IRC log of crypto on 2012-06-18
Timestamps are in UTC.
- 18:53:43 [RRSAgent]
- RRSAgent has joined #crypto
- 18:53:43 [RRSAgent]
- logging to http://www.w3.org/2012/06/18-crypto-irc
- 18:54:31 [virginie_galindo]
- Zakim, this will be Crypto
- 18:54:31 [Zakim]
- I do not see a conference matching that name scheduled within the next hour, virginie_galindo
- 18:54:44 [virginie_galindo]
- Zakim, this will be WebCrypto
- 18:54:44 [Zakim]
- I do not see a conference matching that name scheduled within the next hour, virginie_galindo
- 18:54:47 [wseltzer_transit]
- zakim, this will be CRYPT
- 18:54:47 [Zakim]
- ok, wseltzer_transit; I see SEC_WebCryp()3:00PM scheduled to start in 6 minutes
- 18:56:17 [virginie_galindo]
- Chair:virginie_galindo
- 18:56:40 [hhalpin]
- hhalpin has joined #crypto
- 18:57:07 [Zakim]
- SEC_WebCryp()3:00PM has now started
- 18:57:11 [JimD]
- JimD has joined #crypto
- 18:57:13 [hhalpin]
- agenda?
- 18:57:15 [Zakim]
- +??P0
- 18:58:05 [virginie_galindo]
- agenda+ Welcome
- 18:58:18 [Zakim]
- + +1.773.939.aaaa
- 18:58:25 [hhalpin]
- Zakim, what's the code?
- 18:58:25 [Zakim]
- the conference code is 27978 (tel:+1.617.761.6200 sip:zakim@voip.w3.org), hhalpin
- 18:58:37 [virginie_galindo]
- agenda+ use cases update on wiki
- 18:58:50 [Zakim]
- +??P3
- 18:58:55 [drogersuk]
- zakim, ??P0 is drogersuk
- 18:58:55 [Zakim]
- +drogersuk; got it
- 18:58:56 [hhalpin]
- Zakim, ??P3 is hha;pin
- 18:58:56 [Zakim]
- +hha;pin; got it
- 18:59:00 [virginie_galindo]
- agenda+ Editors draft API (no change)
- 18:59:13 [hhalpin]
- Zakim, hha;pin is hhalpin
- 18:59:13 [Zakim]
- +hhalpin; got it
- 18:59:20 [Zakim]
- + +1.707.799.aabb
- 18:59:25 [ddahl]
- ddahl has joined #crypto
- 18:59:29 [virginie_galindo]
- agenda+ garage under github
- 18:59:30 [hhalpin]
- Zakim, pick a scribe
- 18:59:30 [Zakim]
- Not knowing who is chairing or who scribed recently, I propose +1.707.799.aabb
- 18:59:38 [emily]
- zakim, aabb is emily
- 18:59:38 [Zakim]
- +emily; got it
- 18:59:43 [markw]
- markw has joined #crypto
- 18:59:45 [Zakim]
- +[Microsoft]
- 18:59:47 [Zakim]
- + +1.978.936.aacc
- 18:59:49 [virginie_galindo]
- agenda+ group life
- 19:00:13 [PhilipG]
- PhilipG has joined #crypto
- 19:00:13 [Zakim]
- + +1.978.652.aadd
- 19:00:29 [hhalpin]
- Convening Web Crypto June 19th 2012
- 19:00:43 [hhalpin]
- chair: virginie_galindo
- 19:00:48 [hhalpin]
- scribe: emily
- 19:01:18 [hhalpin]
- Scribenick: emily
- 19:01:20 [Zakim]
- + +1.415.867.aaee
- 19:01:31 [Zakim]
- + +1.650.214.aaff
- 19:01:31 [markw]
- Zakim, aaee is markw
- 19:01:33 [Zakim]
- +markw; got it
- 19:01:39 [Zakim]
- + +33.6.13.23.aagg
- 19:01:44 [Zakim]
- + +1.202.470.aahh
- 19:02:40 [rsleevi]
- rsleevi has joined #crypto
- 19:02:51 [Zakim]
- + +1.510.387.aaii
- 19:02:53 [hhalpin]
- Zakim, aaff is wtc
- 19:02:53 [Zakim]
- +wtc; got it
- 19:02:57 [virginie_galindo]
- aagg is virginie_galindo
- 19:02:59 [hhalpin]
- Zakim, aaff has rsleevi
- 19:02:59 [Zakim]
- sorry, hhalpin, I do not recognize a party named 'aaff'
- 19:03:05 [hhalpin]
- Zakim, wtc has rsleevi
- 19:03:05 [Zakim]
- +rsleevi; got it
- 19:03:14 [hhalpin]
- Zakim, who's on the phone?
