19:23:17 RRSAgent has joined #tagmem 19:23:17 logging to http://www.w3.org/2015/02/12-tagmem-irc 19:23:19 RRSAgent, make logs public 19:23:19 Zakim has joined #tagmem 19:23:21 Zakim, this will be TAG 19:23:21 ok, trackbot; I see TAG_Weekly()3:00PM scheduled to start in 37 minutes 19:23:22 Meeting: Technical Architecture Group Teleconference 19:23:22 Date: 12 February 2015 19:32:40 mkwst has joined #tagmem 19:55:06 dbaron has joined #tagmem 19:55:20 bhill2 has joined #tagmem 19:56:41 yan has joined #tagmem 19:57:38 TAG_Weekly()3:00PM has now started 19:57:46 +dka 19:57:54 zakim, what is the code? 19:57:54 the conference code is 0824 (tel:+1.617.761.6200 sip:zakim@voip.w3.org), dka 19:58:13 trackball, start meeting 19:59:14 Chair: Dan 19:59:23 + +29008aaaa 19:59:23 +WSeltzer 19:59:32 Topic: Powerful Features & such… 20:00:14 zakim, aaaa is mnot 20:00:14 +mnot; got it 20:00:33 mnot has joined #tagmem 20:00:36 +BHill 20:00:50 zakim, who is here? 20:00:50 On the phone I see dka, mnot, WSeltzer, BHill 20:00:52 On IRC I see mnot, yan, bhill2, dbaron, mkwst, Zakim, RRSAgent, timbl, dka, wseltzer, wycats, Domenic_, dherman, slightlyoff, plinss, projector, Yves, trackbot 20:01:04 +Yves 20:01:40 + +1.408.505.aabb 20:01:50 +[IPcaller] 20:02:06 dveditz has joined #tagmem 20:02:16 zakim, +1.408.505 is me 20:02:18 +yan; got it 20:02:19 +[Mozilla] 20:02:23 +??P11 20:02:28 zakim, [IPc is dveditz 20:02:28 +dveditz; got it 20:02:40 Zakim, P11 is me 20:02:40 sorry, Domenic_, I do not recognize a party named 'P11' 20:02:41 thx, wseltzer 20:02:52 zakim, mute me 20:02:52 WSeltzer should now be muted 20:03:30 OMW 20:05:08 +slightlyoff 20:05:18 I can scribe 20:05:40 are we doing minutes a new way? 20:05:40 Scribe: slightly 20:06:05 fair enough. 20:06:07 thanks 20:06:45 dka: just to introduce, something I didn't mention in email is that this is a topic we had been meaning to scheudle TAG time about for a while. We discussed at at LON F2F. 20:06:49 +TimBL 20:08:12 https://github.com/w3ctag/meetings/blob/gh-pages/2015/telcons/02-12-powerfulfeatures.md 20:08:13 dka: alex, yan, anything to add? 20:08:26 Travis has joined #tagmem 20:09:30 Alex: on the chrome team we’ve been looking to https for powerful features such as push, service worker, etc… this falls into line with [our thinking]... 20:09:37 +[Microsoft] 20:09:46 dka: yan? 20:09:55 q+ 20:09:58 Zakim: [Microsoft] is me 20:09:59 yan: alex summarised it 20:10:01 q+ 20:10:07 Zakim, [Microsoft] is me 20:10:07 +Travis; got it 20:10:15 ack wseltzer 20:10:29 q? 20:11:07 wseltzer: the work that the webappsec group has started up and is good. It's too bad that mkwst couldn't join, but this proposal has seen a lot of discusison on our mailing list. We're interested in discussing it here because of a comment we recieved in charter review. 20:11:33 wseltzer: a reviewer expressed concern about who should decide when something is powerful; who should restrict this? 20:11:35 http://www.w3.org/TR/powerful-features/ 20:11:55 wseltzer: since the TAG is our design group, it seems the TAG should help decide how to allocate responsibility 20:12:10 http://www.w3.org/TR/powerful-features/#is-feature-powerful 20:12:20 wseltzer: who looks out for the various interests? (developer, user, browser) 20:12:44 dka: there's a leading statement in the intro about impacting privacy and security 20:12:57 ack timbl 20:12:58 dka: TimbBL and brad are on the q 20:13:32 timbl: I wanted to comment that it's important to separate "https:" from encryption 20:13:44 dka: that "is feature powerful" section has been substantially rewritten: https://w3c.github.io/webappsec/specs/powerfulfeatures/#restrictions 20:13:54 timbl: I think it's important to encrypt HTTP; confusion about address space and protocol 20:14:19 thanks dveditz; could you q+ to give us an overview of the changes? 20:14:31 dka: this is something we debated at a prior F2F 20:14:34 ack bhill 20:15:20 bhill2: I think wendy did a good job of summarizing, but to provide more context, the spec has 2 sections: is this poweful? and if it is, is the context sufficiently secure? 