21:59:41 RRSAgent has joined #webappsec 21:59:41 logging to http://www.w3.org/2012/11/20-webappsec-irc 22:00:00 zakim, this will be 92794 22:00:00 ok, bhill1; I see SEC_WASWG()5:00PM scheduled to start now 22:00:04 tanvi has joined #webappsec 22:00:05 rrsagent, begin 22:00:54 abarth has joined #webappsec 22:02:01 Zakim, who is here 22:02:01 tanvi, you need to end that query with '?' 22:02:05 ccarson has joined #webappsec 22:02:06 Zakim, who is here? 22:02:06 SEC_WASWG()5:00PM has not yet started, tanvi 22:02:08 On IRC I see ccarson, abarth, tanvi, RRSAgent, Zakim, gioma1, dveditz, trackbot, bhill1, odinho, timeless, mkwst, erlend, wseltzer, caribou, tobie 22:02:36 Meeting: WebAppSec WG Teleconference Nov 20, 2012 22:02:40 imelven has joined #webappsec 22:02:43 hello ! 22:02:47 Agenda: http://lists.w3.org/Archives/Public/public-webappsec/2012Nov/0089.html 22:02:54 Chair: bhill2 22:02:58 Scribe: Adam Barth 22:03:04 Scribenick: abarth 22:03:37 /invite rrsagent 22:03:39 zakim, who is here? 22:03:39 SEC_WASWG()5:00PM has not yet started, bhill1 22:03:40 On IRC I see imelven, ccarson, abarth, tanvi, RRSAgent, Zakim, gioma1, dveditz, trackbot, bhill1, odinho, timeless, mkwst, erlend, wseltzer, caribou, tobie 22:04:29 zakim, list attendees 22:04:29 sorry, abarth, I don't know what conference this is 22:04:38 gioma1 is on the phone 22:04:50 rrsagent, begin 22:04:57 zakim, this is 92794 22:04:58 ok, abarth; that matches SEC_WASWG()5:00PM 22:05:07 Meeting: (WebAppSec WG TPAC2011 F2F [Oct 31|Nov 1] 2011) 22:05:14 Scribe: abarth 22:05:22 ScribeNick: abarth 22:05:30 jeffh has joined #webappsec 22:06:31 no minutes for TPAC yet 22:06:40 busy week of catchup for bhill1 22:06:47 should be ready for next call 22:06:56 bhill1: any more items for agenda? 22:06:56 +[IPcaller] 22:07:17 bhill1: Add discussion of CSP 1.1 to FPWD 22:07:28 bhill1: after rechartering discussion 22:07:34 bhill1: news 22:07:43 bhill1: TPAC successful 22:07:48 bhill1: met with anne about CORS 22:07:54 zakim, who is here? 22:07:54 On the phone I see +1.650.648.aaaa, ??P1, ??P3, ??P4, [Mozilla], ??P5, +1.206.304.aabb, +1.310.597.aacc, +1.866.317.aadd, +1.415.596.aaee, [IPcaller] 22:07:56 On IRC I see jeffh, imelven, ccarson, abarth, tanvi, RRSAgent, Zakim, gioma1, dveditz, trackbot, bhill1, odinho, timeless, mkwst, erlend, wseltzer, caribou, tobie 22:08:07 bhill1: CORS should be stable for several years 22:08:20 bhill1: we should try to get to CR, making progress down that road 22:08:37 bhill1: invited expert from web accessibility working group 22:08:45 bhill1: related to UI safety algorithms 22:09:00 bhill1: updated the text based on this information 22:09:09 puhley has joined #webappsec 22:09:24 bhill1: In other news, CSP 1.0 has been published as a CR 22:09:32 bhill1: and a FPWD of UI safety 22:10:02 bhill1: IETF was in Atlanta and liasoned with websec working group 22:10:19 bhill1: IETF web sec agreed to move work on future of frame-options to UI safey draft 22:10:33 bhill1: Tobias will join the working group to help with that work 22:10:59 bhill1: TPAC plenary session about fingerprinting 22:11:09 bhill1: is it futile? 22:11:19 bhill1: link to slides posted to the privacy interest group mailing list 22:11:30 bhill1: many open concerns, unsure if any consensus 22:11:48 bhill1: harder problem than many realize 22:11:59 bhill1: need to have a concrete understanding of the threat model for privacy 22:12:30 bhill1: next item on the agenda: CORS CfC 22:12:37 bhill1: much discussion at TPAC 22:12:56 bhill1: remove the diagram that bhill1 added in the interest of moving the document forward 22:13:02 bhill1: incorporated all the comments from jeffh 22:13:11 bhill1: (all non-normative) 22:13:21 bhill1: some normative changes, mostly bug fixes 22:13:29 bhill1: some positive feedback, but not much 22:13:35 -??P3 22:13:37 bhill1: please indicate consent on the mailing list 22:13:50 bhill1: i helps to have people weigh in when we go to the director 22:13:59 bhill1: even something as simple as a +1 helps 22:14:12 bhill1: art commented on the exit criteria 22:14:18 +[IPcaller.a] 22:14:23 that's for CSP, not CORS, right? 22:14:30 for CORS 22:15:04 are there not two complete implementations? 