outside the browser 18:34:28 less concerned about what it is than being able to talk about it in a common way 18:34:38 Our vision 18:34:54 zurich lab has worked with EU on privacy issues 18:35:11 vision from lab is that users can interact in a safe and secure way 18:35:38 identity mixer, a flexible cryptographic framework 18:35:42 access control 18:35:50 EU projects to make it real 18:36:18 proofs of claims such as 'i am between 12 and 15 years old 18:36:24 can be used with smartcards 18:36:39 addresses all requirements of privacy protecting PKI 18:36:56 Who are you vs access ??? (slide gone) 18:37:18 Resources www.Primelife.eu 18:37:25 (contacts in slides) 18:37:45 TLR: European host of W3C is a participant in that project 18:37:53 Next speaker: 18:38:00 ... as are several W3C staffers 18:38:05 (Rigo, Dave Raggett, myself) 18:38:21 John Tolbert from The Boeing Company 18:38:27 History 18:38:44 Talk about identity, use identity for access control 18:39:05 Histor: Users, Groups, ACLs, to Risk Adep AC 18:39:23 Can't say we have got off the simple stuff in some cases. 18:39:28 Machinery of identity 18:39:47 LDAP, Web Access management and so on, PKI, SAML, smartcards 18:40:04 Encouraged by whay I have heard 18:40:17 interested in combination of user and device identity 18:40:39 Get wrapped up in aerospace, defense type world 18:40:50 finance, social media type 18:41:12 use web access management internally extensively 18:41:18 1000s of applications (not users!) 18:41:37 external connection get into 18:41:50 identity is a piece of the puzzle 18:41:53 evrything goes into the middle, access control 18:42:44 Empower people in global trade controls, to author policy and make access control decisions 18:42:59 environment matters, who a person is, where there device is 18:43:05 being able to prove that strongly 18:43:18 identity providers 18:43:31 nobody in this country would go for a national identity card 18:43:43 bottom up may provide what we need in that area 18:44:12 mention the unmentionable - advanced persistent threats 18:44:34 identity in browser can be compromised, for naught if machine is compromised 18:44:44 skip through data protection for time 18:45:08 cryptographic standards needed to bind metadata to data for access control decisions 18:45:31 look to how we can leverage info from groups like trusted computing , extend existing standards, SAML etc 18:46:03 Next speaker 18:46:16 Yahoooooo! 18:46:28 Wendel Baker from right media 18:46:42 Provide open marketplace where Yahoo can buy and sell ads 18:46:54 Pay the bills by monetization 18:46:59 two systems in Yahoo 18:47:05 ONO - Owned and operated 18:47:14 sold on guaranteed basis like a newspaper 18:47:15 fjh has joined #idbrowser 18:47:27 hand money (make good) if can't make display 18:47:49 This is the other system does the infill 18:48:01 How the internet world thinks about monetization 18:48:01 zolli has joined #idbrowser 18:48:21 audience side - getting people to come and read stuff, use service 18:48:26 need to get people to register 18:48:37 how to manage identity in terms of profiles and so forth 18:48:45 goals have is to have more fun 18:48:52 more personalization more interest 18:48:56 does not get any money 18:49:10 two monetize charge people or you do advertising 18:49:25 @dpranke stalking is used for this type of asymmetry among online social science researchers 18:49:27 joke in VC community and can't work out how to monetize become an ad network 18:49:55 to make this interesting need to do more than just push pictures in front of people 18:50:09 need to tailor ad to the viewer 18:50:25 match between who the audience is, set of advertisers and the browser 18:50:45 Someone is providing the venue, set of advertisers would like access to opportunity and the viewer 18:51:03 today are two systems and they are unconnected for various reasons including policy 18:51:16 when you log in you get to choose screen name etc 18:51:35 advertising side is assigned to you by advertiser, public policy space 18:51:48 key about advertising is that you don't have to interact with that 18:52:05 don't need to know very much about the person on the other side of the wire 18:52:21 rough idea that have seen this guy before 18:52:34 amount of time that a buyer is focusing on the metrics is short 18:52:45 audience side identity systems 18:53:10 users should not need to sign in to use this site 18:53:39 users who log in via open id or whatever are better users, spend longer time, play more games etc 18:54:08 other way 18:54:19 got to be some way of identifying site 18:54:33 three screen strategy or four screenm 18:54:47 trying to relate what is going on in the online space to tv, mobile and other 18:54:54 web is the center 18:55:22 vision is that you should be able to do something on your tv, go to the web, mobile and its all the same stuff 18:55:35 need a way to link the identity across the devices so that you know its the same user 18:55:42 other side of the house 18:56:00 everything goes through the exchange that resolves 'who gets the ad' 18:56:24 this notion of who the user or the device is is not tied to what is seen before 18:56:42 advance going on today is linkage between different exchanges 18:56:56 to do that need to map the identity between different marketplaces 18:57:12 very important exchange wants to maintain its idea of who a user is 18:57:17 but need to match up 18:57:21 two sides 18:57:30 voluntary identity, vs forced identity 18:57:48 how strong and by what method should we tie these mechanisms? 