16:54:18 RRSAgent has joined #websec 16:54:18 logging to http://www.w3.org/2014/03/31-websec-irc 16:54:21 trackbot has joined #websec 16:54:24 trackbot, prepare teleconf 16:54:24 Sorry, but no Tracker is associated with this channel. 16:54:46 zakim, this will be 26634 16:54:46 I do not see a conference matching that name scheduled within the next hour, wseltzer 16:54:54 agenda? 16:55:02 agenda+ welcome 16:55:15 zakim, this will be WEBSEC 16:55:15 I do not see a conference matching that name scheduled within the next hour, wseltzer 16:55:39 agenda+ - Debrief of STRINT workshop 16:55:40 zakim, this will be 26634 16:55:40 I do not see a conference matching that name scheduled within the next hour, wseltzer 16:56:39 agenda+ Security review and guideline 16:56:57 agenda+ Understanding security technology : focus on FIDO 16:57:12 regrets+ wseltzer 16:57:30 agenda+ New security features : status on the 'secure services workshop' 16:59:04 zakim, space for 20 at 1300 16:59:04 I don't understand 'space for 20 at 1300', wseltzer 16:59:07 zakim, space for 20 at 1300? 16:59:09 ok, wseltzer; conference Team_(websec)17:00Z scheduled with code 9744 (WSIG) at 13:00 for 60 minutes until 1800Z 16:59:29 terri has joined #websec 17:00:21 wseltzer has changed the topic to: Web Security IG: Code 9744 (WSIG) 17:00:23 christine has joined #websec 17:00:37 Chair: Virginie 17:00:47 Meeting: Web Security Interest Group 17:00:48 npdoty has joined #websec 17:00:53 Team_(websec)17:00Z has now started 17:00:55 mr_ber has joined #websec 17:00:56 + +1.503.712.aaaa 17:00:58 +BHill 17:01:05 aaaa is me 17:01:07 Hi. Would someone please send me the passcode for the conference bridge. I tried the code that Virigine provided but the bridge is telling me it is not valid. 17:01:07 Date: March 31, 2014 17:01:12 Zakim, aaaa is me 17:01:13 +terri; got it 17:01:26 The code is 9744 (WSIG) 17:01:47 +??P10 17:01:57 +Art_Barstow 17:02:05 Thanks 17:02:07 wwu has joined #websec 17:02:23 mr_ber has left #websec 17:02:41 +[IPcaller] 17:02:48 + +1.213.337.aabb 17:02:48 Zakim, IPcaller is me 17:02:50 +christine; got it 17:03:02 +npdoty 17:03:02 Present+ Art_Barstow 17:03:07 Zakim, mute me' 17:03:07 sorry, npdoty, I do not know which phone connection belongs to me' 17:03:10 Zakim, mute me 17:03:10 npdoty should now be muted 17:03:17 alex_ber has joined #websec 17:03:40 s/The code is 9744 (WSIG)// 17:04:17 RRSAgent, make minutes 17:04:17 I have made the request to generate http://www.w3.org/2014/03/31-websec-minutes.html ArtB 17:04:33 RRSAgent, make log Public 17:04:55 agenda? 17:05:06 zakim, who is on the phone ? 17:05:06 On the phone I see terri, BHill, ??P10, Art_Barstow, christine, +1.213.337.aabb, npdoty (muted) 17:05:21 zakim, aabb is me 17:05:21 +virginie; got it 17:05:27 zakim, who is on the phone ? 17:05:27 On the phone I see terri, BHill, ??P10, Art_Barstow, christine, virginie, npdoty (muted) 17:06:17 + +44.793.550.aacc 17:07:10 Zakim, aacc is hannes 17:07:10 +hannes; got it 17:07:21 HannesTschofenig has joined #websec 17:08:20 agenda to begin at 10 past the hour (3 minutes) 17:08:57 note : while we wait the last participants, you can make sure you are aware of the Web Security IG wiki here : http://www.w3.org/Security/wiki/IG 17:09:52 zakim, who is on the phone ? 17:09:52 On the phone I see terri, BHill, ??P10, Art_Barstow, christine, virginie, npdoty (muted), hannes 17:10:37 scribenick: npdoty 17:11:01 virginie: welcome; we don’t always meet regularly, but good to get together and share news 17:11:02 agenda? 17:11:45 any other agenda items? 17:12:24 Zakim, take up agendum 2 17:12:24 agendum 2. "- Debrief of STRINT workshop" taken up [from virginie] 17:12:52 hannes, can you help us with the workshop debrief? 