19:54:13 RRSAgent has joined #crypto 19:54:13 logging to http://www.w3.org/2014/07/28-crypto-irc 19:54:15 RRSAgent, make logs public 19:54:15 Zakim has joined #crypto 19:54:17 Zakim, this will be CRYPT 19:54:17 ok, trackbot; I see SEC_WebCryp()3:00PM scheduled to start 54 minutes ago 19:54:18 Meeting: Web Cryptography Working Group Teleconference 19:54:18 Date: 28 July 2014 19:55:26 SEC_WebCryp()3:00PM has now started 19:55:33 +karen_oDonoghue 19:56:34 kodonog has joined #crypto 19:57:04 +Wendy 19:57:28 Chair: Virginie_Galindo 19:57:39 + +1.503.712.aaaa 19:58:05 +JYates 19:58:06 zakim, aaaa is Matt_Wood 19:58:07 +Matt_Wood; got it 19:58:21 +[Microsoft] 19:58:30 virginie has joined #crypto 19:58:42 rbarnes has joined #crypto 19:58:58 MichaelH has joined #crypto 19:59:09 zakim, Microsoft has BAL 19:59:09 +BAL; got it 19:59:13 bal has joined #crypto 20:00:36 +Michael_Hutchinson 20:00:50 markw has joined #crypto 20:01:19 +??P5 20:01:39 Zakim, what's the code? 20:01:39 the conference code is 27978 (tel:+1.617.761.6200 sip:zakim@voip.w3.org), harry 20:01:41 zakim, ??p5 is rbarnes 20:01:42 +rbarnes; got it 20:01:48 +Virginie_Galindo 20:01:50 is there an agenda posted somewhere? 20:02:14 +Karen.a 20:02:30 zakim, who is on the call? 20:02:30 On the phone I see karen_oDonoghue, Wendy, Matt_Wood, JYates, [Microsoft], Michael_Hutchinson, rbarnes, Virginie_Galindo, Karen.a 20:02:32 [Microsoft] has BAL 20:02:32 +[Google] 20:02:41 +[IPcaller] 20:02:46 Zakim, IPcaller is hhalpin 20:02:46 +hhalpin; got it 20:02:54 Karen_ has joined #crypto 20:03:12 zakim, Google has rsleevi 20:03:12 +rsleevi; got it 20:03:18 rsleevi has joined #crypto 20:03:28 +[Netflix] 20:03:40 zakim, Netflix has markw 20:03:40 +markw; got it 20:03:48 Zakim, [Netflix] is me 20:03:48 +markw; got it 20:03:53 +[Microsoft.a] 20:04:10 zakim, [microsoft.a] is me 20:04:10 +vgb; got it 20:04:10 zakim, Microsoft.a has vgb 20:04:12 sorry, wseltzer, I do not recognize a party named 'Microsoft.a' 20:04:37 scribenick wseltzer 20:04:49 zakim, who is here? 20:04:49 On the phone I see karen_oDonoghue, Wendy, Matt_Wood, JYates, [Microsoft], Michael_Hutchinson, rbarnes, Virginie_Galindo, Karen.a, [Google], hhalpin, markw, vgb 20:04:52 [Microsoft] has BAL 20:04:52 [Google] has rsleevi 20:04:52 markw has markw 20:04:52 On IRC I see rsleevi, Karen_, markw, bal, MichaelH, rbarnes, virginie, kodonog, Zakim, RRSAgent, mdwood, jyates, harry, vgb, tantek, ale, terri, timeless, slightlyoff, tobie, 20:04:53 ... wseltzer, trackbot 20:06:06 Topic: Intro 20:06:09 +[Microsoft.a] 20:06:21 Virginie: Agenda will begin by focusing on sensitive bugs 20:06:40 zakim, Microsoft.a has Mike_Jones 20:06:40 +Mike_Jones; got it 20:07:38 -[Microsoft] 20:07:44 dialing back in... 20:07:59 selfissued has joined #crypto 20:08:01 bug 25607? 20:08:05 -> http://lists.w3.org/Archives/Public/public-webcrypto/2014Jul/0097.html 20:08:14 - 25607 on security recommendation : https://www.w3.org/Bugs/Public/show_bug.cgi?id=25607 20:08:17 +[Microsoft] 20:08:19 Topic: Bug 25607, Security Recommendations 20:08:22 https://www.w3.org/Bugs/Public/show_bug.cgi?id=25607 20:08:27 muted now, thanks 20:08:38 Virginie: Security recommendations 20:09:11 ... Have some editorial notes; still have open comment that we should make reference to know attacks 20:09:21 ... Akamai comments, post from Graham Steele 20:10:07 ... CFRG could maintain document with reference to attacks and potential vulnerabilities in WebCrypto algorithms 20:10:42 Essentially, we have a security considerations doc in the IETF CFRG, and Rich Salz from Akamai is happy with that solution as long as we link to said document when it exists. 20:10:50 Graham Steel will make a first version. 20:10:54 ... Proposed resolution: close the bug by endorsing clarifications in ED and referencing IETF CFRG 20:11:08 ... adding that reference when the doc is available 20:11:09 q? 20:11:33 rbarnes: Sounds fine to me 20:11:34 q+ 20:11:46 BAL: Not sure CFRG has yet agreed to take up the work 20:13:14 Wendy: CFRG expressed interest, although not formal commitment 20:13:18 q+ 20:13:40 Harry: Response generally positive; no objections 20:13:48 Note that we did formally ask the CFRG as well, no objections. 