19:54:11 RRSAgent has joined #crypto 19:54:11 logging to http://www.w3.org/2012/11/12-crypto-irc 19:54:13 RRSAgent, make logs public 19:54:13 Zakim has joined #crypto 19:54:15 Zakim, this will be SEC_WebCryp 19:54:15 ok, trackbot; I see SEC_WebCryp()3:00PM scheduled to start in 6 minutes 19:54:16 Meeting: Web Cryptography Working Group Teleconference 19:54:16 Date: 12 November 2012 19:54:29 Chair: Virginie_Galindo 19:54:30 agenda ? 19:54:41 agenda+ welcome 19:55:21 agenda+ debrief F2F (optional) 19:55:40 agenda+ use cases 19:56:00 agenda+ action review 19:56:28 agenda+ mailing list discussion (summary) 19:56:57 agenda+ group life (calls, next F2F) 19:59:19 wseltzer has changed the topic to: WebCrypto call: Monday, Nov. 12, 1900 UTC+1 19:59:37 SEC_WebCryp()3:00PM has now started 19:59:44 +??P0 20:00:34 +??P2 20:00:45 zakim, ??P2 is me 20:00:45 +wseltzer; got it 20:00:52 +ddahl 20:01:07 + +1.303.661.aaaa 20:01:09 +??P5 20:01:25 sdurbha has joined #crypto 20:01:26 markw has joined #crypto 20:01:28 zakim, ??p0 is rsleevi 20:01:28 +rsleevi; got it 20:01:42 ??p5 is virginie 20:01:52 zakim, ??p5 is virginie 20:01:52 +virginie; got it 20:02:10 + +1.415.867.aabb 20:02:17 zakim, aaaa is sdurbha 20:02:17 +sdurbha; got it 20:02:29 Zakim, aabb is markw 20:02:29 +markw; got it 20:03:31 emily has joined #crypto 20:03:36 rsleevi has joined #crypto 20:03:45 arunranga has joined #crypto 20:04:01 + +1.707.799.aacc 20:04:05 wtc has joined #crypto 20:04:06 zakim, aacc is me 20:04:06 +emily; got it 20:04:33 + +1.415.294.aadd 20:04:42 zakim, aadd is me 20:04:42 +arunranga; got it 20:05:15 ddahl has joined #crypto 20:05:25 zakim, who is onthe phone ? 20:05:25 I don't understand your question, virginie. 20:05:25 Zakim, what's the code? 20:05:26 the conference code is 27978 (tel:+1.617.761.6200 sip:zakim@voip.w3.org), hhalpin 20:05:35 zakim, who is on the phone ? 20:05:35 On the phone I see Google, wseltzer, ddahl, virginie, sdurbha, markw, emily, arunranga 20:05:38 Google has rsleevi, wtc 20:06:05 +[IPcaller] 20:06:06 agenda? 20:06:11 Zakim, [IPCaller] is hhalpin 20:06:11 +hhalpin; got it 20:06:25 zakim, who is noisy? 20:06:39 arunranga, listening for 11 seconds I heard sound from the following: wseltzer (3%), virginie (92%) 20:07:30 yes 20:07:39 chair: virginie 20:07:43 scribe: hhalpin 20:07:49 scribenick: hhalpin 20:08:36 agenda? 20:08:45 agenda+ 20:08:56 Zakim, next agendum 20:08:56 agendum 1. "welcome" taken up [from virginie] 20:09:21 The main topic of discussion will be ISSUE-5, the "Rethinking KeyStorage Issue" 20:10:02 PROPOSAL: Approve minutes of Oct 20th meeting and TPAC minutes? 20:10:16 RESOLVED: Approved minutes of Oct 20th meeting and TPAC minutes 20:10:19 Chris has joined #crypto 20:10:22 Zakim, next agendum 20:10:22 agendum 2. "debrief F2F (optional)" taken up [from virginie] 20:11:08 + +1.650.228.aaee 20:11:21 Zakim aaee is Chris 20:11:29 Folks are OK with skipping this and getting straight to issues 20:12:50 [Minutes and slides linked from www.w3.org/2012/webcrypto/wiki/F2F_TPAC_Lyon_Nov2012] 20:13:02 Discussion of keystorage by Ryan Sleevi, security concerns (defining value of API) work led by David Rogers/WebAppSec 20:13:22 A few new issues and actions, including discussion of formats 20:13:47 Also, use-case document and Korean banking use-case was highly discussed. 20:13:51 Zakim, next agendum 20:13:51 agendum 3. "use cases" taken up [from virginie] 20:14:32 Arun: not much progress since last call 20:14:44 ... had some one off conversations about Korean use-case 20:14:50 ... clear it can't be solved on its own 20:14:53 ... by our API 20:14:59 ... likely needs our API+SysApps 20:15:39 ... even so, would require some substantial retooling of the use-case 20:15:41 Virginie: Thanks for the recap, appreciate it 20:15:53 ... so in our document, we need to document what subset of the Korean banking use-case we can solve 20:16:02 q+ 20:16:17 arun: some recap of pgp key exchange and kerberos use-case 20:16:46 +1 gatekeeping, as said on mailing list, kerberos is pretty far out 20:17:05 arun: I think we should keep kerberos to more future work 20:18:56 q? 20:20:21 That particular ticket is in SysTeam's Alexandre's hands, will keep pinging 20:20:39 Chris: Kept following up with the Facebook signed use of local storage use-case 20:21:15 Chris: Is crypto-hashing good enough or do we need to get to certs? 