17:13:08 strint : https://www.w3.org/2014/strint/ 17:13:30 HannesTschofenig: just before the IETF London meeting 17:13:49 … talked about the communications security tools at our disposable, and why they don’t work that well 17:14:09 … in some cases, have fairly good standards, but problems during implementation/deployment 17:14:12 +[IPcaller] 17:14:40 … talked about policy: the boundary between legal regime and the technology, a difficult discussion because of a complicated topic 17:15:03 … potential policy problems ahead, should be aware of them 17:15:20 … discussed “opportunistic encryption” (correct terminology tbd) 17:15:42 … Steven Kent wrote up an I-D afterwards 17:15:53 … discussion on metadata and deployment aspects 17:16:08 … don’t have a good sense of fingerprinting and what is possible or mitigations possible 17:16:23 … reach out to researchers, who may volunteer to look at some of our protocols 17:16:38 note : a post on opportunistic encryption by Mark Nothingham http://www.mnot.net/blog/2014/03/17/trying_out_tls_for_http_urls 17:16:53 jeffh has joined #websec 17:16:56 … debate about middleboxes, vendors see advantages in their services 17:17:08 … issues of intercepting communications, in order to prevent exfiltration, for example 17:17:32 … XMPP community is doing experiments with e2e security concepts 17:17:54 … breakout sessions for research questions (slides to be shared) 17:18:07 … currently working on the workshop report, to be released in the next week or so 17:18:15 … have to figure out what we can realistically accomplish in each area 17:18:40 virginie: minutes available, but look forward to the report/action plan 17:19:12 … may have some actions that end up in the W3C scope 17:19:18 … any questions for hannes? 17:19:37 Here is the link to the STRINT website that contains informatoin about the sessions: https://www.w3.org/2014/strint/agenda.html 17:20:04 zakim, [IPcaller] is jeffh 17:20:04 +jeffh; got it 17:20:28 Zakim, take up agendum 3 17:20:28 agendum 3. "Security review and guideline" taken up [from virginie] 17:20:35 oh, ok thx brad 17:20:47 virginie: no current progress, no volunteers for reviewing 17:21:12 btw, if one joins the irc chat after calling in, doesn't see the metadata wrt their dialing in 17:21:12 ... if anyone would like to look over the WebCrypto spec, which is at Last Call, good time to make comments 17:21:12 web crypto API is in last call here : https://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html 17:21:28 Btw, here is the document I mentioned about the threat taxonomy: http://tools.ietf.org/html/draft-barnes-pervasive-problem-00 17:21:58 virginie: also has been discussion about security review of the EME specification 17:22:16 fjh has joined #websec 17:22:29 HannesTschofenig: IETF security directorate reviews all the documents before published, and encourages earlier reviews 17:22:36 ... a lot of reviews because there are so many documents 17:23:04 ... the most critical part is that there is a governance model: someone makes sure that reviews happen 17:23:38 ... specification authors have incentive to actually address the comments, because of documents that require a certain level of security 17:23:44 +[IPcaller] 17:23:48 zakim, ipcaller is me 17:23:48 +fjh; got it 17:23:53 ... based on pervasive monitoring, working on another document 17:24:06 ... IESG enforces these requirements 17:24:07 rrsagent, generate minutes 17:24:07 I have made the request to generate http://www.w3.org/2014/03/31-websec-minutes.html fjh 17:24:35 virginie: farrell explained the IETF Security Area during our last meeting; would like W3C to be in a similar situation 17:24:46 q+ 17:24:55 ... at the moment, it's true that there's no requirement 17:25:00 ack npdoty 17:25:26 Here is the link to the document from Steven Kent: http://tools.ietf.org/html/draft-kent-pervasive-encryption-00 17:26:22 npdoty: better if we have resources/expertise already when we introduce such a requirement 17:26:36 ... like the empty security considerations sections when that req was first introduced 17:26:47 HannesTschofenig: more about the lack of knowledge and guidance 17:27:28 ... a chicken-and-egg problem, people may not dedicate the resources if they're not sure the output of their work 17:27:54 [npdoty, not scribe]: absolutely; I'm hoping we can do better on providing the knowledge and guidance 17:28:25 virginie: Privacy Interest Group have been working on providing guidance on privacy 17:28:50 ... have been thinking about simple guidelines, list of basic things, when designing an API, that can be given to chairs and editors 17:29:01 ... think about the bad scenarios 17:29:15 ... indicate a note in your API where permissions may be necessary, etc. 17:29:26 ... very simple rules that will eventually be elaborated 17:29:40 see also: http://wiki.tools.ietf.org/html/rfc6973 Privacy Considerations for Internet Protocols 17:29:50 ... share the basic