16:34:27 RRSAgent has joined #webauthn 16:34:27 logging to http://www.w3.org/2016/08/17-webauthn-irc 16:34:29 RRSAgent, make logs public 16:34:31 Zakim, this will be 16:34:31 I don't understand 'this will be', trackbot 16:34:32 Meeting: Web Authentication Working Group Teleconference 16:34:32 Date: 17 August 2016 16:34:37 present= 16:34:44 Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2016Aug/0080.html 16:36:10 weiler has changed the topic to: https://lists.w3.org/Archives/Public/public-webauthn/2016Aug/0080.html 16:40:03 Chair: rbarnes, nadalin 16:51:13 Nadalin has joined #webauthn 16:51:23 +present 16:51:43 present? 16:51:58 Zakim, who is here? 16:51:58 Present: present 16:52:00 On IRC I see Nadalin, RRSAgent, weiler, adrianba, mkwst, slightlyoff, Zakim, trackbot, wseltzer 16:52:08 present= 16:52:14 present+ nadalin 16:52:19 Zakim, who is here? 16:52:19 Present: nadalin 16:52:21 On IRC I see Nadalin, RRSAgent, weiler, adrianba, mkwst, slightlyoff, Zakim, trackbot, wseltzer 16:53:31 present= 16:53:38 present+ nadalin 16:55:49 figures 16:57:58 present+ 16:58:35 gmandyam has joined #webauthn 16:58:45 jcj_moz has joined #webauthn 16:58:50 present+ weiler, gmandyam, ketan 16:59:49 rbarnes has joined #webauthn 17:00:14 present+ jcj_moz, rbarnes 17:00:31 present+ gmandyam 17:00:54 apowers has joined #webauthn 17:01:23 present+ Christiaan 17:01:47 present+ apowers 17:01:57 thx :) 17:02:14 Rahul has joined #webauthn 17:02:37 present+ Rahul 17:03:18 vgb has joined #webauthn 17:04:06 present+ vgb 17:04:16 present+ JeffH 17:04:47 JeffH has joined #webauthn 17:05:18 present+ 17:05:45 zakim, who is here? 17:05:45 Present: nadalin, wseltzer, weiler, gmandyam, ketan, jcj_moz, rbarnes, Christiaan, apowers, Rahul, vgb, JeffH 17:05:47 On IRC I see JeffH, vgb, Rahul, apowers, rbarnes, jcj_moz, gmandyam, Nadalin, RRSAgent, weiler, adrianba, mkwst, slightlyoff, Zakim, trackbot, wseltzer 17:06:19 Rolf has joined #webauthn 17:07:15 scribenick: apowers 17:07:40 I am honored to be scribe today 17:07:50 present+ 17:08:07 q+ 17:08:10 tony: please read Wendy's note 17:08:31 weiler: patent disclosure, please don't discuss patents on the list 17:08:48 s/weiler/wseltzer/ 17:08:50 RobTrace has joined #Webauthn 17:08:54 selfissued has joined #webauthn 17:08:54 thx 17:09:06 q- 17:09:12 q- alexei-goog 17:09:29 Nadalin: note sent to mailing list for review, appreciate people looking at those 17:09:52 alexei-goog has joined #webauthn 17:09:56 Nadalin: discuss open pull requsts 17:10:02 present+ 17:10:33 gmandyam: happy to discuss my pull request, looking for decision that it's ready to be incorporated 17:10:47 q+ 17:11:19 Nadalin: my understanding was that you and Rahul were going to create pull requests 17:11:32 gmandyam: created several weeks ago 17:12:00 vijay: merge 154? 17:12:07 https://github.com/w3c/webauthn/pull/154 17:12:12 JeffH: I was in the process of reviewing... but... cool 17:13:08 dirkbalfanz has joined #webauthn 17:13:27 vijay: please take a gander, and I can merge it in later today 17:13:47 [is Vijay on IRC?] 17:13:57 i'm here 17:13:58 thx 17:15:54 vgb: would like to go through issues to address gmandyam's comments 17:16:32 alexei-goog: Giri, were you asking if the PayPal app and the PayPal website would have access to the same key material 17:17:07 vgb: yes, determined by eTLD+1 for web and different for platform with access determined by RPID 17:17:25 JeffH: no concern with changing facet to origin 17:17:48 rbarnes: would need to change that in the dictionary 17:18:23 JeffH: okay with merging 17:18:39 vgb: Alexei -- okay with merging? need to review? 17:18:44 alexei-goog: not all the way through yet 17:18:51 ... if others have looked, I'm fine 17:18:56 ... don't want to hold it up 17:19:13 vgb: just merge it when you're done reviewing 17:19:16 ... today or tomorrow? 