15:33:26 RRSAgent has joined #webappsec 15:33:26 logging to http://www.w3.org/2014/10/27-webappsec-irc 15:33:28 RRSAgent, make logs world 15:33:28 Zakim has joined #webappsec 15:33:30 Zakim, this will be WASWG 15:33:30 ok, trackbot; I see SEC_WASWG()11:30AM scheduled to start 3 minutes ago 15:33:31 Meeting: Web Application Security Working Group Teleconference 15:33:31 Date: 27 October 2014 15:34:21 zakim, call salon3 15:34:22 ok, wseltzer; the call is being made 15:34:22 SEC_WASWG()11:30AM has now started 15:34:23 +Salon3 15:40:38 Zakim, I am Renoir 15:40:38 sorry, renoirb, I do not see a party named 'Renoir' 15:47:25 zakim, who is here? 15:47:25 On the phone I see Salon3 15:47:27 On IRC I see RRSAgent, bhill2, tobie, timeless, mkwst___, freddyb, renoirb, terri, wseltzer, trackbot 15:47:57 zakim, Salon3 has bhill2, wseltzer, Renoir, wseltzer, rigo, Takeda, 15:47:57 +bhill2, wseltzer, Renoir, wseltzer, rigo, Takeda; got it 15:50:08 zakim, Salon3 also has terri, timeless, 15:50:08 +terri, timeless; got it 15:50:31 ckerschb has joined #webappsec 15:51:15 Josh_Soref has joined #webappsec 15:51:27 Kevin_Hill has joined #webappsec 15:51:56 topic: Introductions 15:52:08 wseltzer: Wendy Seltzer, W3 Team Contact 15:52:27 renoirb: Renoir, W3 Web Platform Docs 15:52:35 rigo has joined #webappsec 15:52:35 bhill2: Brad Hill, Chair, Facebook 15:52:45 [thanks to our awesome scribe, timeless!] 15:52:47 Josh_Soref: Josh Soref, BlackBerry, Scribe, Obscerver 15:52:49 s/W3 Web Platform Docs/W3C Team member, working on WebPlatform.org project/ 15:53:05 ckerschb: Christoph Kerschbom, Mozilla 15:53:11 wei_james has joined #webappsec 15:53:21 Kevin_Hill: Kevin Hill, Microsoft 15:53:22 s/Kerschbom/Kerschbaumer 15:53:30 terri: Terri Oda, Intel 15:53:57 zakim, Salon3 also has ckerschb, Kevin_Hill 15:53:58 +ckerschb, Kevin_Hill; got it 15:54:16 keiji_takeda: Keiji Takeda, W3C KEIO, Japan 15:54:42 wei xiaohai 15:54:53 s/wei_james/scribe/ 15:55:10 s/wei xiaohai/Wei Xiaohai, Tencent, China/ 15:55:18 colin has joined #webappsec 15:55:29 keiji has joined #webappsec 15:55:43 colin: Colin, Whorlow, CESG (Observer) 15:56:04 I am an observer too 15:56:39 jing_wang: Jing Wang, Qi, Observer 15:56:41 zakim, Salon3 also has Wei_Xiaohai, Colin_Whorlow, fjh, Jing_Wang_Qi 15:56:41 +Wei_Xiaohai, Colin_Whorlow, fjh, Jing_Wang_Qi; got it 15:57:05 fjh: Frederick Hirsch, Nokia 15:57:13 rigo: Rigo Wenning, W3C Staff, Observer 15:57:27 s/rigo/scribe/ 15:57:28 s/rigo/scribe/ 15:57:35 s/scribe: // 15:57:39 RRSAgent, draft minutes 15:57:39 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 15:57:47 RRSAgent, make logs world 15:58:01 wseltzer: thanks Josh_Soref for scribing 15:58:20 s/ Rigo Wenning/rigo: Rigo Wenning/ 15:58:21 RRSAgent, make logs world 15:58:25 RRSAgent, draft minutes 15:58:25 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 15:58:55 zakim, who is here? 15:58:55 On the phone I see Salon3 15:58:56 Salon3 has bhill2, wseltzer, Renoir, wseltzer, rigo, Takeda, terri, timeless, ckerschb, Kevin_Hill, Wei_Xiaohai, Colin_Whorlow, fjh, Jing_Wang_Qi 15:58:56 On IRC I see keiji, colin, wei_james, rigo, Kevin_Hill, Josh_Soref, ckerschb, Zakim, RRSAgent, bhill2, tobie, timeless, mkwst___, freddyb, renoirb, terri, wseltzer, trackbot 15:59:44 glenn has joined #webappsec 16:00:14 chair: bhill2 16:00:40 s/Teleconference/F2F/ 16:00:44 RRSAgent, draft minutes 16:00:44 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:00:44 Topic: https://docs.google.com/document/d/1k6juq6E-mzlNzVr-tHhrh9mEh-d51Uf8wfgfo1I1yZQ/edit 16:00:49 bhill2 has changed