18:58:43 Speaker: Chadwick 18:59:04 Trusted Attribute Aggregation 18:59:06 TAAS 18:59:26 Paypal people think of it as a broke 18:59:30 few sites 18:59:34 electronic shopping site 18:59:37 said student 18:59:43 comes to shopping payment time 18:59:54 need a credit card, postal address and student card 19:00:00 two attributes from user 19:00:08 one from bank (credit card) 19:00:14 steve_schultze has joined #idbrowser 19:00:16 and one from schoo (student card 19:00:25 Policy for getting onto the site 19:00:40 is a mime type that causes a plugin to be activated by the browser 19:00:46 user clicks on bookmark 19:00:52 this stops a phishing attack 19:01:02 selects trusted service provider 19:01:19 can use any auth syustem you want we use username and password 19:01:26 has taken policy of the search provider 19:01:34 and filtered it according to the user 19:01:43 got some names and got some addresses 19:02:00 can have an official name given by the government or a name chosen by user 19:02:07 can do a gift purchase 19:02:10 can submit 19:02:24 or save and submit where the system remembers and gets one click shopping 19:02:41 now can go back and get single click shopping 19:02:49 single sign-on from SAML etc 19:03:10 another example from UK e-gov work 19:03:19 to get parking permit must have proof of car ownership 19:03:26 proof od pension 19:03:29 credit card 19:03:45 government currently only doing aggregation of government attributes 19:04:25 this time when user chooses name the only one that works is the officially certified name 19:04:42 user can't choose bill gates, has to match policy from search provider 19:05:01 goes back to site and site says these are attributes that were provided to me 19:05:13 if happy with that can get permit sent in post. 19:05:21 uses SAMLv2 19:05:30 (read slide summary of featues) 19:07:07 similar features today to what Microsoft and IBM will provide in ten years time 19:07:34 Demo is at (someone else must type) 19:07:37 username is guest 19:07:38 can someone near the front type that URI into IRC? 19:07:44 passwpord is password 19:07:54 s/guest/Guest/ 19:08:01 (high security here!) 19:08:09 Time check, we is an hour late 19:08:13 20 mins for discussion 19:08:53 PhilWolff has joined #idbrowser 19:09:13 Dirk? Wicked does not mean bad 19:09:22 jkmathes has joined #IDBrowser 19:09:27 Stalking has connotations... is this intentional 19:09:31 loaded term 19:10:08 "stalker economy" 19:10:17 ?? well, refering to it as stalker economy is that we see people using info in malicious ways 19:10:32 people selling life insurance go online 19:10:38 dpranke has joined #idbrowser 19:10:40 health insurers 19:10:48 not just you but your friends 19:10:56 so its all kinds of ways 19:11:00 q+ 19:11:05 dossiers being compiled 19:11:19 q+ JeffH 19:11:25 Dan schuster 19:11:28 so act anonymously then? 19:11:32 legitimate needs of privacy 19:11:39 trying to support them is chasing tail 19:11:50 can obtain all the information from a variety of sources 19:11:59 photos announcement of church etc 19:12:19 niothing to do with whether know full birthday, who I am etc 19:12:46 See Spokeo for a freaky example. As the chairman of a past employer said: "you have no privacy, get used to it" 19:12:47 is complicating id metasystem, but agent can get same info more easily 19:12:51 yoiwa has joined #idbrowser 19:12:58 name and age bracket plus zip is enough to identify you 19:14:19 jkmathes has joined #IDBrowser 19:15:11 q? 19:15:23 Speaker Jon 19:15:36 Speaker Harry: 19:15:40 Enough personal info arguably is identity... 19:15:42 queue=PHB, JeffH 19:15:50 Quicj question at Mary: is google a personal id system 19:16:01 yes 19:16:11 Wendel: device ID in paper 19:16:25 need complex schemes to track people to real id on their net 19:16:32 what is the process to 19:16:42 actually I think Mary said "maybe" 19:16:51 netflixy based hardware id is bettrer, have number and can just work with it 19:16:52 which does make me wonder what is NOT a personal data store. 19:17:08 scale of the yahoo audience must be lots of 19:17:09 Perhaps Wendell's ad-tracking system would not be one, as I am not aware of it per se 19:17:30 state kept, device id would make it simpler, reduce gear, costs, co-lo space and so on. 19:18:34 mixedpuppy has joined #idbrowser 19:18:57 John Linn: 19:19:12 Trusted components 19:19:14 ack PHB 19:19:16 is underspecified 19:19:22 should be by whom and for what 19:19:31 (PHB and does not mean trustworthy) 19:19:52 firefox plugin is an adblocker will undo an aspect of the system 19:20:01 need to recognize there are components 19:20:11 different entrants and for different purposes 19:20:21 we engineered it to minimize the trust component 19:20:33 never asks for username and password 19:20:50 (Chadwick) I don't know who you are, idp does not know 19:20:58 aggregator merely aggregates tuples 19:21:10 minimize the amount of trust required in it 19:21:23 will only release links to the entity that gave it to them 19:21:41 trust is a major issue 19:21:56 Tom ? 19:22:12 Tantek Celik speaking 19:22:12 Economics, pick any 19:22:23 zero to know cost to check anyone in your system 19:22:41 zero cost to stalk everyone makes a very bad system 19:23:05 Jeff Hodges: This is really important stuff but layer 9 19:23:14 legislation and policy trather than technology 19:23:20 ?? 19:23:30 (can't hear) 19:23:38 I just want to be this person for today 19:23:43 ack JeffH 19:23:49 David singer above 19:24:06 Greg Kerr, AuthenTec was speaking 19:24:16 Dan: brute force is not as difficult as people imagine. 19:24:34 Sam H.: anonymity and unlinkability is harder than you think no matter what 19:24:56 agree with jeff, every if statement in your code is a potential linkability issue 19:25:07 have bought 40 minutes 19:27:07 OMG -- Carl Hewitt has an even bigger gear bag than me.... 19:27:16 :) 19:27:38 Dan Schuster 19:27:39 dpranke has joined #idbrowser 19:28:11 what is different now that would make it a good time to be making changes? 19:28:22 much greater sophistication in malware and fraud etc than before 19:30:20 Government drive 19:30:23 Smartphones 19:30:33 Social networks etc 19:30:39 now may be the time to see things happen 19:30:42 barriers 19:30:52 Are logs of this channel being kept? 19:31:00 (summary is in slides) 19:31:05 If so, where? 19:31:23 hard to displace historical precedence 19:31:37 must be easier to use, to interface to 19:32:16 @nico -- apparently irc.w3.org keeps logs and there's a std way to get to them. i dunno offhand what it is. TLR said they'd let us know 19:32:30 I have made the request to generate http://www.w3.org/2011/05/25-idbrowser-minutes.html tlr 19:32:55 JeffH, tlr: danke 19:33:21 Financial services: need mutual authentication 19:34:10 (break to find slide) 19:34:15 Don Thibeau Open ID 19:34:26 OIX /NSTIC and path forward 19:34:52 NSTIC talks about an identity ecosystem 19:35:01 new animals in mix - regulators 19:35:13 lawyers, auditors, policy makers 19:35:29 dependency on a new type of infrastucture 19:35:43 lbrings lawyers and accountants into the conversation 19:35:47 "send lawyers, guns, and money!!