20:14:09 i.e. Individual Submission - and the W3C did commit to helping with that process. 20:14:21 BAL: This could certainly proceed as an ID (individual submission); it would take process for it to become official work of CFRG 20:14:23 So that people in the WG do not have to pay attention - unless they want to :) 20:14:28 ack bal 20:15:05 Virginie: Is that still a good resolution? 20:15:12 q+ 20:15:19 BAL: We'll need to see text, but in principle, sounds as though it can work 20:15:24 I'm happy to take that action. 20:15:26 ack harry 20:15:43 q+ 20:15:55 Harry: Happy to take the action to get a suitable first version from Graham Steel, put it through the IETF proces 20:16:06 ack MichaelH 20:16:22 MichaelH: What is the timeline for having a trackable ID from CFRG? 20:16:42 Harry: expect a document by early September 20:17:03 ack 20:17:08 q- 20:17:28 Worse case, if IETF doesn't accept we could make it a WG note. 20:17:31 ... and IETF response shortly after (weeks, not months) 20:17:34 q? 20:17:51 [looking] 20:17:57 Proposed resolution: The WG to resolve the bug 25607 by (1) endorsing clarifications from the recent editors draft and (2) referencing to a document listing algorithms attacks and vulnerabilities, maintained by IETF CFRG (to be added in the specification by the editors as soon as available). 20:18:42 +1 20:18:45 +1 20:18:45 +1 20:18:47 Virginie: +1 if you agree, -1 if you object 20:18:47 +1 20:18:50 +1 20:18:51 +1 20:18:54 +1 20:18:58 virginie +1 20:19:13 looks like resolution! 20:19:23 RESOLVED: The WG to resolve the bug 25607 by (1) endorsing clarifications from the recent editors draft and (2) referencing to a document listing algorithms attacks and vulnerabilities, maintained by IETF CFRG (to be added in the specification by the editors as soon as available). 20:20:07 - 25985 on interoperability https://www.w3.org/Bugs/Public/show_bug.cgi?id=25985 20:20:11 Topic: Bug 25985, Interoperability 20:20:25 -> https://www.w3.org/Bugs/Public/show_bug.cgi?id=25985 Bug 25985 20:20:40 Virginie: This bug on interoperability received lots of comments 20:20:58 ... one suggestion, what about writitng browser profile after we have done implementation testing? 20:21:31 ... This profile would be non-normative 20:22:06 ... So potential resolution, wait for testing, write non-normative profile 20:22:14 comments from anne, like annevk? 20:22:17 yes 20:22:21 yes, annevk 20:22:29 q? 20:22:30 q+ 20:22:49 Annvk has not objected nor is he member of the WG, I think he may just want an explanation at this stage (i.e. non-browser implementations) 20:23:09 Virginie: potential resolution, bug stays open, then later write non-normative profile 20:23:22 rsleevi: there could be several profiles. 20:23:46 ... There's a use case for smart TVs, traditional web, sysapps 20:24:07 ... So suggestion was that all use cases benefit from normative requirements, but their sets of normative reqs differ 20:24:32 ... It will be tricky to nail down normative reqs for each use case, but we could do so 20:24:46 q+ 20:24:48 ... They don't have to be non-normative 20:24:51 q- rsleevi 20:24:53 ack MichaelH 20:25:22 MichaelH: Trying to understand how we'd make browsers interoperable 20:25:36 ... keys are stored in the browser 20:26:08 harry has joined #crypto 20:26:27 rsleevi: The issue of interop is not about key storage, but the set of algorithms exposed to the Web 20:26:49 ... so, e.g., web devs can know that if a browser claims to support WebCrypto, it supports SHA1 20:27:16 ... interop requriment is that web devs don't have to guess about algo support 20:27:30 q+ 20:27:43 MichaelH: Is that even achievable? 