22:15:14 bhill1: is there any objection to setting the exit criteria for CORS as 22:15:28 bhill1: two independent implementation of each feature 22:15:31 -??P1 22:15:35 bhill1: individually 22:15:49 bhill1: …. no objections 22:15:58 bhill1: next item: test suite status 22:16:03 bhill1: discussed at TPAC 22:16:16 +??P1 22:16:28 Zakim, ??P1 is mkwst 22:16:28 +mkwst; got it 22:16:42 Zakim, who is here 22:16:42 dveditz, you need to end that query with '?' 22:16:43 hi mkwst 22:16:51 Zakim, who is here? 22:16:51 On the phone I see +1.650.648.aaaa, ??P4, [Mozilla], ??P5, +1.206.304.aabb, +1.310.597.aacc, +1.866.317.aadd, +1.415.596.aaee, [IPcaller], [IPcaller.a], mkwst 22:16:54 On IRC I see puhley, jeffh, imelven, ccarson, abarth, tanvi, RRSAgent, Zakim, gioma1, dveditz, trackbot, bhill1, odinho, timeless, mkwst, erlend, wseltzer, caribou, tobie 22:16:56 hi abarth :) 22:17:06 Zakim: aaaa is abarth 22:17:12 Zakim, ??P4 is dveditz 22:17:12 +dveditz; got it 22:17:21 Zakim, aaaa is abarth 22:17:22 +abarth; got it 22:17:36 bhill1: Need to fix test suite with Vary: Origin 22:17:40 Zakim, ??P5 is gioma1 22:17:40 +gioma1; got it 22:17:49 bhill1: seems like a sharp edge in protocol 22:18:11 bhill1: we need to have independent implementations of the user agent portions of the specification 22:18:23 bhill1: do you think we should require reference implementations of the server side? 22:18:53 +??P11 22:18:55 abarth: I don't think there's a risk that it's not implementable on the server. I've personally done like four of them 22:19:18 bhill1: ok, maybe we can leave that out of the exit criteria 22:19:24 Zakim, ??P11 is gioma1 22:19:24 +gioma1; got it 22:19:32 bhill1: next item: rechartering 22:19:45 bhill1: sent link to the list 22:19:48 http://lists.w3.org/Archives/Public/public-webappsec/2012Nov/att-0094/Web_Application_Security_Working_Group.htm 22:20:00 bhill1: updated version of the charter from TPAC 22:20:05 bhill1: mostly the same as the current charter 22:20:13 Zakim, aacc is Tanvi 22:20:13 +Tanvi; got it 22:20:21 bhill1: updated timelines to match reality 22:20:30 bhill1: added CSP 1.1 with LC in july, etc 22:20:47 bhill1: similar schedule for "sub resource integrity" 22:21:01 bhill1: want to get a good feel for people's interest in exploring this topic 22:21:15 bhill1: been discussed previously as a link fingerprint 22:21:33 bhill1: web site can include a hash of the sub resource 22:21:46 bhill1: verify that the content you receive is exactly what you expect (e.g., from a third party) 22:22:22 bhill1: could also supply an alternate transport that's more cache-friendly 22:22:28 bhill1: such as HTTP 22:22:39 bhill1: but avoid trigging mixed content warning 22:22:52 bhill1: adding more complexity might be a tarpit 22:23:06 bhill1: we should liaison with the HTML working group 22:23:18 bhill1: there was strong interest in TPAC, but want to discuss with a broader audience 22:24:19 abarth: there are definitely people inside of google who would like to see this happen, but that's been true for a while and it hasn't happened yet 22:24:40 dveditz: one concern from mozilla is questions about sorts of resources would this work for? 22:24:56 dveditz: we also need to worry about the privacy aspects of HTTPS in addition to integrity 22:25:17 dveditz: not that a particular resource was loaded, but more the cookies 22:25:40 bhill1: are these technical concerns that can be ironed out? 22:25:57 dveditz: people are excited about the integrity checking, but some concerns about the interaction with the security indicators 22:26:39 abarth: should i dig up proposals from the internal discussions from google? 22:26:47 dveditz: there are lots of proposals floating around 22:26:55 dveditz: they come down to similar functionality 22:27:18 bhill1: I don't have a proposal beyond a chalkboard sketch 22:27:35 bhill1: are people interested in doing this in this group? 