@%^" -- warren zevon 19:36:06 Public Private Partnership workshops to kick of in two weeks 19:36:24 Open Identity Exchange is in response to a US govt request 19:36:41 asked openID foundationto participate 19:37:04 How to deliver more service as budgets decline 19:37:09 online and in the cloud 19:37:15 need to solve the identity problem 19:37:23 Open Id Exchange 19:37:36 (PHB does this look like Liberty Alliance?) 19:38:28 restructure other identity providers from telco space 19:38:30 and people in data aggregation biz 19:38:32 dpranke has joined #idbrowser 19:38:49 OIX is center of gravity to sort out what it means to become a trust framework 19:39:16 OIX is trying to do is to become the partner in the public-private partnership 19:39:23 private sector will lead 19:39:31 what are the goals? 19:40:07 technology + policy 19:40:22 policy interoperability + technical interop = trust framework 19:40:30 truste by whom and for what 19:41:15 OIX is providing plumbing, and best practices 19:41:26 plumbing is rules + tools 19:41:36 RISK Wiki 19:41:45 knowledge center where people can post stuff 19:41:58 pull from the risk wiki components they can re-use 19:42:13 set of tools , metadata listing service 19:42:27 what are requirements for each provider 19:44:41 pilots taking place 19:44:49 dveditz has joined #idbrowser 19:44:50 bine email address to postal address (etc) 19:45:28 yoiwa has joined #idbrowser 19:46:27 Francisco Corella on the NSTIC 19:47:15 One goal of NSTIC is to get rid of passwords 19:47:24 is being achieved right now with social login 19:47:43 or by other social site like myspace or linked in 19:47:46 is this good? 19:47:50 unfortunately not 19:48:01 current social login is moving us in wrong direction 19:48:13 social site can track users login 19:48:20 allows credential to be sent enclair 19:48:43 so use facebook at cafe with wifi it is very easy for hacker to attack you 19:49:05 specific to OAUTH is that rp must register with the site 19:49:16 so if login with facebook becomes ubiquitous 19:49:28 facebook controls the web, can revoke registration 19:49:37 reinforces facebook monopoly 19:49:52 can't persualde rps to register with them 19:50:03 competitor can't persualde rps to register with them 19:50:19 zero knowledge proof like IBM or uprove or 19:50:31 need an interim soliution 19:50:39 will take time 19:50:54 having interim solution makes it possible to develop framework 19:51:02 ahead of the zero knowledge proof 19:51:24 HTTP extension for delegated identity 19:51:28 (details on slide) 19:53:47 dpranke has joined #idbrowser 19:54:56 Dan Schuster back 19:56:24 Speaker Thomas J. Smedinghof 19:56:43 from ABA identity management legal taskforce 19:56:50 defining what it is 19:57:09 came down to looking at it from 50,000 fott level to two buckets of items 19:57:16 tools and rules 19:57:30 operational specifications 19:57:34 legal rules 19:58:52 fjh has joined #idbrowser 19:59:39 need to understand law when developing the rules 19:59:50 sometimes causes problems, sometimes fills in blankc 20:00:05 privacy is heavily regulated in the EU 20:00:14 in healthcare in the us 20:00:24 can't stand up rules for privacy that violate them 20:00:33 but may not cover everything 20:00:53 a dozen states regulate security for all companies 20:01:06 different countries used to regulate encryption in different ways 20:01:09 the law is there 20:01:20 the same thing happens with the legal rules 20:01:25 body of law is out there 20:01:31 but don't know what it says 20:01:40 what is your liability? 20:01:49 what is liability of browser vendor for liability? 20:01:57 in password manager? 20:02:07 legal rules can define that liability 20:02:11 q+ 20:02:22 how mucgh each party agrees to bear and so forth 20:02:37 This isn't a legal issue yet, it's a political issue first 20:02:40 can specify in contract or default in existing law 20:02:48 (PHB - mention the rulebook approach) 20:03:05 eventually it may also be a legal issue 20:03:26 can do it through statue or regulation 20:03:42 (will lag, be incomplete) 20:03:51 need some sort of contractual structure 20:03:59 facebook does have a contract 20:04:03 agree by clicking 20:04:04 Tom providing a good overview of why we -- eg in "identity biz" -- need to pay attention to Layer 9 (legal/regulatory/contractural) issues 20:04:20 look at Identrus PKI suystem 4000 pages 20:04:28 can do it in a lot of different ways 20:04:37 common legal barriers 20:04:38 q+ 20:04:42 key issues 20:04:44 q+ 20:04:57 dveditz has joined #idbrowser 20:05:00 (describes slide) 20:05:05 paul has joined #idbrowser 20:06:26 q+ 20:07:11 wbaker has joined #idbrowser 20:07:14 ways to establish contracts 20:07:23 credit card model 20:07:30 non participants, how can they be injured 20:07:35 not a party to the system 20:07:44 what are their rights 20:07:46 open question 20:08:06 back to 20:08:13 Dan Schuster 20:08:48 requirements wish list 20:08:49 nico has joined #idbrowser 20:08:59 want to set up a secure trusted authenticated path 20:09:17 authenticate all information that is exchanged 20:09:27 sufficiently granular 20:09:42 (delgates can act for others etc 20:09:55 Decouple proofing authentication and authorization 20:09:56 q+ 20:11:18 (summary is on slides) 20:15:52 ack fjh 20:15:56 frederick: 20:16:02 legal stuff is important 20:16:12 sets direction ut not detail 20:16:19 case law resolves detail 20:16:30 fast time to market for business reasons 20:16:37 how can sync the two up 20:16:38 PhilHunt has joined #idbrowser 20:16:53 q? 20:16:57 speaker: law is always behindd and don't know in the interim, make up own rules 20:17:05 q+ hannes 20:17:44 ack steve_schultze 20:18:11 steve: 20:18:18 hoping to rely on contracts 20:18:33 how reasonably would they make their way to relying parties 20:18:46 relying partiy agreements, how do they bing the RP? 20:18:50 bind 20:19:04 Vladimir_ has joined #idbrowser 20:19:11 are there universes in which there are contracts that might bind end users? 