20:28:37 rbarnes: At the level we have now, there's not such a combinatorial issue 20:29:01 ... you'd batch them into API levels 20:29:18 ... e.g. WebCrypto level 1 is what everyone does now; level 2 is next version 20:29:34 ... I'm fine having normative requirements, but that might make us more conservative 20:30:03 q+ 20:30:18 q- rbarnes 20:30:19 ... PKCS1 is everywhere; PSS not so widespread 20:30:38 rsleevi: Spec will not have normative requirements; a dictionary of algorithms and very precise implementations 20:30:41 most of the impact of that conservatism is probably on EC curves 20:30:50 ... but not requirement on what UAs implement what algos 20:30:57 (i hope it's obvious that EC curves are an important element here) 20:31:08 ... requirements documents will await testing and determination of use cases 20:31:25 ... consensus among browsers seems to be that browser profile should be normative 20:31:37 ... but different use cases may have different interop requirments 20:31:39 q+ 20:31:42 q+ 20:31:51 ack selfissued 20:32:23 selfissued: Whether it's normative or not, we do need to keep at least one profile so we can achieve interop 20:32:34 ... Choices should be driven by what's commonly available 20:32:44 q- 20:32:48 ... and interoperable set sufficient for interop with JOSE 20:33:17 ... PCKS1, 1.5 signatures, RSA encryption, AES keywrap. GCM highly recommended 20:34:25 Wendy: don't need to set normativity/non-normativity of profiles 20:34:31 https://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html#algorithm-recommendations-implementers 20:34:35 note that we've already broken JOSE compatibility by removing "RSA1_5" 20:34:38 Virginie: Several profiles possible 20:35:09 q+ 20:35:18 Proposed Resolution: Leave bug open; expect resolution after testing phase with development of one or more profiles 20:35:35 q- 20:35:40 Just communicate to Boris and Annevk that we *will* have profiles that will achieve interop within clearly defined subsets of implementations, as should be known after test-suite. 20:36:01 MichaelH: We should resolve the question of normative/non-normative now 20:36:06 q+ 20:36:11 ack MichaelH 20:36:39 Virginie: we could say normative, if people agree 20:37:26 Harry: It's harder to say what exactly will be least common set before implementation, testing 20:37:47 ... it's kicking the can down the road until we can see what implementations will exist 20:38:04 MichaelH: We should say that at least one or more profile will be normative 20:38:10 q+ 20:38:16 ack harry 20:38:19 I think the idea was that different kinds of implementations may have different sets, possibly without LCDs 20:38:19 ack rbarnes 20:38:31 https://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html#algorithm-recommendations-implementers 20:38:39 rbarnes: Our objective with the profile is to specify what's both desirable and feasbile to implement 20:38:49 ... what subset of the current proposal 20:39:06 ... current proposal: see what's implemented, then document that 20:39:24 Virgine: prefer to resolve that we will address after testing phase 20:40:14 Proposed Resolution: Leave the bug open; expect to resolve it after testing phase by developing one or more profiles 20:40:22 +1 20:40:24 +! 20:40:25 Virginie: +1 to agree, -1 to object 20:40:27 +1 20:40:27 +1 20:40:27 +1 20:40:32 +1 20:40:33 +1 20:40:47 yeah!!!! 20:40:57 RESOLVED: Leave the bug open; expect to resolve it after testing phase by developing one or more profiles 20:41:16 - 25839 on curve25519 https://www.w3.org/Bugs/Public/show_bug.cgi?id=25839 20:41:19 https://www.w3.org/Bugs/Public/show_bug.cgi?id=25839 20:41:37 Topic: Bug 25839, NUMS and 25519 20:41:39 Brian's proposed changes are here: http://lists.w3.org/Archives/Public/public-webcrypto/2014Jul/0041.html (attached as WORD Doc) 20:41:57 Virginie: Microsoft and BAL have provided us with a document 20:42:21 ... Will we include this curve in our main spec, as provided by Microsoft, or 20:42:36 ... will we make it a dedicated extension, with its own rec track 20:42:45 Note extenisve comments and notice also that Trevor Perrin has resolved to direclty address 25519 20:43:04 ... Recently, we got an offer from Trevor to write up 25519 as an extension 20:43:04 Also note extensive discussion in CFRG on named curves for TLS 20:43:33 harry: yes, taking action on this seems a little premature given that 20:43:36 Virginie; I have suggested that we vote to endorse Microsoft's description either within API directly or as extension 20:43:38 +1 (for 25985 ... ) 20:43:39 http://www.ietf.org/mail-archive/web/cfrg/current/maillist.html 20:43:43 q? 20:43:45 q+ 20:43:55 what was the proposed resolution? 