22:28:09 my answer was not a "no" :-) .. if you've got something concrete it might be a good start 22:28:27 Gerv is one of the folks to chat with: http://www.gerv.net/security/link-fingerprints/ 22:28:44 abarth: I'll dig around for the design docs and encourage the folks who are interested in them to join the working group 22:29:02 jeffh: I think this something to explore and if the right people show up and have cycles, it could be great 22:29:26 bhill1: we add two liaison groups to the sys apps group and the web crypto group 22:29:39 bhill1: had a joint session with web crypto group 22:29:52 bhill1: sys app is starting up 22:30:05 bhill1: to adding OS-level API for web content 22:30:15 bhill1: the first thing they have to do is come up with a security model 22:30:28 bhill1: we should make sure that the security models are consistent and function well with CSP 22:30:57 bhill1: ekr wants to make sure we can extend sandbox to make sure it controls access to crypto stuff 22:31:17 bhill1: any additions or objections to this list? 22:31:31 -mkwst 22:31:56 +??P1 22:32:07 Zakim, ??P1 is mkwst. 22:32:07 +mkwst; got it 22:32:08 again. 22:32:11 bhill1: move to formal approval at the next call 22:32:22 am not certain what "this list" refers to, but the above stuff wrt providing feedback into "sys app" work sounds nominally fine 22:32:44 "this list" means the list of groups to liaison with 22:33:02 k, thx for clarification 22:33:03 bhill1: next issue: CSP 1.1 issues 22:33:20 bhill1: which things before FPWD and which after as issues? 22:33:32 mkwst: I think its probably worth looking at the issues we currently have 22:33:33 jeffh: the "Dependencies and Liaisons" section of the proposed charter 22:33:44 thx 22:33:49 mkwst: not in a big rush to get a draft out the door, but nothing seems like a big blocker 22:33:57 -[IPcaller.a] 22:34:12 http://lists.w3.org/Archives/Public/public-webappsec/2012Nov/0025.html 22:34:15 bhill1: first issues: continuing the discussion about inline styles 22:34:39 +[IPcaller.a] 22:34:39 bhill1: jonas joined us at TPAC to discuss this issue 22:35:10 abarth: ian sent me some text---i will review by EoD 22:35:24 thanks adam 22:35:36 imelven: there have been some more iterations inside mozilla, but nothing too suprising 22:35:40 imelven: there are two pieces 22:35:52 imelven: one is about the text about what inline styles to block 22:35:57 is the proposed txt re inline styles on the mailing list? 22:36:10 imelven: and the second is about a hierarchy from font-src to style-src 22:36:46 imelven: add a check when a stylesheet requests a non-image subresources 22:37:01 dveditz: I think it was more that background image is a specific value 22:37:11 dveditz: as opposed a string that gets parsed 22:37:31 abarth: that generally makes sense to me, but I need to get into the details 22:37:39 dveditz: mostly about clarity 22:38:04 dveditz: they just want to have a spec that's clear 22:38:11 imelven: I think its fine to do that in 1.1 22:38:57 abarth: we can clarify as much as we want in 1.1 and then bring that text over to 1.0 when we move to PR 22:39:07 http://lists.w3.org/Archives/Public/public-webappsec/2012Nov/0028.html 22:39:09 bhill1: next item: restricting APIs in CSP 22:39:40 bhill1: basic question is whether its work having a mechanism to restrict API access like getUserMedia 22:39:54 bhill1: crypto, device APIs that allow access to features 22:39:58 s/work/worth/ 22:40:03 thx 22:40:31 bhill1: ekr has proposed that new features be enabled explicitly in CSP rather than blacklisted 22:40:38 bhill1: thoughts from those on the call? 22:41:13 dveditz: we've already gone to a "turn things off" model 22:41:33 dveditz: largely out of worries about forward compatibility 22:41:43 dveditz: but I am concerned that we're adding features all over the browser 22:42:07 mkwst: maybe the solution is to combine with sandboxing 22:42:37 mkwst: might work well for get user media 22:42:45 dveditz: yeah, but you only get one shot at it 22:43:00 dveditz: otherwise there will be a time when the UA knows about the feature but doesn't know to sandbox it 22:43:08 dveditz: the next version of the UA might break content 22:43:21 dveditz: I find the idea appealing, but it is problematic 22:43:39 dveditz: alternative: watch every spec is every working group 22:44:09 mkwst: sandbox might have less breakage 22:44:14 that was me 22:44:14 s/is every/in every/ ? 