the topic to: https://docs.google.com/document/d/1k6juq6E-mzlNzVr-tHhrh9mEh-d51Uf8wfgfo1I1yZQ/edit 16:00:50 +mkwst 16:01:10 Jingwang_qi has joined #webappsec 16:01:13 +tanvi 16:01:14 mkwst___: Mike Wast, Google 16:01:25 s/Wast/West/ :) 16:01:33 s|s/Wast/West/ :)|| 16:01:37 s/Wast/West/ 16:01:48 tanvi: I'm on my way, I'll be late 16:02:05 tanvi: Tanvi Vias, Mozilla 16:02:12 s/Vias/Vyas/ 16:02:49 Agenda: https://docs.google.com/document/d/1k6juq6E-mzlNzVr-tHhrh9mEh-d51Uf8wfgfo1I1yZQ/edit 16:03:44 Present+ Brad_Hill, Christoph_Kerschbaumer, Kevin_Hill, Terri_Oda, Frederick_Hirsch, Keiji_Takeda, Renoir_Boulanger, Wendy_Seltzer 16:03:54 dstefan: Deian Stefan, Stanford, Observer 16:04:15 RRSAgent, draft minutes 16:04:15 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:04:56 Topic: Agenda 16:05:10 Present+ Josh_Soref, JingWang_Qi, Colin_Whorlow, Rigo_Wenning, Deian_Stefan, Wei_Xiaohai 16:05:10 bhill2: I've put up the Agenda on Google Docs 16:05:15 ... we can do some agenda bashing now 16:05:24 ... I've also sent out a Survey Monkey survey 16:05:30 https://www.surveymonkey.com/s/8VPQT7J 16:05:31 Present+ Mike_West, Tanvi_Vyas 16:05:31 ... there are more than 7 people in the room now 16:05:39 ... so, I ask people to fill out the survey 16:05:55 s|https://www.surveymonkey.com/s/8VPQT7J|-> https://www.surveymonkey.com/s/8VPQT7J WebAppSec 2014 Rechartering Survey| 16:05:58 RRSAgent, draft minutes 16:05:58 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:06:19 ... we only have so much bandwidth, so we need to pick which items to focus on 16:06:30 ... after people have time to fill out the survey 16:06:38 ... I'll prune things from the plan 16:07:03 ... of the topics /NOT/ on the survey, we'll have introductions 16:07:15 fjh has joined #webappsec 16:07:15 ... later this afternoon, we'll have David Ross, from Google dial in 16:07:29 rrsagent, generate minutes 16:07:29 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html fjh 16:07:30 ... to talk about Entry-Point-Regulation 16:07:34 ... at 15:30 local-time 16:07:48 ... if we can get things together, hopefully he can be a full member at that point 16:08:01 ... today, we'll mostly do CSP in the morning session 16:08:09 ... and possibly Referer-Policy and Mixed-Content 16:08:28 ... immediately after lunch, we're going to host a 1hr meeting of the Web-Security Interest Group 16:08:39 ... the IG is a cross section group 16:08:46 ... it should be interesting, please come and attend that 16:08:56 ... we'll resume at 15:15 to start on rechartering topics 16:09:07 ... to talk about David Ross's idea, and first set of pruning 16:09:15 ... tomorrow morning, we'll continue with Rechartering topics 16:09:26 ... Frederick XXX and Joel Brown to talk about YYY 16:09:31 ... after lunch, we have open time 16:09:54 ... there's also an AC meeting then, I'll have to step out 16:10:02 ... dveditz can run the meeting then 16:10:22 ... we'll be one of the first groups to run into conflicts involving dependencies to WHATWG specs 16:10:34 s/Frederick XXX/Frederik Braun/ 16:10:40 s/Joel Brown/Joel Weinberger/ 16:10:45 s/YYY/Subresource Integrity (SRI)/ 16:10:58 ... this meeting is the third anniversary of the WebAppSec WG 16:11:03 ... we've only gotten one thing to REC 16:11:07 anssik has joined #webappsec 16:11:13 ... i'd like us to get more things to REC this year 16:11:20 ... we have tests holding us up 16:11:28 ... so i'd like to see work on Web CSP 16:11:37 ... i'd like to see people working with these technologies 16:11:49 ... 