20:09:35 RRSAgent has joined #crypto 20:09:35 logging to http://www.w3.org/2013/03/18-crypto-irc 20:09:37 RRSAgent, make logs public 20:09:39 any suggestions regarding the agenda? hearing none 20:09:39 Zakim, this will be SEC_WebCryp 20:09:39 ok, trackbot, I see SEC_WebCryp()3:00PM already started 20:09:40 Meeting: Web Cryptography Working Group Teleconference 20:09:40 Date: 18 March 2013 20:09:41 scottk__netflix has joined #crypto 20:09:44 Chair: virginie 20:09:47 agenda? 20:10:03 http://www.w3.org/2013/03/04-crypto-minutes.html 20:10:15 Zakim, Netflix has scottk__netflix 20:10:15 +scottk__netflix; got it 20:10:28 chair requests approval of previous minutes. approved without objection. 20:10:51 RESOLVED: http://www.w3.org/2013/03/04-crypto-minutes.html are approved for the minutes 20:11:12 virginie: important to update the charter about when and what we will deliver 20:11:37 discussion last time was between 6/9 months, no clear resolution 20:11:39 Note we can turn things in at 6 months 20:11:50 w3c leadership / roessler suggested being conservative, going for 9 months 20:11:56 But W3C felt that 9 months would be safe, and prevent us from revisiting this in case things slipped a bit. 20:12:26 http://lists.w3.org/Archives/Public/public-webcrypto/2013Mar/0087.html 20:12:56 intention is to remove the notion of "high-level" and just say "api" 20:12:59 PROPOSAL: Extend charter by 9 months and delete word "high-level" from "The mission of the Web Cryptography Working Group, part of the Security Activity, is to define a high-level API providing common cryptographic functionality to Web Applications." 20:13:03 Just in case :) 20:13:09 We can still deliver the high-level 20:13:13 but...we don't have to! 20:13:14 q+ 20:13:26 If we get end up focussing on low-level 20:14:54 rbarnes: comment on removal of high-level; want to make sure we're clear that the audience for this API is general web developers, not those with degrees in crypto 20:15:00 q+ 20:15:03 q? 20:15:07 ack 20:15:09 ... should still be the group's objective to produce something usable by ordinary web developers 20:15:12 ack hhalpin 20:15:12 ack rbarnes 20:16:17 does not agree to Richard's statement of our deliverables/use case 20:16:20 virginie: definitely, it's not a matter of making the API more complicated, still an objective to be usable by developers 20:16:51 q? 20:16:58 q+ 20:17:11 ack rsleevi 20:17:27 Anyways, in IRC - tlr (Thomas Roessler, domain lead for Security Area) wants to make sure ordinary web developers are in audience, but he felt we needed to be very clear if we were promising to deliver a high-level or not. 20:17:43 q+ 20:18:01 rsleevi: clearly our discussions focused on a low-level API, and we have an obligation to deliver on that 20:18:07 I think tlr and some will be disappointed if we don't deliver that, but the WG is de-facto focussed on "low-level" 20:18:12 q+ 20:18:51 rbarnes: some features of an API can make it easy for inexperienced developers to make mistakes 20:18:54 ack rbarnes 20:18:56 We should probably take this to the list for further discussion. 20:20:14 there's a great thread on indexedDB going on www-tag@w3.org about "easy-to-use" if folks want to read up on it. 20:20:35 virginie: we'll continue discussion on the list, focused on low-level; not much discussion of high-level 20:20:55 +[Apple] 20:21:10 … so we will continue as planned: low-level, key discovery, maybe high-level 20:21:12 We will keep the secondary features, but must be more use-case driven. 20:21:44 q? 20:21:52 ack virginie 20:22:23 virginie: hearing rbarnes not as objection, just clarification, so hearing no objection to the proposal 20:22:26 -[Apple] 20:22:34 I think Apple just dropped 20:22:37 PROPOSAL: extend charter as proposed in email 20:22:46 +[Apple] 20:22:58 +1 20:22:59 PROPOSAL: Extend charter by 9 months and delete word "high-level" from "The mission of the Web Cryptography Working Group, part of the Security Activity, is to define a high-level API providing common cryptographic functionality to Web Applications." 20:23:04 [http://lists.w3.org/Archives/Public/public-webcrypto/2013Mar/0087.html] 20:23:08 +1 20:23:10 +1 20:23:11 +1 20:23:12 +1 20:23:14 +1 20:23:15 +1 20:23:15 +1 20:23:17 +1 20:23:41 RESOLVED: Extend charter by 9 months and delete word "high-level" from "The mission of the Web Cryptography Working Group, part of the Security Activity, is to define a high-level API providing common cryptographic functionality to Web Applications." 