- 19:03:15 [Zakim]
- On the phone I see drogersuk, +1.773.939.aaaa, hhalpin, emily, [Microsoft], +1.978.936.aacc, +1.978.652.aadd, markw, wtc, +33.6.13.23.aagg, +1.202.470.aahh, +1.510.387.aaii
- 19:03:15 [Zakim]
- wtc has rsleevi
- 19:03:34 [Zakim]
- +??P18
- 19:03:36 [hhalpin]
- Zakim, aaaa is ddahl
- 19:03:36 [Zakim]
- +ddahl; got it
- 19:03:39 [JimD]
- Zakim, aadd is JimD
- 19:03:39 [Zakim]
- +JimD; got it
- 19:03:45 [self-issued]
- Mike Jones
- 19:03:46 [sdurbha]
- sdurbha has joined #crypto
- 19:03:58 [hhalpin]
- Zakim, aacc is PhilipG
- 19:03:58 [Zakim]
- +PhilipG; got it
- 19:04:07 [hhalpin]
- Zakim, is JimD
- 19:04:07 [Zakim]
- I don't understand 'is JimD', hhalpin
- 19:04:17 [wtc]
- wtc has joined #crypto
- 19:04:18 [hhalpin]
- Zakim, aagg is virginie_galindo
- 19:04:18 [Zakim]
- +virginie_galindo; got it
- 19:04:54 [hhalpin]
- Zakim, aahh is JohnBradley
- 19:04:54 [Zakim]
- +JohnBradley; got it
- 19:05:16 [hhalpin]
- Zakim, aaii ChristopherKula
- 19:05:16 [Zakim]
- I don't understand 'aaii ChristopherKula', hhalpin
- 19:05:20 [hhalpin]
- Zakim, aaii is ChristopherKula
- 19:05:20 [Zakim]
- +ChristopherKula; got it
- 19:05:47 [hhalpin]
- agenda?
- 19:05:55 [hhalpin]
- Zakim, who's on the phone?
- 19:05:55 [Zakim]
- On the phone I see drogersuk, ddahl, hhalpin, emily, [Microsoft], PhilipG, JimD, markw, wtc, virginie_galindo, JohnBradley, ChristopherKula, ??P18
- 19:05:57 [Zakim]
- wtc has rsleevi
- 19:06:03 [emily]
- virginie_galindo: role call of delegates
- 19:06:04 [christopherkula]
- christopherkula has joined #crypto
- 19:06:12 [virginie_galindo]
- virginie_galindo has joined #crypto
- 19:06:26 [Zakim]
- -virginie_galindo
- 19:06:37 [hhalpin]
- Zakim, who's on the phone?
- 19:06:37 [Zakim]
- On the phone I see drogersuk, ddahl, hhalpin, emily, [Microsoft], PhilipG, JimD, markw, wtc, JohnBradley, ChristopherKula, ??P18
- 19:06:39 [Zakim]
- wtc has rsleevi
- 19:06:59 [Zakim]
- +virginie_galindo
- 19:07:01 [sdurbha]
- I guess ??P18 is me, sdurbha
- 19:07:05 [Zakim]
- +??P4
- 19:08:26 [Zakim]
- + +46.7.02.69.aajj
- 19:08:35 [hhalpin]
- Zakim, [Microsoft] has self-issued
- 19:08:35 [Zakim]
- +self-issued; got it
- 19:09:23 [saerd]
- saerd has joined #crypto
- 19:10:27 [emily]
- virginie_galindo: several new participants this week from Microsoft, Red Hat, David Rogers
- 19:12:53 [emily]
- virginie_galindo: any other topics to discuss besides what's on the agenda?