20:15:45 bhill2: we've recieved input from other WGs that they want help specifying the second part and are happy to delegate to webappsec 20:16:07 bhill2: addressing timbl's point, there's a concern about authenticating origins 20:16:22 bhill2: mozilla has filed a formal objection about the charter language 20:17:03 mnot: I believe it's the one I linked to 20:17:13 bhill2: there's some hope that the TAG could be a formal review board; the hope is that a given group review with the TAG but that webappsec not normatively create language here 20:17:17 mnot: I think it's https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-feature-powerful 20:17:21 https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-feature-powerful 20:17:25 and https://w3c.github.io/webappsec/specs/powerfulfeatures/#algorithms would be normative 20:17:49 q? 20:17:49 dka: is the idea that this should be guidance and that this guidance should be self explanatory? Is the idea that the TAG would deal wiht this in cases where there's a dispute? 20:17:58 q+ 20:18:04 I can see making the question of whether a feature is powerful non-normative; the definition of how powerful features are restricted needs to be normative (i.e., if you say you conform to this spec, it sticks) 20:18:07 bhill2: groups want to make their own decisions about what is "powerful" 20:18:15 bhill2: they don't want webappsec making that decision for them 20:18:35 I'm sorry, wendy is correct, #is-feature-powerful not #restrictions 20:18:40 bhill2: but if some on this call thought it was irresponsible, the hope is the TAG might be the right group to make that sort of call 20:18:42 This seems to to me to be to be squashing into a one-bit protocol something which is normally a big matrix under the user ’s control 20:18:46 [bhill said: "is feature powerful" would be non-normative; while "is context sufficiently secure" would be normative] 20:18:52 bhill2: TAG is elected, webappsec is "just another working group" 20:18:54 q+ 20:18:56 q? 20:19:10 dka: is there someone from MOzilla here? 20:19:22 dka: can someone re-interpret/contextualize the objection? 20:19:28 https://www.w3.org/2002/09/wbs/33280/WebAppSec-Recharter-2015/results 20:19:44 dveditz: I'm a co-chair of the webappsec WG, so am a bit conflicted, deferring to dbaron 20:19:59 q? 20:20:11 -> https://lists.w3.org/Archives/Public/www-archive/2015Feb/0001.html Mozilla's objection 20:20:30 dbaron: I think it has been covered reasonably well. The major concern is that people worried that the experts on a subject being overridden that they couldn't argue tradeoffs about 20:20:43 s/that/in ways that/ 20:21:07 dveditz: there were some groups, e.g., WebCrypto, who had hard-fought battles and the webappsec group was accused of a power-grab 20:21:17 ack Dom 20:21:46 Domenic_: one thing I'm hoping is that we could have a joint-TAG-Webappsec deliverable to create a rubric 20:21:57 Domenic_: I think it would be a shame to not have normative language 20:22:14 Domenic_: jurisdictionally, it seems like the TAG is the right group, but webappsec has the expertise 20:22:20 I can see that it may be that it is valuable to separate the defining of the trusted context into a sep spec because othergroups mihgt forget things like e./g. http://localhost/ which are trusted and file:// which is trucsted. 20:22:30 dka: that's interesting. We're working on some joint-deliverable with other WGs 20:22:34 q? 20:22:50 dka: if there's value on having this as a joint deliverable, It might add more weight 20:22:56 Three levels of dealing with trust: 20:23:10 dka: the other question is: is it really possible to have a normative algorithm? 