20:21:34 Arun: Hashing plus signing might be even more! 20:21:36 q+ 20:21:48 ack Chris 20:22:02 Chris: I think maybe that could be handy 20:22:04 Somewhat tangential since it sounds like we're not considering Kerberos to be realistic, but here's a JS kerberos client that someone I know is working on: https://github.com/davidben/webathena 20:22:21 ack hhalpin 20:23:01 http://www.w3.org/2012/webcrypto/track/actions/open 20:23:28 anyways, if Facebook doesnt need signed hashing, quite a few other folks claim they need it for reasons that I haven't had time to contemplate: Martus, Crypto.Cat, etc. 20:23:36 pal has joined #crypto 20:23:37 emily: yes, rsleevi and I know davidben, too. He told us about his JS Kerberos client when we saw him last month. 20:24:07 + +1.650.458.aaff 20:24:18 http://www.w3.org/2012/webcrypto/track/actions/67 20:24:26 ACTION-67? 20:24:26 ACTION-67 -- Virginie GALINDO to legal aspects with respect to national directives -- due 2012-12-19 -- OPEN 20:24:26 http://www.w3.org/2012/webcrypto/track/actions/67 20:24:59 Zakim, next agendum 20:24:59 agendum 4. "action review" taken up [from virginie] 20:25:14 q+ to ask about ACTION-67 20:25:15 Virginie: not completed actions there 20:25:46 ack rsleevi 20:25:46 rsleevi, you wanted to ask about ACTION-67 20:26:11 Virginie: lets make sure we label things correctly re some of the reqirements 20:26:22 rsleevi: I'm hoping to keep out of legal requirements 20:26:37 ... other than state vaguely why one may not have some algorithms on same place 20:26:39 q+ 20:26:49 ack wseltzer 20:27:52 wselzter: we may want to have this legal conversation offline 20:28:17 Virginie: I just want it noted that some crypto is not allowed in certain countries, but should not disturb our work 20:28:36 Zakim, next agendum 20:28:36 agendum 5. "mailing list discussion (summary)" taken up [from virginie] 20:29:10 q+ 20:29:36 q+ 20:29:56 rsleevi: the sum of our face to face was keystorage 20:30:02 ... proposal was to remove new types of storage 20:30:11 ... so that we assume whatever best of breed storage in WebApps is the best 20:30:44 ... thus we will just define a structured clone for key objects 20:30:46 ... thats it! 20:31:08 ... markw said this gets rid of pre-provisioned keys 20:31:28 ... can we support them in the spec, then we need to have a consideration for pre-provisioned keys 20:31:37 q+ 20:32:36 ... my goal is to carefully scope features and try to keep spec thin 20:33:38 Virginie: so what is your take on pre-provisioned keys? 20:34:13 I am worried about storage in general; and I'm worried that the "best of breed" storage recommendation from WebApps WG will put us in a straightjacket. 20:34:22 rsleevi: both Google and Mozilla expressed concerns on implementation 20:34:30 ... just a whole new host of pre-provisioned keys 20:34:35 q+ 20:34:38 q+ 20:34:44 ... that extends lifetime of localstorage etc. 20:35:40 ack rsleevi 20:36:21 markw: it wasn't clear that removing keystorage removed the pre-provisioned key ideas 20:36:37 ... I think its a good idea of using a structured clone algorithms 20:36:45 ... its been there since the workshop and beginning for us 20:38:07 ... we have some implementations where the implementers are not the one's that the W3C are usually used to, i.e. browsers! 20:38:15 q? 20:38:20 ... but other implementers are using things 20:38:30 ... and will want them in the spec 20:38:40 This is not at all uncommon that capabilities are limited to particular device types - see for example vibration events, geolocation, or touch events. However, they're traditionally split from device-agnostic bits to device-specific bits 20:40:01 ... we want privacy concerns, I think its fine that users can remove pre-provisioned keys if they know some particular kind of service will stop operating 20:40:15 ... i.e. if I remove the "Fox TV" key, then I can't watch Fox. 20:40:18 q? 20:40:20 ack markw 20:40:23 ack hhalpin 20:41:34 we don't need a separate key storage for pre-provisioned keys - we just need a way to find them and KeyStorage is the only way right now 20:42:50 -hhalpin 20:43:11 weird 20:44:04 +??P11 20:44:12 q+ 20:44:17 Zakim, ??P11 is hhalpin 20:44:17 +hhalpin; got it 20:44:38 sdurbha: @@. If our goal is provide a library for basic crypto operations, who's waiting to use that? 20:45:11 ... privacy. I don't see this as worse than cookie usage today. 