16:38:51 RRSAgent has joined #webappsec 16:38:51 logging to http://www.w3.org/2016/02/24-webappsec-irc 16:38:53 RRSAgent, make logs world 16:38:55 Zakim, this will be WASWG 16:38:55 I do not see a conference matching that name scheduled within the next hour, trackbot 16:38:56 Meeting: Web Application Security Working Group Teleconference 16:38:56 Date: 24 February 2016 16:50:53 francois_ has joined #webappsec 16:51:22 gmaone has joined #webappsec 16:53:42 tanvi has joined #webappsec 16:53:49 i will be 10 minutes late today 16:54:11 regrets+ wseltzer 16:59:39 teddink has joined #webappsec 17:00:32 dveditz has changed the topic to: https://lists.w3.org/Archives/Public/public-webappsec/2016Feb/0104.html 17:01:40 present+ dveditz 17:02:08 present+ francois 17:02:26 present+ Ted 17:02:38 present+ KingstonTime 17:02:46 present+ francois_ 17:02:47 regrets+ bhill2 17:03:01 I have overlapping meetings and will be irc-only for at least the beginning of this one 17:03:01 present+ mkwst 17:03:03 present+ gmaone 17:04:22 estark has joined #webappsec 17:04:52 Zakim, who is here? 17:04:52 Present: bhill2, francois, MikeSmith, wseltzer, ckerschb, dveditz, gmaone, timeless, teddink, kmckinley, terri, tanvi, KingstonTime, francois_, mkwst 17:04:55 On IRC I see estark, teddink, tanvi, gmaone, francois_, RRSAgent, KingstonTime, bhill2, yoav, bblfish, wseltzer, terri, Mek_, tobie, dveditz, kmckinley, slightlyoff, mkwst, 17:04:55 ... jochen__, mounir, schuki, ejcx_, trackbot, Zakim, timeless, Josh_Soref, xiaoqian 17:05:02 present+ estark 17:05:14 present+ teddink 17:05:38 TOPIC: Agenda Bashing 17:05:59 JeffH has joined #webappsec 17:06:04 present- wseltzer 17:06:10 scribenick:francois 17:06:16 scribenick: francois 17:06:29 I don't know the magic zakim commands though, so you'll have to do that bit :) 17:06:38 scribenick: francois_ 17:06:47 + 17:06:57 present: JeffH 17:07:01 heh 17:07:02 present+ JeffH 17:07:43 TOPIC: agenda bashing 17:08:10 dveditz: a few topics haven't made it to the schedule yet because i wasn't sure they were ready to be dicussed here 17:09:15 dveditz: for example, the security ui thread and the meta tag to lock away code (which nobody on this group seems to have interest in), also the long discussion on the topic of client certs (doesn't feel like it belongs to our group) 17:10:10 TOPIC: Minutes approval 17:10:20 https://www.w3.org/2011/webappsec/draft-minutes/2016-02-10-webappsec-minutes.html 17:10:23 TOPIC: Minutes Approval 17:10:23 https://www.w3.org/2011/webappsec/draft-minutes/2016-02-10-webappsec-minutes.html 17:10:49 No objeciton 17:11:05 dveditz: minutes are approved unanymously 17:11:11 TOPIC: WASWG Face-to-face in May! 17:11:47 dveditz: poll results: first half of May won 17:12:01 dveditz: proposal is May 16-17 at Mozilla Mountain View 17:12:06 Tentatively May 16-17 at Mozilla in Mountain View, California 17:12:06 Who does that work for, who does it not? 17:12:25 https://www.mozilla.org/en-US/contact/spaces/mountain-view/ 17:13:28 I think I can make it 17:13:28 i think i can make it 17:13:35 I'm not sure as I don't know what my status will be and what Mozilla is doing etc :D 17:13:50 dveditz: We will need a hand count at some point so that we can order lunch for people. 17:14:04 I am working with folks at Microsoft to decide who should attend, I would expect at least 1 attendee. 17:14:05 just verified that week is clear on my calendar 17:14:30 i will be there 17:14:45 dveditz: this is the same week as Google IO, but IO is at the end of the week 17:15:03 TOPIC: RFC 7762 -- an IANA registry of CSP directives 17:15:35 I will make a travel request, not sure if I will be able to get a flight or not yet 17:15:52 dveditz: mkwst work with mark nottingham to set up this registry at the IETF. it currently has CSP 2 directives. doesn't have strict mixed content blocking or referrer policy directive, or upgrade insecure request 17:16:27 dveditz: this will enable CSP3 to be more of a framework and let other specs easily declare extra directives 17:16:45 TOPIC: Toward a minimum-viable Credential Management API 17:17:20 dveditz: mkwst took a stab at the credential management API to come up with a more limited spec that we're more likely to agree on and implement 17:18:04 dveditz: we'll need to coordinate with the web auth group to find out whether or not they can build on this 17:18:24 dveditz: the mozilla folks working on web auth aren't in this group 17:19:03 mailing list message: https://lists.w3.org/Archives/Public/public-webappsec/2016Feb/0046.html 17:19:04 mkwst: the current api does three things: let websites integrate with the password manager 17:19:32 mkwst: 2- hook into account creation / registration 17:19:46 mkwst: 3- framework for other groups to build stuff on top of 17:20:23 mkwst: of those things, chrome has implemented the first 2. based on their data, the first use case makes a lot of sense. it makes the password manager work better 17:20:50 mkwst: the sign up case (#2) was much harder 17:21:20 mkwst: in chrome we have not found a good way to make that work well 17:22:03 mkwst: e.g. if you logged using a password you don't save, the browser might prompt you to use facebook login next time 17:22:54 mkwst: the plan for chrome is to ship #1 in Chrome 50 or 51 17:23:18 mkwst: feedback is welcome on this plan 17:24:25 mkwst: we'll keep the ability for websites to tell the browser that a user logged in using facebook connect, but we're taking out the part where we synthesize credentials on the user's behalf 17:25:00 dveditz: is an updated spec coming to the proper channels? 