20:23:32 dka: we can have a definition, but it feels like there will always be edge cases 20:23:45 q? 20:23:46 speaking personally, I agree with dka there 20:23:52 ack slig 20:24:11 q+ to say Three levels of dealing with trust: 1) I trust A. 2) I trust A with infro B. 3) I trust A with info B for purpose C. .. we should be moving the world from 2 to 3 not from 2 to 1 20:24:14 slightlyoff: having a strong rubric that is endorsed by the tag doesn't necessarily end the debate 20:24:22 q? 20:24:28 slightlyoff: you still need to figure out what the correct escalation path is 20:24:38 q- 20:24:38 ack tim 20:24:39 timbl, you wanted to say Three levels of dealing with trust: 1) I trust A. 2) I trust A with infro B. 3) I trust A with info B for purpose C. .. we should be moving the world 20:24:39 ... from 2 to 3 not from 2 to 1 20:24:47 slightlyoff: would like to understand what people who are objecting think the correct group is for the kind of stuff---TAG or not? 20:24:56 timbl: I have yet to be convinced that having a 1-bit secure flag is healthy 20:25:35 timbl: I have experience of systems where when you divide groups into "Trusted" vs "Untrusted" , you create failure scenarios. E.g. network security 20:25:50 Domenic_: that isn't the proposal, it's necessary but not sufficient 20:26:33 timbl: if you could show me 3-layer items -- I trust A to do B and allow C -- the set of people you need to trust is big, and it is useful to remove some 20:26:43 q? 20:26:44 timbl: but the way browsers do it right now with the origin model are broken 20:26:56 current state without this spec is 4) "I trust ???" <- could be anyone 20:27:11 timbl: you can argue that the origin model is a 1-bit space 20:27:13 [I see this context as necessary for even knowing you're talking to A] 20:27:20 we're trying to move from 4 -> 1 first as a necessary precondition for any further improvement 20:27:26 timbl: and as you move things into that model, things break 20:27:28 q+ 20:27:41 q+ 20:27:46 timbl: find some eamples that there's value in making this rough cut 20:27:49 q+ 20:27:53 q+ 20:28:25 q+ to say necessary but not sufficient 20:28:36 timbl: the utility of a single bit seems dubious to me 20:28:41 (summarises) 20:28:43 one of the items in our charter, COWL, is designed to give a way for site A to say it trusts site C with info B, which approaches what timbl was describing (but not quite the same) 20:28:51 dka: there's a related question of data minimisation 20:28:53 data minimization http://www.w3.org/2001/tag/doc/APIMinimization.html 20:29:05 q? 20:29:09 dka: there was a 2011 draft that didn't go anywhere. 20:29:14 ack sli 20:29:51 darobin has joined #tagmem 20:29:51 Alex: I was curious about the notion that this is a one-bit space. 20:30:20 … current CORS has issues - don’t think the same origin model is broken though. 20:30:44 q? 20:31:29 q+ 20:34:16 Alex: you made the point you want to treat serving your web site over tls that it can use other origins - but we don’t do that - so it’s not a one-bit system. 20:34:31 q? 20:34:33 ack mnot 20:34:37 yay! 20:34:39 mnot: wanted to talk about the original topic 20:35:02 mnot: looking at the Mozilla objection, this isn't questioning the increase in the use of TLS, it's just a question of how to get there 20:35:02 agreed abot scope creep partially 20:35:44 mnot: talked about this with ekr & . One of the proposal we talked about was to come up with a plan where all new features after some date require TLS 20:36:04 timbl: it's warm (enough) here in california, too 20:36:06 q? 20:36:13 ack bhill 20:36:20 mnot: can Mozilla folks comment about how that relates to the objection? is it about the goal or the application of the policy? 