18-19% of pages based on Chrome metrics have CSP policies 16:12:03 ... but based on web sites that have CSP it's only 0.1% 16:12:17 ... i think we could do more to support the rest of the community getting the deployment percentage up 16:12:27 ... AoB? 16:12:33 RRSAgent, draft minutes 16:12:33 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:13:06 ... I have a request in my inbox to have an AdHoc session at TPAC on Mandatory Secure Origins for new/powerful web platform features 16:13:26 ... an ML thread started by Chris Palmer at google 16:13:42 http://www.chromium.org/Home/chromium-security/prefer-secure-origins-for-powerful-new-features <-- "Prefer Secure Origins For Powerful New Features" 16:13:43 ... it's a question about whether W3C should lead the charge to an ALL https:// web 16:13:59 s|http://www.chromium.org/Home/chromium-security/prefer-secure-origins-for-powerful-new-features <-- "Prefer Secure Origins For Powerful New Features"|-> http://www.chromium.org/Home/chromium-security/prefer-secure-origins-for-powerful-new-features "Prefer Secure Origins For Powerful New Features"| 16:14:02 RRSAgent, draft minutes 16:14:02 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:14:13 fjh_ has joined #webappsec 16:14:14 ... depending on how we progress through the agenda, maybe we can do that tomorrow as well 16:14:40 fjh: you might want to include Usability and 16:14:49 ... re: TBL's message (to TAG?) 16:14:58 ... it would be good to balance security with usability 16:15:29 http://lists.w3.org/Archives/Public/www-tag/2014Sep/0040.html "XMLHTTPRequest restrictions by origin" is probably Tim's post that's being referred to. 16:15:29 Topic: Usability and Consent 16:15:37 fjh: there's a workshop in Berlin 16:15:42 ... on Security/Usability 16:15:53 ... this has also come up in DAP and everywhere 16:16:07 ... we're looking to get papers+thoughts on how to improve the interaction with the user 16:16:12 http://www.w3.org/2014/privacyws/ 16:16:31 s|http://www.w3.org/2014/privacyws/|-> http://www.w3.org/2014/privacyws/ W3C Workshop on Privacy and User–Centric Controls| 16:16:39 topic: CSP issues 16:16:51 Present+ Dan_Veditz 16:17:12 i/Tanvi Vias, Mozilla/dveditz: Dan Veditz, Co-Chair, Mozilla/ 16:17:20 RRSAgent, draft minutes 16:17:20 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:17:25 zakim, salon3 also has dveditz 16:17:25 +dveditz; got it 16:17:37 bhill2: last week on Monday, I issued a call on the ML to move from LC to CR 16:17:43 ... as part of that transition, this is more formal 16:17:47 ... not just inside the WG 16:17:59 ... we have to document that we've addressed all issues 16:18:16 ... in scrubbing the ML, we need to be sure that we've formally addressed things 16:18:21 ... a couple of things in the agenda 16:18:28 ... a couple in the Tracker, and on Github 16:18:48 ... thanks to mkwst___ for starting a thorough scrub of the ML 16:18:57 http://lists.w3.org/Archives/Public/public-webappsec/2014Jun/0178.html 16:19:28 ... Brian Smith wasn't sure if Referrer Policy belonged in CSP 16:19:48 ... whether Referrer Policy reflected XSS 16:19:58 ... should CSP strictly reduce privileges of a page 16:20:05 ... or if they should be their own directive 16:20:10 ... i believe the discussion in the group was 16:20:21 ... as part of our charter, we're trying to reduce cognitive load 16:20:32 ... and reduce header bloat 16:20:50 ... I want to see if we can reach a consensus 16:20:59 ... can we get a show of hands (anonymous for minutes) 16:21:11 ... should we remove things which lesson restrictions 16:21:16 s/lesson/lessen/ 16:21:16 Zakim, who is talking? 