22:44:14 sorry 22:44:21 actually that was imelven 22:44:42 dveditz: we try to keep on top of the features that are going into our browser and we can try to police them 22:44:53 dveditz: if we agree quickly enough, it might be possible 22:47:21 -mkwst 22:47:33 ... Zakim doesn't like me. 22:47:45 +??P1 22:48:28 abarth: sys apps will likely want to do this for sys apps api, but scaling to the whole platform is tough 22:48:49 where "this" is somesort of whitelist ? 22:49:02 "this" is an opt-in model for new APIs. 22:49:10 yes, features off by default and then needing to be whitelisted in a policy to enable them 22:49:30 bhill1: we might want to explore these possibility in CSP 1.1 22:49:58 http://lists.w3.org/Archives/Public/public-webappsec/2012Nov/0083.html 22:49:59 bhill1: maybe we should table this until we get some concrete proposals 22:50:11 bhill1: next topic: subsuming X-XSS-Protection in CSP 22:50:29 bhill1: created by Microsoft when then added their XSS filter 22:50:39 bhill1: not formally specified, but also in WebKit 22:51:24 bhill1: adding into CSP gets us reporting too 22:51:44 mkwst: what I've added to CSP 1.1 currently is very basic---just three states 22:51:51 mkwst: its unclear how to make the reporting worthwhiel 22:51:59 mkwst: we might need to revisit that at some point 22:52:08 mkwst: the specification itself is very straightforward 22:52:44 dveditz: of the few sites that are using CSP many of them have inline script turned on 22:53:02 dveditz: so adding a report for when the XSS filter finds something seems worthwhile 22:53:43 how do you specify the reporting URL? yet another header? 22:53:54 addition to the X-XSS-Protection header? 22:54:15 or are you saying that you've added it to your CSP impl 22:54:15 -[IPcaller.a] 22:54:24 dveditz: we added a report-uri parameter to the X-XSS-Protection header 22:55:52 ^^^ that was me talking to dveditz, not something he said 22:55:55 site authors probably just want to know 1) that you blocked/found something, 2) what's the URL (which contains the filtered xss by definition) 22:56:01 yeah 22:56:27 bhill1: last issue on the agenda: are there certain types of directives that don't make sense in the meta tag 22:56:51 bhill1: I would rather spend the last four minutes on asking mkwst and abarth if we're ready to move towards FPWD of 1.1 22:56:55 I'm agnostic whether this happens in CSP or not. seems like a useful feature wherever it goes 22:57:47 abarth: I support moving to FPWD so that we have something to work on 22:57:59 bhill1: send me a version so we can start that process 22:58:12 bhill1: that brings us to the end of the agenda 22:58:30 bhill1: thanks everybody 22:58:43 bhill1: submit comments on UI safety and CORS CfC 22:58:47 - +1.415.596.aaee 22:58:49 - +1.866.317.aadd 22:58:52 -[Mozilla] 22:58:54 thank you ! :) 22:58:56 -??P1 22:59:00 zakim, list attendees 22:59:00 As of this point the attendees have been +1.650.648.aaaa, [Mozilla], +1.206.304.aabb, +1.310.597.aacc, +1.866.317.aadd, +1.415.596.aaee, [IPcaller], mkwst, dveditz, abarth, gioma1, 22:59:01 thanks! 22:59:03 ... Tanvi 22:59:05 -gioma1.a 22:59:08 - +1.206.304.aabb 22:59:13 zakim, list attendees 22:59:13 As of this point the attendees have been +1.650.648.aaaa, [Mozilla], +1.206.304.aabb, +1.310.597.aacc, +1.866.317.aadd, +1.415.596.aaee, [IPcaller], mkwst, dveditz, abarth, gioma1, 22:59:17 ... Tanvi 22:59:18 RRSAgent, set logs public-visible 22:59:24 RRSAgent, make minutes 22:59:24 I have made the request to generate http://www.w3.org/2012/11/20-webappsec-minutes.html abarth 22:59:29 -[IPcaller] 22:59:34 thanks, Adam. 22:59:41 happy Thanksgiving to our USA members 22:59:47 -dveditz 22:59:49 bhill1: happy thanksgiving to you too 23:00:50 -abarth 23:23:27 -Tanvi 23:28:27 disconnecting the lone participant, gioma1, in SEC_WASWG()5:00PM 23:28:28 SEC_WASWG()5:00PM has ended 23:28:28 Attendees were +1.650.648.aaaa, [Mozilla], +1.206.304.aabb, +1.310.597.aacc, +1.866.317.aadd, +1.415.596.aaee, [IPcaller], mkwst, dveditz, abarth, gioma1, Tanvi 23:43:09 yes? 23:43:58 X-XSS-Protection already exists, added by IE. 23:44:15 we're talking about subsuming the functionality into CSP to get rid of an X- header 23:44:26 ditto x-frame-options 23:44:41 although not really gone because IE doesn't go away