20:19:24 fjh_ has joined #idbrowser 20:19:39 Thomas: hard to do in open environment 20:19:54 easy to get Amazon, Ebay to agree 20:20:00 hard to get consumers 20:20:17 Don - that is the opportunity of a trust framework 20:20:33 solves problems of bilateral contracts 20:20:39 ack PHB 20:20:54 phb: faced open contracts problem when we founded a certain large CA 20:20:58 q? 20:21:00 ... one of the approaches was a rulebook mechanism 20:21:11 .. join an exchange - there's a rule book that everybody has a bilateral contract with the rulebook 20:21:14 ... that then mediates disputes 20:21:15 . 20:21:17 s/.// 20:21:25 ... avoids need for everybody to have bilateral contract with everybody else 20:21:29 ... didn't get to point of requiring that 20:21:31 fyi: Steven Roosa – The Devil is in the Indemnity Agreements: A Critique of the Certificate Authority Trust Model’s Putative Legal Foundation http://citp.princeton.edu/events/lunch/steven-roosa/ 20:21:34 ... audience tag in SAML was inspired by that 20:22:09 http://etherpad.mozilla.org:9000/V0zRDKeAU0 20:22:13 tantek has joined #idbrowser 20:22:15 don: NYSE is the referree for the transactions 20:22:17 http://etherpad.mozilla.org:9000/V0zRDKeAU0 20:22:24 etherpad for open discussion lighting proposal sign-up 20:22:26 URI above 20:22:37 Thomas, is a common appraoch, has lot opf merit 20:22:41 q? 20:22:42 how to bind consumer? 20:22:51 Dirk: 20:22:55 ack dpranke 20:23:32 hhalpin - I added the form annotation straw proposal you asked me to do to the etherpad 20:23:36 how does the browser into the rp thing? 20:23:50 large body of work wrt the duties of the identity provider 20:23:56 less for the relying parties 20:24:27 q? 20:25:26 ack CraigWi 20:25:33 Thomas: depends on how you set up the system, can vary from none to much 20:25:42 DirK : is it too early for me to tell 20:25:50 nico has joined #idbrowser 20:26:29 craig: in what way is the user directly involved? 20:26:33 q? 20:26:35 q+ a2 20:26:47 Don: got one experiment going on now 20:26:55 jimklo has joined #idbrowser 20:27:08 gives user ability to control what they expose etc. 20:27:28 proxy model, terms of service between myself and AOL becomes fabric in which all is taking place 20:27:45 ack hannes 20:27:50 Dan: this is going to be regulatory rather than legal if users being abused 20:27:53 Hannes 20:28:19 nobody knows waht trust framework means before that was federation etc. 20:28:32 NSTIC credit card model is mentioned 20:28:53 unfortunate direction because that model is not secure or 20:28:58 good 20:29:26 not sre where issues likel liabilities lie or whtheer wider community wants to use 20:29:49 Phil: id in browser is good should really be able to share it 20:29:59 ack a2 20:30:02 have family of 5 thousands of contacts 20:30:08 how can one member share with others? 20:30:42 thomas on the crexit card issue, agree not good model but not specific implementation but the way the issues are worked legally and contractually 20:30:57 provides one p[ossible model of how to bind users to one model with a regulatory overlay 20:31:17 Don thing that made credit card issue work in US was the last leg and limited exposure 20:34:10 I will also note that the way payments work internationally, there is a lot of variance and cultural differences that may make a global ecosystem for 20:34:59 Trust and identity much more difficult. 20:37:38 Hadley has joined #idbrowser 20:45:16 dpranke has joined #idbrowser 20:46:53 nico has joined #idbrowser 20:50:15 nico_ has joined #idbrowser 20:50:19 nico__ has joined #idbrowser 21:06:45 lowenthal has joined #idbrowser 21:08:44 q? 21:11:02 ScribeNick: lowenthal 21:16:03 tlr has joined #idbrowser 21:16:29 starting: protocol & api proposals 21:16:37 moderator: halpin 21:17:15 video presentation in lieu of henry story 21:17:19 bradhill has joined #idbrowser 21:17:31 paper topic "the webid protocol & browsers" 21:18:05 story video presentation will occur last 21:19:01 CraigWi has joined #idbrowser 21:19:14 hi 21:19:16 talking: yutaka 21:19:17 is this now? 21:19:29 fjh has joined #idbrowser 21:19:40 jkmathes has joined #IDBrowser 21:19:48 benadida has joined #idbrowser 21:20:01 presentation available online at http://bblfish.net/blog/2011/05/25/ 21:20:08 keywords: can't get there from here 21:20:15 bhill2 has joined #idbrowser 21:20:18 ..."phishing is fun & profitable" 21:20:31 problem: form auth insecure against forging 21:20:43 web pages control behaviour 100% 21:21:02 even if we could make a secure password field, phishers could forge it via js 21:21:17 http auth is only potentially better 21:21:36 currently sucks: both basic and digest are insecure 21:21:55 lacks feature: ugly dialog, no ux, customization 21:22:04 no logout, gues access, session management 21:22:12 little motivation to fix http auth 21:22:18 because not currently used 21:22:27 so no motivation to use http auth 21:22:34 ... chicken & egg problem 21:22:45 but: we cannot fix form auth 21:22:55 we need to cut the gordian knots of this problem 21:23:06 tantek has joined #idbrowser 21:23:10 we need mechanisms to mitigate current problems 21:23:23 proposal: password-based http auth protocol 21:23:42 strongly protects against eavesdropping mitm, forwarding, offline attacks 21:23:54 mutual site/user identification 21:24:08 auth success iff correct site && correct password 21:24:20 with a phishing site, authentication fails 21:24:29 users can confirm that they are talking to correct sit 21:24:48 where correct means the same site the user made an account on (ie tofu) 21:24:59 that is: true, bidirectional shared secret 21:25:09 need to overcome 'usability' problem 21:25:20 by supporting current web app design 21:25:33 secure ui needed 21:25:44 [preventing password stealing by imitation] 21:25:55 mutual auth result should be available to the user 21:26:06 need 'non-modal' ui 21:26:16 ui in a non-content browser-controlled area 21:26:27 example: adjacent to address bar 21:26:44 but each browser can implement own ui, subject to requirements 21:26:57 coordination may be desirable 21:27:06 standardization desired 21:27:11 use cases: 21:27:26 standalone, for any website, like email 21:27:36 combine with id amangement like pw managers? 