16:21:26 timeless, listening for 10 seconds I heard sound from the following: tanvi (4%), Salon3 (74%) 16:21:38 mkwst___: He was more suggesting that they be in their own header 16:21:49 dveditz: there would be a different spec for it 16:22:01 mkwst___: the CSP2 delegates to QQQ 16:22:09 Present+ Christine_Runnegar 16:22:10 s/QQQ/Refer/ 16:22:16 ... RRR defers to SSS 16:22:21 bhill2: why not use ... 16:22:26 dveditz: because it's there 16:22:37 ... I understand Brian Smith's objections 16:22:50 ... if he's afraid of the feature in general 16:22:54 ... but not if it's just where 16:23:03 tanvi: what if we .... 16:23:09 s/.../change the default/ 16:23:13 mkwst___: I believe that is what it does 16:23:18 tanvi: ok 16:23:27 dveditz: we need backwards compat with previous CSP 16:23:55 mkwst___: we currently block a couple of CSP directives 16:24:00 ... from being set in the Meta Header 16:24:03 ... one is Sandbox 16:24:20 ... another is Reflected XSS 16:24:26 dveditz: another is Frame-Ancestor 16:24:29 ... i think there were 4 16:24:35 ... there's a slight discrepancy in the spec 16:24:40 ... it lists 3 things 16:24:50 ... but if you read frame-ancestors, it says... 16:24:59 ... we should add frame-ancestors to the list 16:25:02 ... for completeness 16:25:06 mkwst___: we should do that 16:25:11 bhill2: i'll file an issue 16:25:22 mkwst___: the other is Report-URI 16:25:37 mkwst___: whether the commonality of these three 16:25:43 ... justifies splitting out to a separate header 16:25:51 ... i fall to the "one-header" side 16:26:04 ... developers say "i'm settings these policies" 16:26:25 ... i'm sympathetic to the idea of cohesiveness "all positive, or all negative, all loosen, or all tighten" 16:26:31 dveditz has joined #webappsec 16:26:38 ... a CSP header that tightens, or loosens, 16:26:45 ... I haven't seen any proposals for names that make sense 16:26:49 created new GitHub Issue: https://github.com/w3c/webappsec/issues/67 16:26:59 ... in the absence of such proposals, putting everything into a Policy bucket makes sense to me 16:27:00 bhill2: +1 16:27:13 ... as Chair, we have this specified, we're ready to go to CR 16:27:18 deian has joined #webappsec 16:27:24 ... there's something to be said for being done rather than starting over 16:27:37 ... the potential harm in terms of ideological consistency in the spec is small 16:27:47 ... I suppose we could just define a header name in the existing Referrer spec 16:27:56 ... I think short of that, we should default to leaving it where it is 16:28:02 ... i don't see strong objections, 16:28:09 ... It sounds like Brian Smith could live with it 16:28:14 ... in the absence of strong objections 16:28:19 ... I'll take an action to respond to him 16:28:27 ... on the list, and close that as an open issue 16:29:07 http://www.w3.org/2011/webappsec/track/issues/62 16:29:22 i/Referrer Policy belonged in CSP/Topic: CSP Issue: Referrer Policy belonged in CSP/ 16:29:42 Topic: CSP Issue: is reflected-xss at risk 16:29:50 bhill2: I don't think Mozilla has an implementation 16:29:57 ... Chromium has 16:30:11 ... if Microsoft doesn't intend, then I think we need to take it out 16:30:35 Kevin_Hill: We intend to implement 16:30:38 ... i'll verify 16:31:19 ... there's an actions assigned to David Walp on this 16:31:26 mkwst___: WebKit also implements this 16:31:34 ... but it isn't really a separate implementation 16:32:03 http://lists.w3.org/Archives/Public/public-webappsec/2014Jun/0218.html 16:32:05 Topic: CSP Issue: EEE 16:32:12 s/Topic: CSP