20:45:28 q+ to respond to sdurbha 20:45:29 ... keys unique per application running on the device is not device ID. 20:45:37 ack sdurbha 20:45:40 ack pal 20:46:10 pal: Can we separate: structures and calls described by API; what happens behind the scenes (privacy, storage) 20:46:30 pal: what is the downside with connecting guid to a key? 20:46:38 ... re privacy/storage 20:47:13 q? 20:47:42 q+ 20:47:46 q+ 20:47:56 ack hhalpin 20:48:03 q+ 20:49:28 hhalpin: so quick note, we can go forward with ryan's keystorage issue in the next draft, and then in secondary features go after the multiple key container feature 20:49:44 ... then last, wanted to point out that we need at least 2 implementers per feature 20:50:08 ... so another implementer besides Netflix needs to implement and be part of our test-cases, and thus our WG 20:50:13 ... I think that won't be a problem 20:50:50 rsleevi: in order to be comparable as regards privacy for another storage mechanism, then it has to have same lifetime as cookies+localstorage 20:51:04 ... and thus if it was meant to be comparable, then you should just use localstorage 20:51:21 ... if it isn't and has a longer lifetime, you effect the entire web platform 20:51:24 q+ 20:51:26 ... so that's a reasonable concern 20:52:08 ... if we go forward with pre-provisioned keys, it seems they should not have a separate storage than smartcards etc. 20:52:33 ... we're talking about a lifetime that's different 20:53:17 ack rsleevi 20:53:17 rsleevi, you wanted to respond to sdurbha 20:53:34 zakim, close the queue 20:53:34 ok, virginie, the speaker queue is closed 20:54:06 markw: I'm not happy to put this in secondary features, but I'd like to retain finding pre-provisioned keys 20:54:29 ... and we have proposed more text on the privacy issues 20:54:29 Note: It wasn't there from the beginning. I proposed and added it during the two weeks leading to FPWD 20:54:41 As a simple placeholder for how we thought storage would work 20:54:59 ... so let's go forward, but have a read-only keystorage 20:55:06 ... and do structured cline 20:55:10 s/cline/clone 20:55:18 q+ 20:55:31 ack pal 20:55:32 pal: why is guid for keyid a big deal? 20:55:34 ack markw 20:55:49 pal: The conversation is right now focused on a different aspect, which is pre-provisioned keys in general 20:55:57 the unique id is a separate issue 20:55:58 pal: we've not yet talked about GUID 20:56:02 virginie: if its optional, how is it dangerous? 20:56:25 the point is why have an optional feature in an API, why not use a custom attribute? 20:56:37 ack virginie 20:56:38 ack sdurbha 20:56:43 if its not optional, then we need to have multiple implenters actually do it. 20:56:54 introducing an optional id field that can be associated with a key does not necessarily introduces privacy issues 20:57:12 sdurbha: the key is access-controled by origin, the user consents for key to be used by application, and thus I don't see how this causes privacy concerns 20:57:37 thinks we need to take at least a straw poll on this! 20:57:53 @rsleevi: KeyStorage specifically was added when you say, but the idea of pre-provisioned keys has been part of our work from the first workshop 20:58:49 virginie: I would like to have more time since I see problems communicating 20:59:14 I might add we might just have fundamental disagreement in the WG, in which case we need to actually see how large disagreement is? 20:59:21 one point I missed: origin-specific pre-provisioned keys are much simpler than smart-card based keys, which are not necessarily origin-specific 20:59:53 I also don't think 2 hours of discussion between folks that fundamentally disagree will help, what is necessary is moving forward on consensus 21:00:03 @rsleevi: I guess I am wondering if the group can address the interoperability needs of pre-provisioned key users (thorugh the addition of an optional key id) separately from storage, privacy, etc. 21:00:08 but disagreement is a fact of life, and we can always vote as needed. 21:00:52 Its much preferable to get consensus, so perhaps people could make concrete proposals they think will be acceptable over the mailing list ASAP? 21:01:01 [Doodle re: call time http://www.doodle.com/nnekkq62drchupts ] 21:01:32 -Pierre 21:01:33 -sdurbha 21:01:35 -Google 21:01:36 Meeting adjourned 21:01:36 -emily 21:01:37 -virginie 21:01:38 Chris has left #crypto 21:01:38 -markw 21:01:41 trackbot, end meeting 21:01:41 Zakim, list attendees 21:01:41 As of this point the attendees have been wseltzer, ddahl, +1.303.661.aaaa, virginie, +1.415.867.aabb, sdurbha, markw, rsleevi, wtc, +1.707.799.aacc, emily, +1.415.294.aadd, 21:01:44 ... arunranga, hhalpin, +1.650.228.aaee, +1.650.458.aaff, Pierre 21:01:45 -wseltzer 21:01:49 RRSAgent, please draft minutes 21:01:49 I have made the request to generate http://www.w3.org/2012/11/12-crypto-minutes.html trackbot 21:01:50 RRSAgent, bye 21:01:50 I see no action items 21:01:50 -ddahl