- 19:13:04 [hhalpin]
- Zakim, next agendum
- 19:13:04 [Zakim]
- agendum 1. "Welcome" taken up [from virginie_galindo]
- 19:13:43 [emily]
- virginie_galindo: hhalpin, do we need a resolution to approve previous minutes?
- 19:13:51 [hhalpin]
- PROPOSAL: We approve the minutes of the last call as correct
- 19:14:30 [hhalpin]
- APPROVED: last week's minutes are correct
- 19:14:42 [hhalpin]
- Zakim, next agendum
- 19:14:42 [Zakim]
- agendum 2. "use cases update on wiki" taken up [from virginie_galindo]
- 19:14:46 [hhalpin]
- topic: use-cases
- 19:15:23 [emily]
- virignie_galindo: people felt that there was a lack of use cases, so use cases have been enriched
- 19:15:39 [emily]
- ... contributions from groups for identity and crypto
- 19:15:48 [virginie_galindo]
- http://www.w3.org/2012/webcrypto/wiki/Main_Page
- 19:17:07 [emily]
- virginie_galindo: use cases separate primary and secondary features, use cases collected from survey participants
- 19:17:47 [emily]
- ... if you didn't have time to look at use cases, have a look and propose suggestions, improvements, new use cases
- 19:17:55 [emily]
- ... still under construction
- 19:18:09 [emily]
- ... any questions on use cases?
- 19:18:44 [hhalpin]
- Zakim, next agendum
- 19:18:44 [Zakim]
- agendum 3. "Editors draft API (no change)" taken up [from virginie_galindo]
- 19:18:48 [hhalpin]
- topic: Editors Draft API
- 19:19:13 [jbradley]
- jbradley has joined #crypto
- 19:19:18 [emily]
- ddahl: things are under construction in github repo
- 19:19:59 [emily]
- ddahl: trying to design what a key id, public key might look like
- 19:20:03 [virginie_galindo]
- Zakim, next agendum
- 19:20:03 [Zakim]
- agendum 4. "garage under github" taken up [from virginie_galindo]
- 19:20:15 [emily]
- ... ArrayBuffer might hold data that translates into JWK object
- 19:20:19 [ddahl]
- https://github.com/daviddahl/web-crypto-ideas/blob/master/key-ids.js
- 19:20:49 [emily]
- ... still discussing what this will look like
- 19:21:18 [emily]
- ... questions inline on the github page, would be nice to figure out issues right in that repo
- 19:21:26 [emily]
- ... but either that or email is fine
- 19:22:01 [emily]
- ... also trying to nail down algorithm discovery
- 19:22:20 [virginie_galindo]
- https://github.com/daviddahl/web-crypto-ideas/blob/master/algorithm-discovery.js
- 19:22:23 [emily]
- ??: algorithm discovery or key discovery?
- 19:22:35 [emily]
- ddahl: algorithm discovery, discovering what algorithms supported by api or implementation
- 19:22:55 [emily]
- ??: smartcards mean algorithm list could possibly change, might want notification on algorithm change
- 19:23:08 [emily]
- ... algorithms are tied to module, sub-component, that can come and go which could make it messy
- 19:23:14 [emily]
- s/??/PhilipG
- 19:23:16 [hhalpin]
- s/??/PhilipG
- 19:23:27 [Zakim]
- -JimD
- 19:23:42 [rsleevi]
- q+
- 19:23:54 [zooko]
- zooko has joined #crypto
- 19:23:56 [drogersuk]
- (not me speaking)
- 19:23:59 [hhalpin]
- q+
- 19:24:10 [zooko]
- Hello folks! Sorry I'm late. Going to call in now.