17:19:20 alexei-goog: yes 17:19:47 jcj_moz: looked at it, no issues... haven't reviewed most recent changes, but wouldn't change my mind 17:19:51 vgb: mostly editorial 17:20:12 Nadalin: any other PRs that people have questions on? 17:21:44 vgb: core spec, what to do with credential object (143, 158) 17:21:58 https://github.com/w3c/webauthn/pull/143 17:22:05 https://github.com/w3c/webauthn/pull/158 17:22:25 ... both in the same direction of getting rid of type in cred object 17:22:47 ... follow up on these? close them out? more thinking? 17:23:07 rbarnes: seem to be moving away from creds being objects 17:23:16 ... opaque blobs of data 17:23:27 vgb: in favor of 158? 17:24:02 rbarnes: don't need an object / interface, just cred IDs 17:24:13 vgb: only other thing in the object is type 17:24:33 ... stands for algorithm type, formatting signature, authnr data, method of signature generation 17:25:09 ... what would future implementations do without a type 17:25:38 rbarnes: specific version with a specific ID 17:25:51 JeffH: type != version 17:26:46 rbarnes: set an option? 17:27:41 vgb: close out these PRs with no action = Cred ID is always paired with type 17:27:51 ... almost like a namespace 17:28:38 ... moving type to somewhere else divorces type from ID, may mean that IDs are unique across all types 17:28:51 rbarnes: can't assume that there is a binding to ID anyway 17:30:57 vgb: type provides a few things, e.g. - RPID hash is a SHA256 hash of RPID; different browser / cred type, uses ROT13 for RPID hash 17:31:19 ... RPIDs hashes don't match, problems ensue 17:32:00 rbarnes: things don't blow up until they hit the authenticator 17:32:10 ... just put the type in when you're talking to the authenticator 17:32:18 vgb: true, but how 17:32:25 ... currently a list of creds 17:33:16 ... put in options would mean you'd have to say "I'm okay with ID-A of Type-A, ID-B of Type-B..." 17:33:24 rbarnes: that makes sense for pairing them 17:33:44 JeffH: would want to keep them together as is at this point 17:33:59 *** tumbleweeds *** 17:34:22 vgb: happy to abandon this PR 17:34:33 JeffH: 143 and 158? 17:34:43 jcj_moz: fine with closing 143 17:35:03 rbarnes: okay with this, maybe minor clean-ups 17:35:14 Nadalin: both, 143 and 158 17:35:29 vgb: two more things 17:35:52 ... 1) Andre, TokenID 17:36:02 PR 164 17:36:08 https://github.com/w3c/webauthn/pull/164 17:36:25 alexei-goog: internal version structure? 17:36:37 JeffH: identifier, effectively 17:36:47 ... string of bytes 17:37:07 alexei-goog: spec that says how one arrives at the string of bytes, should we indicate which of the two methods is being used? 17:37:20 ... being handled at the other layer? 17:37:24 JeffH: correct 17:37:55 dirkbalfanz: token binding spec indicates RSA, EC, followed by key 17:38:09 ... if a future version puts the key first, we wouldn't be able to know 17:38:22 JeffH: doesn't matter to WebAuthn, just checking for a match 17:38:53 alexei-goog: attacker, same string of bytes 17:39:01 ... different versions 17:39:14 vgb: putting that in our spec doesn't fix that problem 17:39:22 ... could have other information in key for disambiguation 17:40:07 ... separate problem for token binding people to look at, versioning 17:41:22 JeffH: andere's assertion is that you just do a byte-by-byte compare, and that's all you care about for this spec 17:42:02 vgb: if the two sides don't match, you already have a problem that will be caught at the token binding level 17:42:54 alexei-goog (?): object strongly, could mean different things, could cause problems 17:43:13 vgb: goal here is to be more aligned with token binding draft 17:44:07 ... up to the token binding people to make sure that there's no way to derive the same token in two different ways, introduces MITM attack against token binding 17:44:57 gmandyam: client isn't going to be interpreting token binding, just server 17:45:02 vgb: good question 17:46:01 alexei-goog (?): seems a little adventurous to do it that way 17:46:42 JeffH: maybe feedback to token binding spec 17:46:57 thx, I couldn't figure out which of you it was 17:47:13 https://github.com/w3c/webauthn/pull/162 17:47:15 s/alexei-goog (?)