reflex of someone who works in security 17:30:02 ... something we could conduct with the Privacy Interest Group, in contact with the chairs 17:30:29 ... start a wiki page with a simple list; security guidelines for chairs and editors 17:30:52 HannesTschofenig: makes sense. have we written this down yet? 17:31:10 virginie: can start with pointers to the IETF documents; haven't shared anything written yet 17:31:26 ... start a wiki page after this call, send link 17:31:32 q+ 17:31:35 ... see how collectively we can advise chairs / editors 17:31:59 ... one idea: try to identify one Security Champion in every Working Group 17:32:18 ... someone with an interest and skills in security, already in the Working Group, feels responsibility but without obligation 17:32:20 ack christine 17:33:01 christine: very common for there to be a Security Considerations section in W3C specs; some groups have done a very good job in documentation and mitigation 17:33:10 -??P10 17:33:20 +1 17:33:21 ... as part of this exercise, good to look at what's already out there 17:33:29 https://tools.ietf.org/html/rfc3552 Guidelines for Writing RFC Text on Security Considerations 17:33:33 +??P7 17:34:18 Zakim, take up agendum 4 17:34:18 agendum 4. "Understanding security technology : focus on FIDO" taken up [from virginie] 17:34:28 -Art_Barstow 17:34:34 ArtB has left #websec 17:35:29 http://fidoalliance.org/ 17:35:35 npdoty: see also RFC6973 (pointed to above) 17:35:57 hillbrad: FIDO Alliance, a group of companies working on specifications, so we can have stronger alternatives to passwords to log in to websites 17:36:36 hillbrad: up to 100 companies now; there is a fee and IPR requirement, similar to W3C 17:37:08 ... goal is to create unencumbered specifications, to be turned over to standards organizations for long-term maintainance (like W3C, OASIS, IETF, etc.) 17:37:28 ... password breaches are so common 17:37:58 ... take advantage of the momentum against passwords simultaneously with proliferation of devices with good cryptographic technologies, key management 17:38:13 ... and a scenario for unlocking your local device 17:38:33 ... connect those together to build a replacement for username and password 17:38:47 ... less about durable identity, just authentication 17:39:15 ... stayed away with traditional identity assertions, want to target for the broadest possible Web use cases 17:39:28 ... and so want to have privacy guarantees about trackability 17:39:32 http://fidoalliance.org/specifications 17:39:39 ... draft specifications are available for download 17:40:08 ... families: U2F; UAF 17:40:41 ... both public key, cryptographic challenge/response protocol: universal two-factor just makes passwords stronger 17:40:51 ... use simpler passwords, but with stronger securities 17:41:15 ... a very simple hardware device, prove your presence with a button 17:41:38 ... a Web site can see that you have a U2F-compatible browser/device 17:41:57 ... the device generates a brand new keypair for that origin/site, completes challenge/response -- site stores a key handle 17:42:27 ... the next time you come back to that site, you type in username/password, site sends the key handle back to you/your device 17:42:39 ... your device unwraps it with your presence, and can respond to it 17:42:49 ... at a different website, you get a different key 17:42:51 q+ 17:43:01 ack fjh 17:43:04 q+ 17:43:19 fjh: what if you lose your device? 17:43:50 hillbrad: if you lose your device, secrets are gone. devices are intended to be cheap 17:44:05 ... doesn't specify account recovery flows, which will vary dramatically by implementation 17:44:22 ... for some throwaway accounts, don't need account recovery at all 17:44:50 ... banks or social networks might have very different ways for recovery 17:45:00 ... revocation is also relying-party-specific 17:45:16 ... if somone finds your device lying on the street, they don't also know your username and password 17:45:47 ... though the relying party would have to delete all of them, not just yours 17:46:28 npdoty: how do you get a guarantee that it's a real second device, couldn't your browser just do it? 17:46:47 hillbrad: yes, you could build an extension that does it all 17:47:08 ... an attestation at the time that you create the key 17:47:10 wrt the question "can't all this be