- 19:24:13 [Zakim]
- +JimD
- 19:24:15 [emily]
- PhilipG: smart card might support some flavor of ECC that the browser does not
- 19:24:41 [emily]
- virginie_galindo: the secure element or smart card might be a means to store the key, but actual operation would not happen inside the smart card?
- 19:25:01 [emily]
- PhilipG: can't export key from smart card, so operations have to be done on card
- 19:25:16 [emily]
- JimD: smart card has to be available for algorithm list, since can't retrieve the key
- 19:25:41 [emily]
- jbradley: point of smart card is that private key can't be exported, so type of key and algorithms that operate directly on the key go in and out of crypto suite with the card
- 19:25:42 [Zakim]
- + +1.902.444.aakk
- 19:25:44 [virginie_galindo]
- q+
- 19:25:58 [zooko]
- Zakim: +1.902.44.aakk is me.
- 19:26:39 [emily]
- rsleevi: my take is that smart card provisioning, authenticating/locating keys that are stored on secure elements, those discussions are out of scope, but use of keys is in scope
- 19:27:20 [emily]
- ... e.g. RSA key with OAEP or PSS, shouldnt be used with PKCS 1.5, so which one you use will depend on what you've used it with before
- 19:27:38 [emily]
- ... so algorithm discovery still applies even with smart cards out of conversation
- 19:28:58 [emily]
- hhalpin: to remind people, potentially infinite number of operations one could perform, maybe should think about it as if we want to allow an extensible number of operations
- 19:29:31 [emily]
- ... standardize core operations that we hope will perform across all browsers, and should move forward on this
- 19:30:00 [emily]
- virginie_galindo: operation that happens in smart card will have to be discovered
- 19:30:16 [hhalpin]
- just pointing out discovery can happen without smartcards
- 19:30:22 [hhalpin]
- but that this is a somewhat hard problem
- 19:30:31 [rsleevi]
- q+
- 19:30:35 [hhalpin]
- and thus, maybe try to move forward on rsleevi's low level proposal
- 19:30:37 [hhalpin]
- q- hhalpin
- 19:30:41 [emily]
- ddahl: could have an event, not sure yet
- 19:31:27 [virginie_galindo]
- q- virginie_galindo
- 19:31:28 [emily]
- rsleevi: for discovery, there are two types (could I ever possibly support X, and could I support X with this type of key)
- 19:31:40 [emily]
- ... do these two types meet needs, or are there other types needed?
- 19:32:03 [rsleevi]
- q- rsleevi
- 19:32:21 [zooko]
- I either need to think about it or I am happy with your proposal.
- 19:32:40 [hhalpin]
- multiple keystores are in secondary features BTW :)
- 19:32:46 [emily]
- jbradley: the real issue is whether keystores can by dynamically added and removed
- 19:33:01 [rsleevi]
- jbradley: The KeyQueryList might be able to accomplish this
- 19:33:18 [emily]
- ... there may be times when dynamic keystores may affect discovery results, since you would have different keys
- 19:34:32 [drogersuk]
- q+
- 19:34:36 [emily]
- jbradley: should try and differentiate between smart cards (where processing happens on card), or just plain keystores
- 19:34:56 [emily]
- drogersuk: how reliable do we expect information to be?
