16:54:49 RRSAgent has joined #webauthn 16:54:49 logging to http://www.w3.org/2016/09/28-webauthn-irc 16:54:51 RRSAgent, make logs public 16:54:53 Zakim, this will be 16:54:53 I don't understand 'this will be', trackbot 16:54:54 Meeting: Web Authentication Working Group Teleconference 16:54:54 Date: 28 September 2016 16:55:40 agenda: https://lists.w3.org/Archives/Public/public-webauthn/2016Sep/0536.html 16:55:41 present+ 16:55:47 weiler has changed the topic to: agenda: https://lists.w3.org/Archives/Public/public-webauthn/2016Sep/0536.html 16:57:59 present+ 16:59:39 present+ nadalin 17:00:07 gmandyam has joined #webauthn 17:00:50 present+ 17:05:30 vgb has joined #webauthn 17:05:47 present+ 17:07:54 apowers has joined #webauthn 17:08:00 RobTrace has joined #webauthn 17:08:10 present+ powers RobTrace 17:08:14 present+ 17:08:19 present- powers 17:08:20 JeffH has joined #webauthn 17:08:28 present+ JeffH 17:08:53 craft beer in hong kong: http://gohongkong.about.com/od/hongkongbarsandclubs/ss/Best-craft-beer-bars-and-ale-pubs-in-Hong-Kong.htm 17:09:12 scribenick: gmandyam 17:09:12 chair: nadalin 17:10:09 Ketan has joined #webauthn 17:10:42 nadalin: Thanks to all who helped in publication of RD 02 17:10:43 deiu has left #webauthn 17:12:13 alexei-goog has joined #webauthn 17:12:21 present+ 17:09:12 scribenick: JeffH 17:18:05 gmandyam: thinks that attstn formats that are vendor-proprietary and do not have "complete" specifications need to have their attstn format identifier prefixed with a vendor-specific ID 17:18:47 ... asserts that safetynet is an example of this -- there's opaque fields that are not documented -- is just a vendorspecific attstn 17:21:28 ... when they (RP) read the spec, they can verify the packed attstn by just reading the attstn spec -- for safetynet that's not the case -- the RP needs to contact the vendor in order to figure out how to validate the attstn 17:24:26 alexei: this sounds like you are arguing against safetynet specifically -- you don't know about lots of items under the hood wrt attestn, such as who's code is performing the hashes/sigs.... 17:25:25 gmandyam: notes that goog does supply a online svc to validate safetynet but it is a single point of failure... 17:26:17 alexei: so it seems you are arguing to designate the attstn format as sort of a 2nd class citizen... 17:28:30 gmandyam: thinks we should have two levels of review of attestation formats -- one is for interoperable indep impls ones -- other for vendor-specific single-source ones 17:28:58 ...thinks for packed / tpm=based there will be more than one impl 17:09:12 scribenick: weiler 17:36:05 gmandyam: thinks there are different vision re: registry doc. proposes a separate registry doc, as an issue. 17:36:59 ... rather than have it buried in a pull request. 17:37:12 https://github.com/w3c/webauthn/issues/221 17:38:57 alexei: not sure 221 has merit. 17:38:58 vgb: richard thinks acct into is not or the UA. want to discuss further with him. vgb thinks this is good future-proofing 17:39:31 alexei: for a large class of authenticators, it will get discarded by the UA. could be useless work by RP for a large class of authenticators. 17:39:49 vgb: for this class of authenticators, allows smart things in UA 17:40:33 ... on machine where you create credential, store identifier.... 17:40:44 ... doesn't really hurt. 17:41:09 gmandyam: we don't want current state, where this is mandatory. 17:41:22 ... is it safe to say that this should not be mandatory in makecred? 17:41:41 vgb: no. I think it should be mandatory. even those some don't use it. 17:42:33 alexei: confusion induced by not providing it is worse than extra work on RPs in cases where it is not used. and I buy that argument. 17:42:50 gmandyam: increasing testing burden on UA vendor. 17:43:05 vgb: I think it reduces the testing burden. one code path. 17:43:34 gmandyam: if UA doesn't want to pass info, it has that option, right? 17:44:03 vgb: yes, but it violates the spec. 17:44:35 gmandyam: authenticator won't use this, so why would it pass it on? 17:45:02 vgb: from the developers perspective, if you call API in legal way, don't want surprising results. 17:45:26 ... if we do this, developer has know that @@ 17:45:43 ... allow list must contain only one credential from that authenticator 17:45:51 ... this is very balanced and nuanced. 17:46:02 ... easier to say "slap the user's name in there" 17:46:30 gmandyam: ... could choose not to make any of these available. developer won't now about this in advance. could be legit reasons for this. 17:46:53 ... if those authenticators don't accept info, developer won't benefit, since not known in advance. 17:47:13 vgb: but at least developer knows the best thing to do. 17:47:25 ... want to avoid situation where developer doesn't know best thing to do. 17:47:48 ... i can't summarize to developer, if we make acct info optional, what the right thing to do is. 17:48:40 ... if have creds made w/o act info @@... this makes my head hurt 17:48:53 alexei: agree w/ vgb 17:49:01 ... undue burden on RPs 17:49:38 vgb: need t convince rbarnes, who isn't here 17:50:10 jcj: I can help with that. can't speak for rbarnes, but 2nd point re: tunnel scenario makes sense to me and should make sense to him. 17:50:26 ... we had misunderstanding re: how this field will be used. 17:50:58 ... should point out in non-normative that even if this isn't USED, it's USEFUL. and it's future-proofing. 17:51:24 ... I'll talk to rbarnes. 17:51:42 jeffh: jcj has also responded in issue 219. 17:51:48 ... and alexei. 17:51:52 s/219/221/ 17:52:30 alexei: may I abandon 220? 17:52:38 jc: yes, but don't close 219 yet. 17:52:48 ... close 221. 17:52:56 jeffh: talk to rbarnes first? 17:53:52 nadalin: concurs with path. 17:54:12 topic: u2f assestation format 17:54:44 vgb: rolf and girl pointed out different ways to do this. rolf: 3-level to 2level. girl: keep 3 level and... 17:55:05 ... later this week, I'll send out a couple of PRs on this. 17:55:12 nadalin: sounds good 17:55:20 topic: issue 216 17:55:47 nadalin: have people looked at 216 (alexei's proposal) 17:56:00 alexei: I should make a PR. that will be easier to discuss. 17:56:21 vgb: had, in principle, agreement in room. just need to implement. 17:57:06 giri: this is the only hangup I had on mapping u2f... use of apped v. RPid. if we can compromise on that, .... 17:57:17 alexei: glad to hear you're on board. 17:58:39 nadalin: cxl next week because of fido plenary. 17:59:27 weiler: do we need a blog post for new WD? I'm assuming not 17:59:37 ... [silence] ok, done. 18:00:44 Zakim, list participants 18:00:44 As of this point the attendees have been jcj_moz, weiler, nadalin, gmandyam, vgb, powers, RobTrace, apowers, JeffH, KetanMehta, alexei-goog 18:01:00 RRSAgent, make log public 18:01:17 RRSAgent, generate minutes 18:01:17 I have made the request to generate http://www.w3.org/2016/09/28-webauthn-minutes.html weiler 18:33:02 naomi has joined #webauthn 19:19:20 weiler has joined #webauthn 20:05:13 rrware has joined #webauthn