21:27:52 with federated logins, use http auth to sign into initial provider 21:28:19 currently proposing standardization in ietf 21:28:30 we should start standardizing, rolling out asap 21:28:45 one we reach major adoption, we may see a world with web auth 21:29:01 mailing list http-auth@ietf.org 21:29:27 talking nicolas williams 21:29:40 cryptonector lls, secureendpoints 21:29:56 proposing http auth system 21:30:02 http auth challenges 21:30:07 multiple infrastrustuces 21:30:15 preserve investment 21:30:30 need federation, authorization, granularity 21:30:43 need to define, protect session & associate w/session 21:30:54 need to supprt browser & non-browser http apps 21:31:06 need better ux: browser chrome, os integrations 21:31:11 constraints: 21:31:15 improve security 21:31:28 minimal/no mods to current software/hardware stack 21:31:44 nobody is going to rebuild / reconfigure current software stacks 21:31:51 apps must control when auth happens 21:32:02 may also wish to define mechanisms 21:32:13 ... attributes, results 21:32:19 & apps want control over ui 21:32:25 certainly more than current http auth 21:32:33 proposal: REST-GSS 21:33:02 pluggable app-layer auth, supporting passwords, kerberos, pki, samil, openid, oauth... &c 21:33:07 entirely above http 21:33:17 auth done via post 21:33:45 post initial token to well-known uri, return 201, w/token, session uri 21:33:51 logout via delete 21:34:00 works at all http versions 21:34:17 sessions bound via 'mic' [like hmac] 21:34:22 dpranke has joined #idbrowser 21:34:33 still possible to use cookies if web developers want 21:34:54 ss-rest similar to draft-hammer-oauth-v2-mac-token-05 21:34:57 similar to msoft's integrated windows authentication 21:35:17 useful for enterprise applications 21:35:25 position paper focused on protocol 21:35:31 no for some ui & api elements 21:35:38 ui: dom element w/ login button 21:36:15 browser mechanism to indicate status, like https lock icon only indicating your identity, rather than server's 21:36:26 easy to switch between identities stored in browser 21:36:38 api: 21:36:50 xmlhttprequest bindings of the same thing 21:36:57 sometimes a script will want to trigger auth 21:37:04 similar for status enquiries 21:37:39 perhaps script will want to specify target name, (but we want something like same-origin restrictions to prevent credential hijacking) 21:37:59 server-side can be implement in cgi completely using current ots tech 21:38:07 doesn't need modification to http stack 21:38:21 but can be integrated to make things easy, and make ui modification 21:38:42 hopefully can train users not to enter passwords into web pages 21:38:52 making browser chrome non-spoofable is tricky 21:39:01 why rest-gss? alternatives? 21:39:04 pros: 21:39:13 many cots implementations of gss-api 21:39:25 mit, heimdal, windows &c 21:39:40 oauth, openid now support one-way id 21:39:43 mixedpuppy has joined #idbrowser 21:39:45 os integration 21:39:48 pluggable 21:40:01 need a new mechanism like 0-know passwd proofs? add it! 21:40:08 q+ 21:40:08 auth at the correct layer 21:40:31 makes ssl less of a point of failure 21:40:42 alternatives: same with sasle? 21:40:46 something new? 21:40:59 use tls better? where do we get client certs? 21:41:17 api primer, message flow slides skipped 21:41:25 slides have notes, will be available online 21:41:33 one last thing: 21:41:34 tlr has joined #idbrowser 21:41:38 abstraction is key 21:41:51 much talk of single-frameworks using single mechanism 21:42:02 here can add/switch mechanisms as you like it 21:42:07 w/o code changes 21:42:14 q? 21:42:48 now talking biran 21:42:58 backplane protocol in id scenario 21:43:17 problem: site composed of widgets coming from different servers 21:43:27 each widget has its own notion of user auth 21:43:37 widgets want to know about auth to each other 21:43:58 21:44:05 widgets want to know who's logged in 21:44:17 ux: don't want users to have to login to each widget 21:44:22 now talking vlad: 21:45:02 when a user logs into a widget, authorizing server notifies backplane server, which notifies other widgets which want to know about it 21:45:19 backplane is a method for sharing messages between server-side applications & widgets 21:45:31 want to convey info between widgets & server-side components 21:45:46 21:46:03 have defined a js api for widgets to collaborate 21:46:15 differences in security settings of different clients that use backplane 21:46:24 design reflects this difference 21:46:33 widgets cannot post to backplane, only listen 21:46:47 only get partial information, so that sensitive information will not be exposed 21:47:00 widgets only get info tied to a browser session 21:47:13 backplane v1 has been develped ~1yr, used by wapo, espn 21:47:20 see backplanespec.com 21:47:46 now talking jeff hodges 21:48:05 on behlaf of ietf sec area & apps directors 21:48:10 crypto apis 21:48:26 web pages sometimes want to do crypto operations 21:48:40 sign, verify, encrypt, decrypt &c 21:49:10 how do pages do crypto on client-side? 21:49:25 currently: everyone writes their own crypto primitives in js 21:50:02 is it good for web pages to dynamically, insecurely embed crypto implementations 21:50:15 [no] 21:50:28 currently pages xss their aes 21:50:30 =[ 21:50:45 may good implementations to choose from 21:50:58 *many... 21:51:46 position: we should not do this, we should have a js crypto aip, built on browser/os libraries 21:51:54 q+ 21:52:00 we currently have implicit agreement 21:52:18 so: who do wee need to do it, and which standards body is desireable? 21:53:06 many threads at w3, ietf talking about need for this 21:53:29 so, lets use existing crypto, rather than recoding & introducing bugs 21:53:38 Q+ 21:53:44 now: henry story video presentation, from apache 21:54:02 video online here for those following remotely http://bblfish.net/blog/2011/05/25/ 21:54:08 (with bonus) 21:54:11 how webid works in existing browsers 21:54:29 net is a distributed network in a distributed namespace 21:54:35 nico has joined #idbrowser 21:54:36 21:54:52 :-) yes there's a forest here in Fontainebleau 21:54:55 we can use hashtag urls to identify users 21:55:18 demo: viewing profiles 21:55:38 example: webid listed via hashtag uri 21:55:51 clig, get profile, add as contact 21:56:09 if we have many friends, privacy issue 21:56:26 ideally, individuals should be able to secure pii 21:56:37 webid protocol attempts to solve this 21:56:44 built on tls, x509 21:56:47 what's new? 21:57:18 instead of authenticating server relying on ca to auth bob, gets info from bob's profile url 21:57:37 creating a cert/public-key from a user's homepage 21:57:55 browser makes keypair, sends pub part to server 21:58:34 what can we do with a webid 21:58:38 use on a new service 21:58:46 authenticate by selecting a client certificate 21:58:54 log in using this cert 21:59:10 server gets name, picture &c... 21:59:11 q+ 21:59:18 what happend during login? 