done in software?" -- see, eg, https://hoba.ie/ 17:47:24 ... from a certificate widely shared by device manufacturers 17:47:41 ... software-only would be a self-signed assertion, some sites may be willing to accept that as well 17:47:54 ... working on privacy-friendly ways to do better attestation 17:48:16 ... simple certificate shared across 100,000 devices, so it doesn't create a super cookie 17:48:59 hillbrad: UAF, expansion of modalities of authentication -- an experience completely without passwords 17:49:15 ... fingerprint sensor to unlock the phone, same ceremony when using a browser on the phone 17:49:42 ... assumption that there can be local storage of the key material for each web site 17:50:11 ... UAF is really about creating a framework of trust decisions of different modalities, without constraining those modalities 17:50:21 ... like if we invented a new type of authenticator tomorrow 17:50:30 ... without changing protocols 17:51:14 ... a set of metadata that describes the authenticator (manufacturer, keysizes, etc.), which can be matched against a certain policy 17:51:34 ... risk-based authentication models, or a blacklist/whitelist 17:51:58 https://en.wikipedia.org/wiki/Risk-based_authentication 17:52:10 ... metadata could be self-asserted (or asserted by FIDO something), attestation comes with the metadata 17:52:52 ... interesting part to bring to W3C will be the DOM APIs to discover, query authenticators 17:53:01 ... discuss at an upcoming workshop regarding Web Cryptography 17:53:49 q+ to ask about anticipated time frame for this work, implementations 17:53:52 virginie: any particular specs that are most related to web world 17:53:53 q- 17:54:11 http://fidoalliance.org/specs/fido-uaf-client-api-transport-v1.0-rd-20140209.pdf 17:54:33 That one is the UAF javascript APIs and HTTP bindings. 17:54:34 http://fidoalliance.org/specs/fido-u2f-javascript-api-v1.0-rd-20140209.pdf 17:54:35 alex_ber: very easy reading/browsing from FIDO 17:54:40 That one is the U2F javascript APIs 17:55:17 virginie: definitely considering for WebCrypto WG 17:55:20 ack fjh 17:55:20 fjh, you wanted to ask about anticipated time frame for this work, implementations 17:55:36 fjh: what's the timeframe? how do you anticipate this playing out? 17:56:10 bradhill: FIDO would like to move drafts to implementation draft in the next year, to standards groups after that 17:56:26 https://fidoalliance.org/adoption/fido-ready 17:56:38 ... some implementations are supporting this already 17:57:03 ... still working on interop/testing plan 17:57:34 http://www.plug-up.com/ 17:59:10 Zakim, take up agendum 5 17:59:10 agendum 5. "New security features : status on the 'secure services workshop'" taken up [from virginie] 17:59:51 virginie: discussion of a workshop, within WebCrypto, regarding better integration of smartcards, for example 18:00:09 ... more use cases for accessing a secure container, or trusted execution environment 18:01:00 ... workshop for discussion of a lot of security-related topics, open to discussion 18:01:27 ... schedule not set yet 18:01:39 ... what are the new security features that we want to have in the Web platform? 18:02:07 ... virginie, hhalpin will keep this group informed 18:02:55 virginie will send minutes / takeaway. 18:03:17 virginie: schedule a call perhaps in 2 months; after STRINT report and Web Payments report are out 18:03:27 ... will send a scheduling email as need be 18:03:40 thanks for organizing, virginie 18:03:43 -christine 18:03:52 -npdoty 18:03:53 -fjh 18:03:54 -hannes 18:03:55 Zakim, list attendees 18:03:56 As of this point the attendees have been +1.503.712.aaaa, BHill, terri, Art_Barstow, +1.213.337.aabb, christine, npdoty, virginie, +44.793.550.aacc, hannes, jeffh, fjh 18:03:56 -virginie 18:03:57 fjh has left #websec 18:03:58 -??P7 18:03:59 -BHill 18:04:01 rrsagent, please draft the minutes 18:04:01 I have made the request to generate http://www.w3.org/2014/03/31-websec-minutes.html npdoty 18:04:01 -jeffh 18:04:03 -terri 18:04:03 Team_(websec)17:00Z has ended 18:04:03 Attendees were +1.503.712.aaaa, BHill, terri, Art_Barstow, +1.213.337.aabb, christine, npdoty, virginie, +44.793.550.aacc, hannes, jeffh, fjh 18:07:04 hillbrad has left #websec 18:23:39 terri has joined #websec 20:07:52 npdoty has joined #websec 20:44:47 terri_ has joined #websec