/dirkbalfanz/g 17:48:07 gmandyam: would have to implement authnr to accept either 17:48:23 vgb: authnr doesn't know 17:48:41 ... just uses RPID hash 17:51:09 ... if caller specifics strict matching, no matching across multiple origins 17:51:37 alexei-goog: seems like this works on a call-by-call basis 17:51:41 ... request strict or not 17:52:03 ... might get RPs into trouble? forget to add strict sometimes and end up with a non-match? 17:52:22 selfissued: more choices = more developer problems, just pick one 17:53:24 vgb: alexei arguing that we should have that option? 17:54:14 alexei-goog: what's the benefit? 17:54:22 dirkbalfanz has joined #webauthn 17:54:22 rbarnes: be more conservative 17:54:53 ... eTLD+1 shouldn't be the only option 17:55:11 dirkbalfanz: more of a privacy concern 17:56:00 gmandyam: get more explicit / concrete examples in text 17:57:02 vgb: point of PR was to show concretely what the change would look like 17:57:14 vgb: disagree with the change in principal? 17:57:33 s/principal/principle/ 17:57:54 weiler has joined #webauthn 17:58:27 rbarnes: not concerned about adding one flag 17:58:46 vgb: two different cred types (strict vs loose)? 17:59:07 JeffH: adding to the already long list of attributes 17:59:50 dirkbalfanz: didn't think this would be boolean, eTLD+n 18:00:00 JeffH: term is "domain lowering" (?) 18:00:33 vgb: why don't we just reuse that mechanism? 18:00:42 ... infer it from the context 18:01:00 rbarnes: not going to like the implications of that, then everything in JS gets scoped to that 18:02:07 vgb: how do we make progress? 18:02:27 christiaan: sharing between app and website, e.g. - Android 18:02:48 rbarnes: option is still there with relaxed mode 18:03:21 christiaan: e.g. - bank would use strict rather than relaxed because it sounds better, would take away some of the usability 18:03:28 rbarnes: how does it work on Android? 18:04:15 alexei-goog: how is app "foo" related to TLD of "bar" 18:04:46 ... specified by app developers 18:05:22 ... not clear how strict would be handled in that situation 18:06:08 JeffH: eTLD+1 should be default, current deployed practice 18:06:30 ... making strict the default would hinder deployment 18:06:44 selfissued: agreed 18:07:20 alexei-goog: not sure how we describe to developers how to do it right 18:08:12 vgb: other remaining issue is attestation, will summarize next time where we landed 18:09:16 Nadalin: do we want to discuss any extensions? 18:09:43 have to leave now. 18:09:44 alexei-goog: I will come back with a more strongly informed opinion on strict next time 18:09:58 Nadalin: for 162? 18:10:03 alexei-goog: yes 18:10:08 Nadalin: next week? 18:10:14 alexei-goog: we can try 18:11:14 Nadalin: leaves us with PR 169, 157 18:11:18 ... extension discussions 18:12:14 gmandyam: I've got something that can be incorporated 18:12:28 ... CBOR mappings 18:12:51 ... examples of formatting of lat / long 18:13:53 jcj_moz: I'm good with it when complete, just wouldn't know how to implement right now 18:15:42 Nadalin: adjourn 18:16:45 rrsagent, draft minutes 18:16:45 I have made the request to generate http://www.w3.org/2016/08/17-webauthn-minutes.html wseltzer 18:16:51 rrsagent, make logs public 18:16:57 trackbot, end meeting 18:16:57 Zakim, list attendees 18:16:57 As of this point the attendees have been nadalin, wseltzer, weiler, gmandyam, ketan, jcj_moz, rbarnes, Christiaan, apowers, Rahul, vgb, JeffH, Rolf, alexei-goog 18:17:05 RRSAgent, please draft minutes 18:17:05 I have made the request to generate http://www.w3.org/2016/08/17-webauthn-minutes.html trackbot 18:17:06 RRSAgent, bye 18:17:06 I see no action items