21:59:33 login button pointed to https endpoint 21:59:39 nico has joined #idbrowser 21:59:39 server requests client cert 21:59:49 browser allows uder to pic client cert 22:00:05 browser can show this different way 22:00:17 firefox sucks, iphone rocks at this ux 22:00:25 server verifies keys 22:00:32 server derefs url 22:00:57 now server confirms that key on cert is same as key on remote profile 22:01:23 now cert knows that user is same as profile creator 22:01:57 this is a very limited form of authentication 22:02:10 not a lot of proof offered 22:02:23 webid uses existing tech to create a referential web of trust 22:02:45 (there are a lot of papers listed at http://www.w3.org/wiki/Foaf%2Bssl 22:02:49 no need to place attributes in cert: placed in client profile page, limited by access 22:03:16 this should look like the mozilla prototype from aza raskin 22:03:48 want os vendors to support crypto usb keys like gpf cryptokey 22:03:56 webid.info/spec 22:03:56 the demo is the second video on http://bblfish.net/blog/2011/05/25/ 22:04:20 you can call me on skype bblfish or us number +1 (510) 931-5491 22:04:27 now moving to general discussion 22:05:03 fred hirsh: html5 & web notifications: is that relevant to you, esp re ntofications? 22:05:08 vlad: no, not directly 22:05:49 q? 22:06:40 nico has joined #idbrowser 22:06:41 brad hill, re gss rest, missing some details. how do we identify the target, needs to be done a priori by client, other side of mutual auth missing 22:07:02 answer: does not rely on target 22:07:15 ex oauth doesn't do that, still needs tls to auth 22:07:29 kerberos/pki can cope with that 22:07:35 q- bhill 22:07:42 dveditz has joined #idbrowser 22:08:23 answer to twitter: #WebID is nothing new. It just does what TLS was designed to do from the start- we just use URIs instead of distinguished names (@shingou was saying "why invent something new"?) 22:08:28 sam hartman interjecting 22:08:45 if no security indicators in chrome... web apps should have same auth powers as native apps 22:09:08 starting from trusted https, have guarantees, if not, fewer guarantees 22:09:35 perhaps you could sue these sorts of signals to create an indicator (whether or not anyone would look at it) 22:10:17 williams: don't want sites to be able to hijack credentials... except when we do 22:10:33 adida: 22:10:39 tyler has joined #idbrowser 22:10:55 mark has joined #idbrowser 22:11:06 q 22:11:12 q+ 22:11:19 q+ 22:11:31 q about crypto api. risk of over-specification. important to be flexible enough to cover all use cases 22:11:45 focus on minimum spec that covers maximum spread of case 22:11:57 let's use apis for algos, rather than process 22:12:08 hodges: food for though for standardization effors 22:12:58 another q: this has happened before. is this a browser-specific problem or should js just have a crypto lib in general? 22:13:50 me +1 for crypto lib. A lot of people would like to use crypto libs to access keys in keychain. It would be best if those keys were protected by the chrome. 22:13:51 hodges:punt to brian. interesting question. happened on lists before. mark miller, brendon suggest workgroup to make in-lang crypto, still not sure if it's a good idea. 22:14:26 brian: ui integration make/manage keypairs is critical, and good reason to do it browserwise rather than language-wise 22:14:36 that's assuming we have crypto primitives 22:15:03 williams: pkcs11 is lousy for a crypto api, but does work well for key storage 22:15:15 we should bake in crypto apis 22:15:20 [raw crypto] 22:15:31 but also want pkcs11 so that we can use hardware tokens 22:15:42 we risk loosing browser integration 22:15:53 if we don't have a browser implementation, people will make it anyway 22:16:19 another answer: apis will happen, only open question is how. going to be decided by es-discuss 22:16:50 if only we had existing, running code that we can reimplement 22:17:17 agree: there are certain classes of operations folks want for specific applications 22:17:19 hardware tokens would be very nice. The second demo on that page shows already how far one can go with them http://bblfish.net/blog/2011/05/25/ 22:17:29 but hardware tokens need better browser integration 22:17:34 williams: eg hashes, c-lib objects 22:17:59 david speaking for henry 22:18:09 greg to willaims 22:18:10 currently from the 2nd video on that slide, it is clear that one has to download drivers to get browser to work with crypto key 22:18:22 Zakim, who is on the q 22:18:22 I don't understand 'who is on the q', tyler 22:18:24 how will mechanisms be distributed into this api? 22:18:45 nico has joined #idbrowser 22:18:57 williams: ex windows, solaris, &c, apps use gss-api portably, agnostic to mechanism as long as mechanism has the correct properties 22:19:02 q? 22:19:08 q- benadida 22:19:17 q- dpranke 22:19:22 q- lowenthal 22:19:41 we should be able to do it purely in js? 22:19:47 but then we'd loose browser integration 22:19:54 q+ 22:20:35 q- tyler 22:21:08 q: what gui should one show a user for sensitive functions like signing, key operations 22:21:26 hodges: not necc. depends on use case 22:21:45 specifically: depends who provides the key 22:21:57 q+ 22:21:58 q+ 22:22:20 lowenthal, why did you remove me from the q? 22:23:17 trick is to create a simple api which covers most use cases,: sign, encrypt, decrypt, verify, tls 22:23:46 to do this, need access to crypto pimitives, under hood 22:24:02 dirk: can i be logged into two accounts 22:24:09 dave: yes, 22:24:30 pick certs (&ids) case-by-case 22:24:51 dirk: multi-login, a la google! 22:25:18 dave: not sure 22:25:37 williams: gss-rest, use session id interchangably 22:25:44 different tabs 22:26:39 hhalpin has joined #idbrowser 22:26:53 anyone scribing? 