- 19:35:36 [emily]
- drogersuk: theoretically, could maybe execute attack on false discovery information, data is not assured
- 19:36:18 [emily]
- virginie_galindo: we know that security's not perfect, so we have to make some assumption about how far we trust the platform
- 19:36:35 [emily]
- ... here it's up to the browser makers to tell us if the answer is something we can trust or not
- 19:36:36 [zooko]
- q+
- 19:36:40 [drogersuk]
- q-
- 19:37:11 [rsleevi]
- q+
- 19:37:32 [hhalpin]
- q+q+
- 19:37:33 [hhalpin]
- q+
- 19:37:37 [hhalpin]
- q- q+
- 19:37:40 [emily]
- zooko: web browser running on general purpose computer is a very common setup. to me, personally the most interesting use cases are about web browsers running on general purpose devices, without smart cards or auth tokens or anything else
- 19:37:53 [hhalpin]
- q- zooko
- 19:38:49 [ddahl]
- rsleevi ++
- 19:38:56 [emily]
- rsleevi: one of the ideas we've been thinking about, as far as web app security goes, can a script alter the algorithms or lie or that sort of thing, content-security policy might be a condition for this API. maybe you have to have a CSP of some minimum criteria to prevent xss
- 19:39:07 [emily]
- ... that's one possibility that could maybe improve trustworthiness of API
- 19:39:36 [emily]
- ... ddahl raised point about trying to make weak security hard to use. still trying to figure out what csp can bring
- 19:39:46 [rsleevi]
- q-
- 19:40:06 [ddahl]
- q+
- 19:40:54 [emily]
- hhalpin: from operational standpoint, have to prioritize browsers without smart cards. secondary features start to think about multiple keystores, discovery algorithms. be sure to document all these use cases
- 19:41:18 [emily]
- virginie_galindo: we've been discussing about key discovery, so you are suggesting that dynamic keystores might be secondary features?
- 19:41:53 [emily]
- hhalpin: multiple keystores/smartcard functionality is in secondary features. the discovery problem (high-level vs low-level API) is in primary features. until we have a concrete example of how discovery works, we might want to move on to low-level API
- 19:42:34 [emily]
- ... or if someone has a very concrete suggestion about exactly how discovery would work that would satisfy smartcard use cases, that would be good
- 19:43:40 [rsleevi]
- hhalpin: I think the KeyQueryList might be a concrete solution that we can use as a strawman
- 19:44:20 [wtc]
- For smart cards, key discovery should be enough. If a smart card has a key, the smart card must be able to use the key. So the key implies the support of its algorithm.
- 19:44:46 [hhalpin]
- Agreed, I don't see why in principle why that wouldn't work over smartcards, but I'm not a smartcard expert
- 19:45:18 [ddahl]
- q-
- 19:45:18 [emily]
- ddahl: as we come across additional ideas for browser features to help with the trust issues, we can enumerate them and keep them around for the future. No one here thinks that the API by itself is a silver bullet, but this API along with other features can provide much more secure environment
- 19:45:25 [zooko]
- ddahl: good point!
- 19:45:27 [hhalpin]
- q-
- 19:45:33 [ddahl]
- zooko: thx:)
- 19:46:10 [hhalpin]
- If the editors feel the KeyQueryList is good enough, they can add that to the Editors Draft
- 19:46:50 [emily]
- virginie_galindo: coming back to how keys should be identified, key lifetime, so I'll summarize this discussion
- 19:47:03 [emily]
- ... group agreed that keys should be created with associated algorithms
- 19:47:14 [emily]
- ... discussion about whether key should be ephemeral or persistent
- 19:47:26 [emily]
- ... discussion about whether key will be extractable or not, the group decided that it will be both
- 19:47:41 [jbradley]
- harry: A key in a smart card may be discoverable, but you may not be able to extract it, only use it with the embedded algorithm processor on the card.
- 19:48:53 [jbradley]
- I agree that smart cards are not a priority for me. There are existing ways to use a PIV card that more or less work for people.
- 19:49:11 [emily]
- ... extractable or not, can be used one or several services, ephemeral or persistent
- 19:49:35 [emily]
- ddahl: some details haven't been worked out. as far as extractability, when a key is created, key would be flagged as extractable or not
- 19:49:50 [emily]
- ... as an optional argument. Default maybe would be that private key is not accessible to content
- 19:50:00 [hhalpin]
- jbradley: we understand the extraction (not needed, but possible, see ddahl), the open question to me is if we want a "discovery" event that says the number of algorithms has been increased.