20:24:10 ACTION: wseltzer, hhalpin, and virgine make sure this is communicated to W3C 20:24:10 Error finding 'wseltzer,'. You can review and register nicknames at . 20:24:15 agenda? 20:24:23 (I'll do that email now) 20:24:35 -rsleevi 20:24:35 Topic: Report of IETF#86 JOSE/CFRG discussions 20:25:19 rbarnes: I was at JOSE, not at CFRG 20:25:32 ... JOSE is IETF group defining JSON- based object format 20:25:47 ... instead of XML or ASN1, they're using JSON 20:26:04 ... Perform a crypto op, algorightm ID, key, ciphertext or signature 20:26:15 ... JOSE is a natural target for this API 20:26:29 ... This group had talked to JOSE about wrapped key formats. 20:26:44 ... WebCrypto API is producing a way to export wrapped keys; 20:26:55 ... JWK format (JSON Web Key) is a JOSE format 20:27:05 ... Right now, there's a syntax defined for public keys; 20:27:26 ... in response to WebCrypto request, developing a format for private and symmetric keys, encrypting, defining attributes 20:27:32 Andrew has joined #crypto 20:27:38 ... Agreement on what we were supposed to deliver. 20:27:50 ... encode private and symm keys, encrypt, attach attribs 20:27:51 +1 agreement that JOSE accepted the request from this WG :) 20:27:57 ... Now, figuring out how to do that. 20:28:08 ... Working on a draft now, proceeding relatively quickly. 20:28:19 How about algorithm identifiers?? 20:28:20 ... Also work on encrypted signed objects 20:28:44 ... CFRG what algorithms are appropriate to use in wrapped signed objects? 20:29:17 ... Which algos will be possible in key-wrapping framework? 20:29:34 q+ 20:29:54 virginie: Do you have any specific references or timeline to share? 20:30:16 rbarnes: I was given an action by the WG to produce a combined draft 20:30:27 ... will share a link when available. 20:30:51 ... Timeline: loose, but expect to have a general idea of syntax in next 4-6 wks 20:31:16 virginie: will you have anything to share by our next f2f? 20:31:28 rbarnes: there will definitely be a publicly available draft 20:31:37 ... Whether it's a WG draft depends on the WG 20:31:54 ... not impossible we'd have a WG draft by f2f 20:31:56 ack next 20:32:26 vgb: When you talk about key-wrapping algorithms, is that a question of priorities, or will those not defined be forbidden? 20:32:41 rbarnes: a bit of both. discussion largely around syntax 20:33:04 ... 2 main design. taking current encrypted object format, and wrapping keys, or @@ 20:33:59 ... there's a good chance we'll end up needing both 20:34:08 ... please share feedback on use cases with list. 20:34:24 vgb: Approach 1: JWE, message is JWK 20:34:28 1. JWK within JWE, 2. JWE with empty message 20:34:33 ... Approach 2: JWE with empty message 20:34:52 q+ 20:34:58 ... strong desire in crypto community not to use AES keywrap 20:35:10 ack next 20:35:37 markw_: How would 2d approach handle using RSA key of arbitrary size? 20:35:53 rbarnes: we'd need to add something like RSA-KEM 20:36:35 s/key of arbitrary size/key to protect data of arbitrary size/ 20:36:42 virginie: rbarnes, how can we best coordinate with JOSE? 20:36:55 rbarnes: I can post a message to JOSE list summarizing the group's feedback 20:37:07 ... Members of the group can also post to the list, add use cases 20:37:41 zakim, take up agenda4 20:37:41 agendum 4. "Web Crypto API" taken up [from virginie] 20:37:55 Topic: Wrap/Unwrap 20:38:20 mark: proposal was made to do wrap/unwrap using JWK within JWE 20:38:41 … [draft-miller-jose-jwe-protected-jwk, or something like that] 20:38:51 … haven't been that many contributions to that discussion 20:39:13 q+ 20:39:14 http://lists.w3.org/Archives/Public/public-webcrypto/2013Mar/0076.html 20:39:18 http://www.w3.org/2012/webcrypto/wiki/KeyWrap_Proposal 20:40:36 rbarnes: got to wait for JOSE anyway, to get private/symmetric format; wrapping not too much more latency; just say "we'll use what JOSE produces" 20:40:46 The proposal looks sensible to me, format issues aside. 