22:26:59 see google documentation to conclude 22:27:07 behavior complex, dynamic 22:27:21 dirk: sensible for gss, up to server to identify 22:27:33 dave: use two identities for one request 22:28:06 I am just thinking of the time going by, and all the discussion is on Javascript. But much more important in my view is to allow the end user to see WHO he is logged in as. Users need immediate feedback to their idenitty. If a user does not know who he is, if he cannot physically in a gesture control his idenitty, then he cannot feel in control. If he does not feel in control he will feel alienated, and you will have a lot of trouble and a lot of resistanc 22:28:07 So I put the work of Aza Raskin as the top priority. A user has to be able to control at least sometimes what he is also by being able to publish information about himself, and control who (at least initially) sees it. So here is a pointer to Aza's initial article http://www.azarask.in/blog/post/identity-in-the-browser-firefox/ 22:28:17 q? 22:28:18 Deiu has joined #idbrowser 22:28:27 q+ 22:28:40 tyler: what about offline scenarios using post to iframes so that it works offline 22:28:47 williams: have not thought about offline 22:28:49 nico has joined #idbrowser 22:28:51 q? 22:29:02 same-origin restriction applying 22:29:18 backplane works that way too 22:29:21 unusual use-case 22:29:29 jimklo has joined #idbrowser 22:29:46 brian: signing is sensitive. need to think about it carefully, and no delegate arbitrarily 22:30:23 important concern, in fact more important than api in general 22:30:51 williams: not a new problem. if script wants to use its own key. but if script want to use user's key, then we need to worry 22:31:51 q? 22:32:08 brian: may need to build them on-top of browser-only 22:32:14 bblfish, your q? 22:32:18 anything further? 22:32:20 It's above 22:32:24 When it's my time in the queue (for bblfish): for webID, what possible chance of adoption is there for intra-handshake, user-supplied call-outs by servers and termination appliances given the attack surface, resource and performance cost, and denial-of-service risks that introduces? isn't this a impossible to surmount deployment blocker? also- how to relay that information from a termination appliance down to the webapp? 22:33:11 q: protected key store, or script doing arbitrary operations? 22:33:23 hodges: both! presentation high-level 22:34:36 siddarth: have talked about webid, certs &c. esp when using ssl client auth, client has very little control about session. if wrong cert selected, only option is to close browser, which sucks. something to think about for standardization 22:34:46 bblfish, any response to bhill2? 22:34:56 denial of serivce attacks could be reduced to the minimum if it were possible for the server to be on the client. For then the whole internet could be down: if you can connect to the server then it can connect to you. So I think one needs ipv6 for that. In any case WebID inherits all of the goodness of the web such as caching. It also 22:35:08 siddarth: important to give applications more control 22:35:17 is possible to have more than one WebID in Subject Alternative Name of X509 22:35:24 we are playing with that at the Webid XG 22:35:25 22:35:58 finally you can have trusted proxies you could ask for their version of the facts 22:36:08 bhill: derefing a url mid-handshake is crazy-talk 22:36:13 but I think it's best to start simple 22:36:23 benadida has joined #idbrowser 22:36:23 it works :-) 22:36:44 you only have to derfer first time bhill 22:36:49 then you have a cache 22:36:53 lookup 22:37:07 dave: need to have browser make certs 22:37:26 but still need the validation to confirm that current user is same as url owner 22:37:31 it is just as easy to have your freedom box make a cert for you 22:37:50 bhill: that sounds challenging 22:37:58 dave: can do crypto confirmation 22:38:09 why? Does Google validate that you are the same person as the password knower each time? 22:38:13 fetching web-page is crucial to do verification 22:38:26 in any case TLS already has to do that 22:38:31 bhill: fetching a webpage is a risk 22:38:43 dave, jh, dos is risk 22:38:43 it has to if it is serious do a connection to veriffy certificate is not on BAD cert list 22:39:00 dos is less risk because it is distributed 22:39:07 everyone can have their own box 22:39:12 so no center to attack 22:39:21 tls already has to fetch a webpage to verify a cert? 22:39:30 1st: most sited don't accept client certs at all 22:39:39 hannes: re backplane. mixed-content. let indie js widgets chat? 22:39:44 so AIA, OCSP, etc for client auth is not a current issue 22:39:50 Most slides are now linked from the agenda: http://www.w3.org/2011/identity-ws/agenda.html 22:39:51 vlad: actually, widgets only listen, not talk 22:39:58 revocation of keys works simply by deleting key from your home page . Clerezza has a delte button for that 22:40:20 tls should verifiy that cer is not revoked 22:40:25 hannes: doesn't this risk breaking the same-origin policy? 22:40:29 second, if those do exist and need to be fetched, they are supplied by the authorities in a limited set of trust roots, not by the user 22:40:44 vlad: yes, a risk of giving sensitive info to widgets 22:40:45 it's an entirely different risk picture for a server that wants to start accepting auth 22:40:49 most sites don't accept client certs because of ONE reason. It make no sense without WebID 22:40:53 prior config needs to take place 22:40:54 from a distributed trust infrastructure 22:41:04 widgets need message payload 22:41:10 because most client certs for something other than then army only works for one company 22:41:24 hannes: openid &c user chooses what gets shared. doesn't this violate that principle? 