Issue: EEE// 16:32:24 i/http/Topic: CSP Issue: report-only: "true|false"/ 16:32:37 bhill2: our conclusion was that if you're interested in this 16:32:47 ... you could smuggle it in as part of a GET URI 16:32:54 ... I want to see if we're happy with that 16:32:58 dveditz: I'm really happy with that 16:33:07 -tanvi 16:33:08 bhill2: no objections, we'll consider this resolved 16:33:13 Topic: CSP Issue: EEE 16:33:18 https://url.spec.whatwg.org/#concept-url-origin 16:33:18 RRSAgent, draft minutes 16:33:18 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:33:31 s/EEE/concept-url-origin/ 16:33:43 bhill2: we touched on things like data, uri, source-doc 16:33:47 ... after we talked about this 16:33:54 ... the folks writing the URL spec decided 16:33:57 +tanvi 16:33:58 ... Blob has an origin 16:34:08 mkwst___: in chrome, I believe that a Blob will return the origin 16:34:21 ... it's potentially problematic 16:34:33 ... since it allows sites to bypass 16:34:41 dveditz: our position would be 16:34:50 ... if we don't require Blobs to be explicitly listed 16:35:00 ... then we'd require unsafe-inline 16:35:09 ... Blob is potentially the same as script-injected stuff 16:35:28 mkwst___: i'd strongly suggest we make developers list Blobs explicitly as a frame source 16:35:37 bhill2: if we're happy with the existing spec text 16:35:50 ... and we aren't concerned that the new url-origin spec breaks things 16:36:03 ... and we're not worried about WebRTC ... 16:36:07 ... then I think we're ok 16:36:30 fjh has joined #webappsec 16:36:40 s/we're not worried about WebRTC/we'll have to discuss it in context of WebRTC later/ 16:36:41 we have work items queued up for CSP v.next to deal with WebRTC, which will also re-raise how to deal with blobs of various origins and security properties 16:36:50 RRSAgent, draft mintues 16:36:50 I'm logging. I don't understand 'draft mintues', timeless. Try /msg RRSAgent help 16:36:52 RRSAgent, draft minutes 16:36:52 I have made the request to generate http://www.w3.org/2014/10/27-webappsec-minutes.html timeless 16:36:58 so we can leave Level 2 as-is for now, and revisit in more depth in the future when this behavior is more defined 16:37:19 gludi|2 has joined #webappsec 16:37:24 Topic: CSP Issue: EEF 16:37:25 http://lists.w3.org/Archives/Public/public-webappsec/2014Jul/0123.html 16:37:37 s/EEF/img-src and inline / 16:37:54 bhill2: should unsafe-inline be directed for img-src 16:38:17 ... annevk discussed on the list that 16:38:40 ... * CSP is about Fetching Resources 16:38:59 ... * CSP is about Meeting Developer expectations protecting against attacks 16:39:08 dveditz: CSP has grown into more than just a set of fetching rules 16:39:15 ... which is why we argued for a fairly generic name 16:39:25 ... but i don't think we want to change it to a feature-switch list 16:39:37 ... to enable/disable html5 features because you happen not to like them 16:39:50 ... from Mozilla's perspective, I think, inline-svg is just Page Content 16:39:58 ... it shouldn't need to be covered by an on-off 16:40:02 bhill2: i'm happy with that 16:40:13 ... you could draw a picture using a Table 16:40:41 dveditz: the scripts in svg would be controlled by the page's policy on controlling scripts 16:40:49 bhill2: i'm sympathetic, and i'm happy to consider the issue closed 16:40:53 ... that svg is page content 16:41:09 dveditz: if it's loaded as an image, CSP is applied to the fetch before we discover it's an image 16:41:23 bhill2: it's a slippery slope, there's no logical place to stop 16:41:27 ... anything other than