- 19:50:04 [emily]
- ... again, still a lot of details to work out. What's in github is not quite the latest thinking
- 19:50:04 [virginie_galindo]
- ... a key is -Shaped for a specific usage (algo, padding, …)
- 19:50:10 [zooko]
- That sounds good to me. It would satisfy my desires, and seems good for the other kind of use case as well.
- 19:50:39 [emily]
- virginie_galindo: any questions on key identification, etc.?
- 19:50:40 [rsleevi]
- ddahl: That is in line with what I was thinking, and I think covers most use cases
- 19:51:10 [ddahl]
- rsleevi: thanks for sending that proposal!
- 19:51:11 [emily]
- virginie_galindo: very recent mail from Ryan proposes low-level API
- 19:51:50 [emily]
- rsleevi: KeyQueryList needs to be revisited. Low-level API assumes you have a key, doesn't cover derivation or generation
- 19:51:56 [emily]
- ... yet
- 19:52:05 [virginie_galindo]
- ... a key has a Lifetime stamped – ephemeral or persistent, not sure it leads to a specific property
- 19:52:26 [Zakim]
- -JimD
- 19:52:31 [virginie_galindo]
- ... a key is Extractable or not (to be exchanged with external world, or manipulated directly and only by webapp)
- 19:52:44 [emily]
- ... One of the design goals is keeping API names meaningful but short, since they can't be minified or compressed
- 19:53:04 [virginie_galindo]
- ...... a key is Named uniquely (by service provider scheme, by browser scheme)
- 19:53:09 [emily]
- ... Interface sees commonality between digesting, MACing, sigs, verification, enc/decryption, modeled after File API
- 19:53:24 [emily]
- ... messaging, file transfer, exchanges should be supported
- 19:53:25 [Zakim]
- +JimD
- 19:53:48 [virginie_galindo]
- ... a key is Reusable or not by other service (linked with same-origin, or multiple origin)
- 19:53:52 [zooko]
- That sort of streamy common interface is used in the Crypto++ library, for what it is worth.
- 19:54:11 [hhalpin]
- q+
- 19:54:18 [virginie_galindo]
- ... a key is Invoked (by properties, by name, by usage, …)
- 19:54:29 [emily]
- rsleevi: not sure whether to proceed with discussion via email or github, or w3c mercurial, whatever chairs/editors feel is best
- 19:55:20 [JimD]
- JimD has joined #crypto
- 19:55:23 [emily]
- hhalpin: editors ultimately decide what goes in w3c space
- 19:55:32 [emily]
- ... beneficial to publish quick and early with open issues list
- 19:56:33 [virginie_galindo]
- q+
- 19:56:38 [wtc]
- hhalpin: your proposal sounds good to me.
- 19:56:39 [hhalpin]
- q- hhalpin
- 19:56:59 [emily]
- virginie_galindo: summary of what I feel our API should contain
- 19:57:11 [emily]
- ... should draft the way we use keys
- 19:57:15 [emily]
- ... should have discovery mechanism
- 19:57:24 [emily]
- ... should have the way that keys are named/identifier
- 19:57:27 [hhalpin]
- Proposal would be to look at low-level API over next week and check it into Github ASAP, and then we spend some time at an editors meeting to push it into an Editor's Draft in W3.org space next week for draft approval in July.
- 19:57:41 [wtc]
- q+
- 19:57:48 [virginie_galindo]
- q-
- 19:57:53 [emily]
- wtc: the next big missing piece is key management
- 19:57:57 [markw]
- q+
- 19:58:05 [emily]
- ... personally think discovery mechanism is not as important
- 19:58:17 [emily]
- ... developers will quickly figure out what commonly supported algorithms are
- 19:58:35 [self-issued]
- Mike Jones / Microsoft signing off - I have another commitment at the top of the hour.