20:36:23 q- 20:36:50 dbaron: I think what mnot said is reasonable. There was disagreement among Mozillians on this topic 20:37:13 thanks mnot 20:37:22 s//rbarnes/ 20:37:34 q? 20:37:46 mnot: a lot of the meat of the objection was driven by, e.g., ekr's concerns 20:37:54 dbaron: I was just going to... 20:38:07 bhill2: I wanted to bring this back to the original concern; it's just a first step 20:38:20 bhill2: we're not saying all apps should be omnipotent 20:38:54 bhill2: we're starting from a place where users hae to enable things that have power and impact privacy. It isn't even clear that who they're granting that power to is who they think they're granting it to 20:39:11 bhill2: all we're doing is trying to establish that the person asking is who they say they are 20:39:32 bhill2: today, with HTTP, you could be giving that away to anyone between you and the origin party 20:39:51 bhill2: this is just the first part of a richer language around confining origin composition 20:39:51 q+ 20:40:12 q? 20:40:14 ack wendy 20:40:18 ack wsel 20:40:18 wseltzer, you wanted to say necessary but not sufficient 20:40:28 q? 20:41:09 wseltzer: this is one element of giving users understanding understanding and control over capabilities. The first step is knowing that who you're talking to is who you think you're talking to. 20:41:58 wseltzer: webappsec has a strong collection of experts and is a good place to shake out implications and corner cases, and I'd like to understand if the TAG is interested in co-authoring or putting normative restrictions on 20:42:13 ack db 20:42:20 dbaron: ... 20:42:37 I seem to not be unmuting... 20:42:51 ack dbaron 20:42:52 zakim, unmute dbaron 20:42:52 dbaron was not muted, dka 20:43:13 Yeah, locally muted, and SIP sometimes breaks this way when muted a long time 20:43:17 I'll comment on IRC in a second 20:44:07 dka: there's a question of normativeness about such a document 20:44:25 yan_ has joined #tagmem 20:44:59 dka: if we could do some joint work, perhaps that's a way forward 20:45:01 q+ 20:45:06 ack sli 20:45:43 Alex: we need to focus on the escalation path. 20:45:54 … [too fast] 20:46:00 The thing I was going to comment on is that another underlying concern that I've had is the way cross-working-group work happens. In particular, it's pretty common for the opinion of a working group on a particular topic to be led by an opinionated gruop of 1-3 people, and this can lead to a failure mode with working gruop interaction, where those 1-3 people in two different groups (e.g., the TAG or WebAppSec and a group developing a feature) have a differe 20:46:00 nt opinion on a topic, and end up convincing the entire groups to back their opinions, when things would work better if the discussions happened together rather than separately so that the broader members of the groups can be convinced by the whole set of opinionated people rather than the parts just in their groups. 20:46:46 Domenic_: excited taht webappsec is doing the hard work, but agree we should be in that role 20:47:07 I think it is also fine if the TAG wants to invite a technical opinion from WebAppSec in the event of a controversy 20:47:35 I'm ok with the TAG being involved in the document, although it does introduce some additional complexity; just worth being very careful about keeping discussions unified rather than having fragmented discussions. 20:47:48 dka: regarding a joitn doc, are people happy for us to be part of this? 20:47:59 dka: and second question, should the escalation path be better specified? 20:48:12 Alex: yes. 20:48:52 dka: would TAG members be willing to help? 20:48:59 yan: yes 20:49:04 dka: I think we have a proposal 20:49:24 dka: other comments? 20:49:56 dka: I'm concerned that we don't leave timbl's issue on the floor. We need to think about the disclaimer around the note that just moving to an authenticated connection doesn't imply full trust 20:50:03 +1 to that 20:50:06 +1 20:50:43 timbl: there are 2 problems to having a single boundary: positive and negative failures. In the positive sense, being trusted for anything vs. negative: not being trusted for anything 20:51:03 q+ 20:51:10 q? 20:51:32 q+ to ask about time-frames and how this lines up with our April f2f… 20:52:08 timbl: we've done rule-based work that creates a lot more depth including use, not just identity 20:52:12 +1 on trust policy negotiations. This was stuff I delved into in college 10 years ago... forgot most of it now :) 20:52:49 ack sli 20:53:17 ack dka 20:53:17 dka, you wanted to ask about time-frames and how this lines up with our April f2f… 20:53:24 slightlyoff: this only deals with the negative side of that equation 20:53:36 timbl: http can do more than HTTPs 20:53:54 -Domenic 20:53:58 timbl: because the bar has not been set; there isn't an expectation that it's broken 20:53:58 this isn't about saying you can't do CSS6 over http, it does lay out specific things like privacy concerns, sensors and persistence that motivate the choice 20:54:03 Thanks for your participation, Domenic! 