20:41:10 vgb: it would be good to understand the direction that JOSE is going to go 20:41:27 markw: there are also some pure web crypto choices, not dependent on JOSE 20:42:25 virginie: suggest that we have some additional discussion on this topic, hearing agreement that we're going to work with JOSE 20:43:29 Ryan's concerns were just RSA-KEM it seemed... 20:43:51 markw: would like to make as much progress as we can independent of the JOSE proposal 20:43:56 +1 20:44:05 … account for both cases, then just delete whichever one they don't choose 20:45:07 @hhalpin: as rbarnes just pointed out, 'something like RSA-KEM' is needed for approach 2 20:45:09 virginie: would like to report here what the editor already mentioned: In order to shape a high-level API, we need use cases 20:45:25 … what kind of service do we want to create? 20:45:55 q+ 20:46:01 ack rbarnes 20:46:04 rbarnes: Nobody implements KEM :) Windows does not, OpenSSL doesn't either AFAIK, etc. 20:46:42 ddahl: recent discussions in mozilla, we're focusing on low-level; high-level on the back burner 20:48:01 virginie: certificate discovery has moved to the top of the priority list among secondary features 20:48:53 … we may end up getting a milestone to do a certificates API; low-priority for now, but want to allow contributions 20:49:00 q+ 20:49:11 q- 20:49:17 ack ddahl 20:49:30 mountie has joined #crypto 20:49:56 rbarnes: might be nice for key discovery and cert discovery to be similar to each other 20:50:07 ack rbarnes 20:50:27 http://lists.w3.org/Archives/Public/public-webcrypto/2013Mar/0029.html 20:50:33 virginie: next question: bignum 20:50:47 … not sure how this integrates with our current work, but at least we have a proposal 20:51:10 vgb: this is probably a better question for tony; he has the use cases 20:51:19 … harry captured several of them accurately in the email thread 20:51:34 … there are some newer crypto algorithms that could benefit from a low-level primitive of this type 20:51:45 … could provide some new types of security properties 20:52:44 re BigNum, we could do a dedicated call to it... 20:53:06 Registration is open http://lists.w3.org/Archives/Public/public-webcrypto/2013Mar/0085.html 20:53:15 virginie: registration for f2f is open, see link 20:53:35 … hosted by paypal at their HQ, overlap with webappsec and html 20:54:00 … please register on the questionnaire whether you can attend 23/24 april 20:54:08 … no formal joint meeting planned with webappsec 20:54:29 [Please register, or indicate if you can't attend: https://www.w3.org/2002/09/wbs/54174/webcrypto-april-2013/ ] 20:54:30 … nobody asked; maybe not enough synergy 20:54:45 s/can't attend/want to participate remotely/ 20:55:13 … objective to progress seriously on the low-level API 20:55:20 … please give it a good read and make sure it fits your expectations 20:55:38 … we will also look at key discovery, HL API use cases, cert discovery, bignum 20:55:43 … in priority order 20:55:51 … will suggest an agenda in 1-2 weeks 20:56:17 … who will be at the f2f? 20:56:19 +1 20:56:24 +1 for going to the F2F meeting 20:56:25 +1 20:56:26 +1 20:56:26 +1 20:56:27 +1 20:56:29 +1 20:56:33 +0.9 20:56:34 +0.5 (24th only) 20:56:34 +1 20:56:36 4 members from Korea 20:56:51 mountie: cool 20:57:01 q+ 20:57:47 I think we were not having requirement levels 20:59:41 [next IETF: July 28 - August 2, 2013, Berlin] 21:00:06 virginie: if we need more intensive synchronization, we might schedule something near the IETF meeting, or send an "official delegation" 21:00:39 -vgb 21:00:41 -rbarnes 21:00:42 -jyates 21:00:42 -Karen 21:00:43 -ddahl 21:00:44 -[Apple] 21:00:47 -nvdbleek? 21:00:48 -hhalpin 21:00:48 -Netflix 21:00:49 -markw_ 21:01:03 -wseltzer 21:01:03 trackbot, end meeting 21:01:03 Zakim, list attendees 21:01:04 As of this point the attendees have been +1.857.928.aaaa, ddahl, +1.703.284.aabb, rbarnes, rsleevi, +1.512.257.aacc, markw_, vgb, Karen, wseltzer, hhalpin, nvdbleek?, mitchz, 21:01:04 ... skelly, virginie?, jyates, scottk__netflix, [Apple] 21:01:11 RRSAgent, please draft minutes 21:01:11 I have made the request to generate http://www.w3.org/2013/03/18-crypto-minutes.html trackbot 21:01:12 RRSAgent, bye 21:01:12 I see 1 open action item saved in http://www.w3.org/2013/03/18-crypto-actions.rdf : 21:01:12 ACTION: wseltzer, hhalpin, and virgine make sure this is communicated to W3C [1] 21:01:12 recorded in http://www.w3.org/2013/03/18-crypto-irc#T20-24-10