22:41:28 for client certs to make sense in consumer space: they have to work globally on every server 22:41:35 *most* sites don't even deploy anonymous TLS for server auth because of the cost 22:41:42 webId makes that dramatically worse 22:41:46 yes, cost is high 22:42:00 DANE and DNS-sec is going to make it possible to have self signed server certs 22:42:05 vlad: actually owners get control of info/signaling 22:42:09 and so mass deployment of TLS 22:42:14 hannes: that is dangerous 22:42:23 mod: you two should fight outside 22:42:28 :-) 22:42:32 mod: 22:42:51 backplane: is it being standardized in an open body 22:43:03 answer: not currently being standardized, wants to be 22:43:15 I should have just pointed at the FAQ. Most of those questions are listed there sorry http://www.w3.org/wiki/Foaf%2Bssl/FAQ 22:43:16 webid is currently a w3c incubator project 22:43:38 tlr: incubators will be replaced soon 22:44:25 websec api does not yet have a standards body or a list 22:44:58 hodges will now create a mailing list for crypto apis, possibly at ietf 22:46:29 vaibhav has joined #idbrowser 22:46:32 gss-rest is not currently in a standards track [gss track of ietf?] if interested, could find a place for it at ietf 22:46:35 who is interested? 22:47:06 ex dom elements might need to be at w3c 22:47:24 protocol could be ietf, but might as well be w3c 22:47:37 adjourn 22:49:15 btw, as I mentioned if people wish to talk around a virtual coffee feel free to skype me on bblfish 22:49:25 or call +1 (510) 931-5491 22:49:41 Sorry could not be in the US 22:52:01 multi id over single session? Clerezza has implemented that btw 22:52:13 You can login with password + WebID together 23:11:39 tantek has joined #idbrowser 23:13:37 bhill2 has joined #idbrowser 23:14:11 mark has joined #idbrowser 23:15:48 tantek: id markup for forms 23:16:03 ... type=password, pwtype="sign-in" 23:16:31 HAYASHI has joined #idbrowser 23:16:40 pwtype = "sign-in|create|confirm" 23:16:43 dittosingup 23:16:56 straw proposal 23:17:27 23:20:07 scribenick bhill2 23:20:08 fjh has joined #idbrowser 23:20:32 discussion on whether confirm password should be autofilled 23:20:46 should browser do this, or is this necessary user-interaction confirmation 23:21:40 scribe: bhill2 23:21:51 ScribeNick: bhill2 23:22:09 23:22:23 fallback to normal url 23:22:30 and normal type "email" 23:22:33 for both inputs 23:22:36 perhaps consider using role="identity" 23:22:36 tlr: 23:22:40 tlr: 23:22:41 or role 23:22:43 something like that 23:22:59 lowenthal: the incentives for using the type and representing the type are not aligned 23:23:27 dpranke: give banks, etc. an option to force re-authentication to browser pwd manager 23:23:33 instead of disabling autofill 23:23:35 dirk: banks refuse to use auto-complete because they do not have a client smart enough to check 23:24:25 input type="identity-username" 23:24:30 idtype similar to role 23:24:35 mixedpuppy has joined #idbrowser 23:24:39 stevemitchell: add additional types, smartcard, etc. 23:25:39 who?: linkage of cookies to be created as a result of signin 23:25:53 greg: but advertisers will just do that, not a t rustworthy semantic 23:26:24 role="" is inappropriate for this; role="" is for WAI-ARIA annotations and not a generic "attach additional semantics to this element" attribute 23:26:44 dave crocker: what layer to model this at - may happen at different protocols, versions? 23:27:18 tantek: specifically proposal to address at level of html form annotations, taxonomy is based strictly on existing examples 23:27:51 dcrocker: how to mature this idea into new and improved protocols, specify protocols and details 23:28:22 dan: make even more abstract, include ability to trigger, e.g. phone OTP 23:28:53 dpranke: rules for password requirements in annotations, better than existing pattern regex indications 23:29:19 a nerd's perspective on some problem: "just create the right regex? eh?" 23:29:21 a way for the site to communicate its password requirements (length, special characters, etc.) 23:29:51 dpranke: rfc 3106, supplanted by 4112, ecml alliance has vanished years ago, no need to conform to that 23:29:55 benadida has joined #idbrowser 23:30:09 tlr: draft has 20 pages 23:31:23 tantek: user still has control over "remember me" box, just option to delegate preferences to browser 23:32:34 new speaker: tyler close, google 23:33:36 topic: web introducer 23:33:46 thanks everyone - great suggestions 23:34:01 many existing identity systems, based on existing browser tech 23:34:11 what tiny chagnes could we make to allow new systems to evolve? 23:34:13 You can communicate password requirements with the form constraint validation API: http://www.whatwg.org/specs/web-apps/current-work/complete/association-of-controls-and-forms.html#the-constraint-validation-api 23:34:19 Ecml appears to have been largely about ecommerce, wallets, (Billing address, card number) etc. 23:34:51 e.g. nascar problem for openID, and full window page transitions for redirects to IdP 23:35:20 two problems; how does RP discover IdPs, how does IdP get consent from user? 23:35:51 demo: small API to do these two things 23:36:12 my slides btw: http://tantek.com/presentations/2011/05/idinputs/ 23:36:14 @hober : last I looked that API didn't work for me. 23:36:37 http://web-send.org/introducer/ 23:36:42 the draft spec 23:36:58 example bookmark sharing service. clicking shows a list from the user agent showing what social bookmarking services the user has configured 23:36:59 http://web-send.org/bookmark/ 23:37:04 the bookmarking example 23:37:35 UI is from user agent, choices not shared with server, UI is clickjacking resistant (so IdP gets reliable confirmation of user intent) 23:37:41 dpranke has joined #idbrowser 23:37:51 browser pops iframe for completion of the action 23:38:16 nascar is avoided by browser presentation: can be aware of context-sensitive valid choices 23:39:20 same idea works for lightweight version of openid-like protocol to deliver email address attestation 23:39:39 could be a variety of types, vcards, calendar entries... 23:40:20 new feature in browser: browser services in a gold bar 23:40:34 allow services to be registered in browser 23:41:10 new options show up in the browser-presented bookmark sharing service choices after simple opt-in 23:41:34 no need to rely on site to have your service button (reddit, digg, etc..) 23:42:06 anyone can hook into this API and get 100% coverage of all offerings of that type on the web 23:42:15 question: failover? 23:42:28 implemented in firefox using only javascript 23:42:50 unmodified firefox demo 23:43:05 opens transparent iframe to trusted site and uses clickjacking to get dropdown 23:43:41 if using