20:54:26 it's not about being a carrot/stick thing, it's about protecting users 20:54:35 slightlyoff: other work is addressing that, including "marking http as bad" 20:54:49 timbl: http://www.chromium.org/Home/chromium-security/marking-http-as-non-secure 20:55:01 Next f2f coming up in April 21-23 in SF. Also Extensible Web Summit coming up on 20 April in SF (extensiblewebsummit.org) 20:55:04 dka: 20:55:49 At some point, it would be good to talk about the focus of the developer meetup next to the July F2F - focusing on security might be appropriate. 20:55:51 dka: discussing there is probably too late. Is there something we can attach to our f2f that _would_ help you? 20:56:00 bhill2: the issue is more about recharter 20:56:40 slightlyoff: one option is to have non-normative text and an escalation path 20:57:09 dka: not sure that's something for the TAG to decide on...but do we have some agreement from the Mozilla side about that? 20:57:39 dka: wseltzer what's your view? 20:58:18 wseltzer: I'm looking for language to put into the recharter and if we say that there's a designation for powerful features that's non-normative in webappsec and leave room for TAG endorsement to make it normative, that could be one way to address the objection 20:58:35 dka: you could also put into the charter that webappsec could work with the TAG on it as a joint deliverable 20:58:36 slightlyoff: I'm happy with the charter, and happier with the proposed revisions. But I wasn't among the ones at Mozilla objecting to it 20:58:53 thanks, dveditz 20:59:22 “on the wrong side of the law” is I think not a valuable function, because it is single-valued. It falls into the trap of trying to partition the world into two cleanly separate parts, ((which is a bit lke dividin all logical formulas into true and false. Maybe there is a neat proof that such 2-level systems are bound to fail … )). I am reminded of the GEB metalamp discusssions and the Dictionaries in the Library issue... 20:59:26 I need to get some feedback from some other people at Mozilla. 20:59:34 20:59:35 dka: sounds like the proposal needs socialization outside the group 20:59:53 timbl: happy to continue this in another forum = ) 20:59:59 ugg, sorry 21:00:13 wseltzer: I hear willingness to jointly edit the work and we'll take that back to webappsec 21:00:24 dka: going to adjourn 21:00:32 dka: next week is CSS extensibility/houdini 21:00:32 unfortunately when I presented the updates to the charter this week a lot of the relevant people were in Australia and elsewhere and haven't responded yet 21:01:00 dveditz, perhaps y'all can follow up on-list once you have more feedback? 21:01:15 webappsec for sure, or do you mean another list? 21:01:15 dka: wanted to re-iterate strong support 21:01:21 21:01:23 I have made the request to generate http://www.w3.org/2015/02/12-tagmem-minutes.html Yves 21:01:23 -yan 21:01:24 -TimBL 21:01:25 -dveditz 21:01:25 trackbot, end meeting 21:01:25 Zakim, list attendees 21:01:26 As of this point the attendees have been dka, +29008aaaa, WSeltzer, mnot, BHill, Yves, +1.408.505.aabb, [IPcaller], yan, dbaron, dveditz, Domenic, slightlyoff, TimBL, Travis 21:01:26 -dbaron 21:01:29 -Yves 21:01:29 -WSeltzer 21:01:30 -mnot 21:01:33 RRSAgent, please draft minutes 21:01:33 I have made the request to generate http://www.w3.org/2015/02/12-tagmem-minutes.html trackbot 21:01:34 RRSAgent, bye 21:01:34 I see no action items 21:01:34 -dka 21:01:36 -BHill