17:25:24 mkwst: i'm waiting on some bikeshed work to happen and make that automatic 17:25:48 dveditz: there is a concern that our specs look stale from the w3c point of view, despite the github ones looking fine 17:26:13 mkwst: there is a large gap between github and w3c at the moment, my hope is that it will change soon 17:27:17 tanvi: mozilla hasn't currently prioritized that spec yet 17:27:39 TOPIC: Making it easier to deploy CSP ('unsafe-dynamic') 17:27:43 mike's plan for cred mgmt sounds fine by me 17:28:03 https://lists.w3.org/Archives/Public/public-webappsec/2016Feb/0048.html 17:28:17 dveditz: mkwst's proposal comes from Google's experience trying to implement CSP 17:28:55 mkwst: it seems like a valuable thing that would enable the google infra team to put CSP on more Google properties. 17:29:16 mkwst: dev was raising some issues asking whether or not the polyfill would be enough 17:29:39 mkwst: that requires nonces though and on some Google properties they would be using hashes because the pages are totally static 17:30:07 mkwst: it looks pretty sane from my point of view (and google's). i have an action item to draft a spec change for this 17:30:29 dveditz: it's a weaker form of csp, but it's still better than not using CSP at all 17:31:16 mkwst: the current practice of whitelisting origins is, for google, not as strong as we though it was. there are a lot of endpoints on ajax.google.com for example that enable JS injections (e.g. through old angular JS) 17:31:57 mkwst: the infra sec team is of the opinion that every large origin will run into this problem 17:32:30 mkwst: unless you whitelist individual files, you're going to have a bad day. and whitelisting individual files has proven too brittle to be deployed in practice 17:33:09 (see the thread on the list for the details of the proposal) 17:34:41 mkwst: we audit the scripts we know we're including on the webpages. we're ok with those scripts doign whatever they need to do (including loading more scripts that they need) 17:35:33 dveditz: are nonces allowed on script-src that's an actual script-src rather than inline scripts? 17:35:39 mkwst: yes 17:36:15 dveditz: interesting proposal adressing real-life pain that a large implementer is facing 17:36:25 TOPIC: Github issues and updates: 17:37:01 dveditz: reminder that a lot is happening on our github repos 17:37:21 dveditz: there was a good "issue" thread on cowl, one about null on the referrer policy 17:38:19 dveditz: there was a good discussion clarifying things about suborigins. it was probably the most active topic / spec since the last meeting 17:39:18 dveditz: interesting CSP discussion. apparently in Firefox, script hashes only apply to script tags, not onclick handlers 17:40:01 dveditz: it could be dangerous to allow these because attackers could copy these handlers and make them fire in other places on the page 17:40:22 dveditz: the alternative is to programmatically add the event handler from within the script 17:41:27 dveditz: if the mailing list seems quiet, that's because half of the conversation is happening on github 17:42:44 Thanks! 17:42:53 Thanks all! 17:43:02 thx! 17:43:35 zakim, list attendees 17:43:35 As of this point the attendees have been JeffH 17:43:42 rrsagent, make minutes 17:43:42 I have made the request to generate http://www.w3.org/2016/02/24-webappsec-minutes.html dveditz 17:43:49 gmaone has joined #webappsec 17:44:12 hm, well _that_ didn't work right. 17:44:57 rrsagent, set logs world 17:45:10 wseltzer: wondering why Zakim thinks only jeffH was here 17:45:40 zakim, who is here? 17:45:40 Present: JeffH 17:45:42 On IRC I see gmaone, estark, teddink, tanvi, francois_, RRSAgent, KingstonTime, bhill2, yoav, bblfish, wseltzer, terri, Mek_, tobie, dveditz, kmckinley, slightlyoff, mkwst, 17:45:42 ... jochen__, mounir, schuki, ejcx_, trackbot, Zakim, timeless, Josh_Soref, xiaoqian 17:46:07 earlier there was a much larger "present" list 17:46:25 present+ dveditz, francois, KingstonTime, mkwst, gmaone, estark, teddink, JeffH 17:46:40 rrsagent, make minutes 17:46:40 I have made the request to generate http://www.w3.org/2016/02/24-webappsec-minutes.html wseltzer 17:47:02 oh! at one point I mistyped "present: " instead of "present+ " 17:47:09 does that cancel everything prior? 17:47:38 kind of makes sense to read that as declarative, but seems like a footgun if so 17:48:01 anyway, seems like the logs were made so that'll cover it 17:50:00 dveditz: yes, present: clears the prior list 17:50:17 oops. sorry 17:50:32 mystery solved, though 17:50:41 thanks 17:56:12 gmaone_ has joined #webappsec 17:58:32 bhill2 has joined #webappsec 18:25:03 hello all. re: the face to face. Is anyone allowed to attend, or only specific people? 18:28:50 I'm a long time reader and a never participant. I work at CloudFlare in the bay area 18:33:43 ejcx_, thanks. If you want to attend, please send a note to the chairs and me (dveditz, bhill, and wseltzer@w3.org) 18:56:28 bhill2 has joined #webappsec 19:02:29 bhill2 has joined #webappsec