20:44:16 BAL: I want to make everyone in the WG aware that this was the topic of extensive discussion at last week's IETF 20:44:24 ... both NUMS, 25519, and others at higher level 20:44:29 ... No resolution yet from CFRG 20:44:44 ... Requirements-gathering for a few more weeks, then 4-week comment period 20:44:46 q+ 20:45:05 ... When I wrote the doc, I put in 4 curves 20:45:05 q+ 20:45:08 q- 20:45:23 ... There does not seem to be much interest in the Weirstrass curves, more interest in the performant versions 20:45:39 ... If I were rewriting it now, I'd probably include only twisted-Edwards 20:45:52 ... prefer to see a non-NIST optiom in the main spec 20:46:03 q+ 20:46:10 q- bal 20:46:14 q- wseltzer 20:46:30 Slight correction: *6* curves were added initially 20:46:31 wseltzer: It seems discussions are energetic in IETF and CFRG 20:46:39 I'd scale back to *3* 20:46:44 for the main spec 20:46:59 ... so now is not the best time to have new curves although what is recommended to TLS will likely have wide implementation 20:47:15 ... it would be good if we could be synchronized with what ends up being recommended by TLS 20:47:23 ack rbarnes 20:47:45 rbarnes: I sympathize with Brian's desire to get non-NIST curves included as soon as possible 20:47:52 q+ 20:47:57 q+ 20:47:57 +1 to what Richard said 20:48:00 ... procedurally, it would be easier to handle this as an extension 20:48:09 ack selfissued 20:48:30 in other words, let's have the fight once, in CFRG :) 20:48:36 selfissued: My main concern is that we should have an easy way to add algorithms without having to revise the spec 20:49:17 ... we need an extension mechanism 20:49:42 bal: a further complication; TLS WG took action to take all their existing EC specs to standards track 20:49:57 See here for extensibility bug: https://www.w3.org/Bugs/Public/show_bug.cgi?id=25618 20:49:59 ... so a subsequent discussion for TLS will be what should be mandatory to implement 20:50:09 ... Right now, nothing EC is MTI 20:50:36 ... but depending how we do this, extensions, profiles, we might need to make extension specs mandatory for some interop profiles 20:50:54 ... I have a preference to get this into the spec quickly 20:50:55 rsleevi, you wanted to respond to selfissued 20:51:23 rsleevi: I don't think in practice that extension spec or main spec will change availability for the web 20:51:30 q+ 20:51:51 ... procedural track and availability/implementation differ 20:52:03 I am wondering aloud if this should be resolved in the same way we resolved "profiles", i.e. get a good extension mechanism and then kick this down the road - and then fix normativity at same time as BAL mentions. 20:52:09 ... I dont' think it would be a problem to support extensions as part of MTI profile 20:52:17 Harry +1 20:52:31 ... interdependencies are part of the extensibility bug 20:52:37 q+ 20:52:41 ... We don't yet have a good point for extensibility 20:52:53 ... so hearing from implementers would be helpful 20:52:55 So we merge that into the extensibility mechansim and try to fix that process before going out of Last Call. 20:53:11 ... WG needs to do more review, to identify extensibility bugs and resolve them 20:53:18 q- 20:53:19 q+ 20:53:22 ... definitely need to make the spec extensible, let every algo stand on its own 20:53:30 ... concern re naming of algos 20:53:46 ... think of main spec as just 20:53:57 ... "colleciton of extensions" 20:54:15 Sounds like we may need a good proposal on extensibility and then a call next week. 20:54:15 q- 20:54:28 markw: We do have an extension point; you can add more algorithms 20:54:30 q+ 20:54:35 Well, our extension plan is buggy, that's my point :) 20:54:39 Not that we don't ahve one, it's just buggy 20:55:02 bal: The extensions that allow you to add new algs don't really work well with EC, or mirror IETF 20:55:03 I do agree with bal@ that we do need to fix curve extensibility :) 20:55:10 +1 to having curves be a separate extension point 20:55:16 ... implementatoins; independent libraries can be updated relatively quickly 20:55:18 ack bal 20:55:19 q+ 20:55:44 harry: This bug sounds as though it's merging with the extension bug 20:56:00 ... so I