- 19:58:41 [emily]
- wtc: key management means the operations that actually produce key handles (generate, derive, find, delete keys)
- 19:58:42 [Zakim]
- -[Microsoft]
- 19:59:03 [Zakim]
- - +46.7.02.69.aajj
- 19:59:37 [emily]
- virginie_galindo: its up to us to decide what goes in public draft
- 19:59:39 [rsleevi]
- markw: Is the Editors Draft going to reflect rsleevi's proposal, ddahl's github work, or something else?
- 19:59:45 [emily]
- markw: closing all open issues in the next week is ambitious
- 19:59:51 [hhalpin]
- q+
- 20:00:01 [hhalpin]
- I am stating we publish *with* open issues.
- 20:00:09 [hhalpin]
- We do not have to resolve all open issues
- 20:00:35 [ddahl]
- hhalpin ++
- 20:00:41 [wtc]
- q-
- 20:00:47 [emily]
- virginie_galindo: a lot of issues will probably be resolved at f2f meeting
- 20:01:07 [markw]
- q-
- 20:01:21 [emily]
- hhalpin: just to clarify, it's completely fine to have open issues in working draft
- 20:01:27 [emily]
- ... often advantageous to do so
- 20:02:03 [emily]
- usually, first public working draft is some sort of strawman, fairly comprehensive exploration of options in the design space
- 20:02:57 [abstractj]
- abstractj has joined #crypto
- 20:03:00 [Zakim]
- -??P18
- 20:03:04 [hhalpin]
- I'd suggest everyone look closely at rsleevi's proposal closely over the next week!
- 20:03:24 [emily]
- virginie_galindo: everyone should look at Ryan's proposal and ddahl's github
- 20:04:39 [emily]
- ... On topic of group life, privacy interests group, crypto working group, DNT might be able to help us with e.g. privacy problems that come up for us
- 20:05:06 [emily]
- ... I reported what we were doing and that we care about privacy, and how we can improve privacy
- 20:05:35 [emily]
- ... anyone who feels we should speak more with IETF, should tell us
- 20:05:41 [hhalpin]
- I suggest folks join the WebSec IETF mailing list
- 20:06:06 [hhalpin]
- https://www.ietf.org/mailman/listinfo/websec
- 20:06:14 [hhalpin]
- Is a good list for co-ordination with the IETF
- 20:06:37 [emily]
- virginie_galindo: f2f meeting is at end of July
- 20:06:59 [emily]
- ... 18 votes, mountain view is winner
- 20:07:31 [emily]
- ... any comment, july 24-25th in mountain view?
- 20:08:19 [emily]
- ... Another f2f in october or november, where we'll work on comments from public.
- 20:08:39 [emily]
- ... if you're planning to attend f2f in july, tell ddahl (who is organizing it) that you're attending
- 20:08:45 [emily]
- ddahl: meeting at mozilla office, more details to come
- 20:09:22 [hhalpin]
- RESOLUTION: Informal f2f July24-25th Mountain View
- 20:09:41 [hhalpin]
- q+
- 20:09:47 [emily]
- virginie_galindo: no call next week, next meeting in 2 weeks
- 20:09:51 [emily]
- ... end of June
- 20:10:16 [emily]
- hhalpin: if people are interested, editors could use that time to go over bureaucracy of w3c publishing
- 20:10:37 [virginie_galindo]
- next meeting will be on 2nd of july
- 20:11:07 [hhalpin]
- No, informal meeting
- 20:11:42 [hhalpin]
- RRSAgent, generate minutes
- 20:11:42 [RRSAgent]
- I have made the request to generate http://www.w3.org/2012/06/18-crypto-minutes.html hhalpin
- 20:11:51 [zooko]
- Buye folks!
- 20:11:57 [hhalpin]
- Thanks everyone!
- 20:11:59 [hooley]
- hooley has left #crypto
- 20:59:06 [tl1]
- tl1 has joined #crypto
- 21:18:20 [tl]
- tl has joined #crypto
- 23:17:11 [ddahl]
- ddahl has joined #crypto