suggest we focus on extensibility 20:56:40 bal: Depends on process. There's some text on the bug 20:56:53 ... I'd like to get a pre-acceptance of extension spec 20:57:03 ... showing commitment to offer customers a non-NIST option 20:57:05 +1 to a "non-NIST curves" deliverable 20:57:11 sounds reasonable to me. 20:57:12 ... if we don't put it into the main spec today 20:57:39 Virginie: Feeling that including the contribution as an extension is reasonable 20:58:27 ... so propose resolution "wg endorses curve provided by Microsoft as extension document" 20:58:27 As mentioned on the Curve25519 thread, I have no issues towards having people bring extension specs for discussion about adding to REC track. The only thing that really speaks to UA concerns would be MTI, but that's orthogonal to a REC track for (NUMS, Curve25519, 3DES, MD5, SEED, GOST, etc) 20:58:48 ... we need to fix both extensibility and adding curves 20:58:50 (Well, and any hypothetical IPR concerns about bringing an alg towards REC, but that's just W3C process) 20:59:15 bal: I'd rather have something opposite NIST directly in the spec 20:59:23 The text is "The WG is endorsing the curve description provided by Microsoft, in a dedicated extension, which will have its own track to become a Recommendation." 20:59:32 ... but if we must do it elsewhere, make sure it's on the smae timeline 20:59:37 q+ 20:59:37 Maybe we could have a straw poll on "main spec" vs. "extension"? 21:00:03 Could the NIST curves also be in extension spec? 21:00:20 q+ 21:00:27 q- 21:00:33 wseltzer: Could we move the decision about whether text is in main spec or extension spec to later? 21:00:46 ... when we know how situation develops in IETF and CFRG. 21:00:51 @MichaelH: as mentioned, conceptually, *all* algorithms are extension spec 21:01:07 q- 21:01:11 Virginie: think we'll have to move the discussion to mailing list 21:01:27 I would have a call on "extension mechanisms" 21:01:27 +1 21:01:30 ... propose a dedicated call 21:01:32 -rbarnes 21:01:41 +1 21:01:43 2 weeks seems like too long. But +1 to a dedicated call 21:01:45 +1 21:01:47 +1 21:01:56 +1 (sooner) 21:01:57 +1 21:01:58 Next week is fine with me if we make progress 21:02:02 or in one week is ok 21:02:03 It seems like it'd be much more useful to just hash out on the mailing list, come to a proposed RESOLUTION, and just put that out on the list 21:02:15 there seems to be a few requirements: 21:02:22 - If an ext spec, main spec needs to support extension points 21:02:27 - If an ext spec, it needs to be REC track 21:02:29 Virginie: Call in 2 weeks 21:02:31 Depends likely how contentious mailing list discussion is. 21:02:41 - If an ext spec, it should be on the same timeline as the main spec (I don't think we can commit to this, but for mailing list) 21:03:02 I think these at least bear discussing, I think some of these are non-controversial and easy to resolve 21:03:12 @rsleevi - do you have a proposal for extension points ? 21:03:17 Wendy: let's try to resolve or converge on mailing list 21:03:31 Virginie: last bug we'll bring to the mailing list 21:03:42 RESOLVED: Next call in 2 weeks, same time 21:04:00 -karen_oDonoghue 21:04:02 -JYates 21:04:02 RRSAgent, generate minutes 21:04:02 I have made the request to generate http://www.w3.org/2014/07/28-crypto-minutes.html harry 21:04:03 -vgb 21:04:06 [adjourned] 21:04:06 -Karen.a 21:04:07 -Matt_Wood 21:04:07 -Virginie_Galindo 21:04:08 RRSAgent, generate minutes 21:04:08 I have made the request to generate http://www.w3.org/2014/07/28-crypto-minutes.html harry 21:04:09 -Wendy 21:04:10 -markw 21:04:10 -[Google] 21:04:22 -[Microsoft.a] 21:04:26 -Michael_Hutchinson 21:04:30 -[Microsoft] 21:05:00 trackbot, end teleconf 21:05:00 Zakim, list attendees 21:05:00 As of this point the attendees have been karen_oDonoghue, Wendy, +1.503.712.aaaa, JYates, Matt_Wood, BAL, Michael_Hutchinson, rbarnes, Virginie_Galindo, Karen, hhalpin, rsleevi, 21:05:03 ... markw, [Microsoft], vgb, Mike_Jones 21:05:08 RRSAgent, please draft minutes 21:05:08 I have made the request to generate http://www.w3.org/2014/07/28-crypto-minutes.html trackbot 21:05:09 RRSAgent, bye 21:05:09 I see no action items