16:48:49 RRSAgent has joined #webappsec 16:48:49 logging to http://www.w3.org/2017/01/25-webappsec-irc 16:48:51 Zakim has joined #webappsec 16:49:54 bhill2 has joined #webappsec 16:49:56 Agenda: https://lists.w3.org/Archives/Public/public-webappsec/2017Jan/0020.html 16:50:55 bhill2 has joined #webappsec 16:51:53 bhill2 has joined #webappsec 16:52:52 bhill2 has joined #webappsec 16:53:52 bhill2 has joined #webappsec 16:54:49 bhill2 has joined #webappsec 16:55:51 bhill2 has joined #webappsec 16:56:47 ArturJanc has joined #webappsec 16:56:48 bhill2 has joined #webappsec 16:57:37 francois has joined #webappsec 16:57:49 bhill2 has joined #webappsec 16:57:57 present+ wseltzer 16:58:54 bhill2 has joined #webappsec 16:59:51 bhill2 has joined #webappsec 16:59:58 present+ ArturJanc 17:00:14 present+ freddyb 17:00:16 lwe has joined #webappsec 17:00:33 present+ mkwst 17:01:26 present+ gmaone 17:01:47 bhill2 has joined #webappsec 17:01:54 ckerschb__ has joined #webappsec 17:02:11 :( 17:02:19 oh, crap. I am on an airplane. 17:02:34 ... 17:02:47 Dan? 17:03:03 almost there 17:03:09 (dialing) 17:04:48 present+ dveditz 17:04:54 mikispag has joined #webappsec 17:04:56 bhill2 has joined #webappsec 17:04:56 zakim, who is here? 17:04:56 Present: wseltzer, ArturJanc, freddyb, mkwst, gmaone, dveditz 17:04:57 On IRC I see bhill2, mikispag, ckerschb__, lwe, francois, ArturJanc, Zakim, RRSAgent, gmaone, yoav, Agent_Smith_BR, Jb, deian, Mek, schuki, sangwhan, mounir, freddyb, jcj_moz, 17:04:58 ... terri, tobie, timeless, dveditz, Josh_Soref, ojan, slightlyoff, mkwst, rrware, Domenic, jww, jkt, dbaron, hadleybeeman, jochen___, adrianba, jyasskin, gszathmari, MattN, 17:04:58 ... wseltzer, trackbot 17:05:22 Agenda: https://lists.w3.org/Archives/Public/public-webappsec/2017Jan/0020.html 17:05:44 present+ ckerschb__ 17:05:44 Chair: dveditz 17:06:00 zakim, who is on the phone? 17:06:00 Present: wseltzer, ArturJanc, freddyb, mkwst, gmaone, dveditz, ckerschb__ 17:06:06 regrets+ bhill2 17:06:24 TOPIC: Agenda Bashing 17:06:26 present+ terri 17:06:38 dveditz: Anything to add to the agenda? 17:07:07 everyone: 17:07:09 TOPIC: Recharter update 17:07:32 wseltzer: The current charter extended without change through March, 17:07:35 https://rawgit.com/w3c/webappsec/master/admin/webappsec-charter-2017.html 17:07:49 ... proposed draft charter at https://rawgit.com/w3c/webappsec/master/admin/webappsec-charter-2017.html. 17:08:04 ... Reviewing that internally, then sending it out to the AC for a wider review. 17:08:14 ... During that period, please ask your AC rep to indicate support. 17:08:23 ah, now. 17:08:38 ... If you or your AC rep won't support the charter, please let us know before we propose it. :) 17:08:48 q+ 17:08:51 dveditz: We've chatted about this multiple times, I hope we'll be good to go. 17:09:06 ... If there's something horrible you came up with over the holiday, do let us know. 17:09:18 q- 17:09:28 wseltzer: Sometimes WG and AC members aren't on the same page; if you have a chance to check with your rep, that'd be helpful. 17:09:52 ... I'll let you know when it's out for review. 17:09:53 TOPIC: nonce / script-dynamic bypasses and mitigations 17:10:20 scribenick mkwst 17:10:25 i/Anything to add/scribenick: mkwst 17:11:22 ArturJanc: Recent reports of bypasses for nonce-based policies. I'll go through a few details, then mkwst might want to fill in some blanks with Chrome-specific details. 17:11:22 bhill2 has joined #webappsec 17:11:44 ArturJanc: Context: A few weeks ago, folks on Twitter chatted a bit about bypassing nonce-based CSP. 17:11:58 ... Google uses nonces. 17:12:10 dveditz: It's the heart of `strict-dynamic`, right? 17:12:32 ArturJanc: Right. But the attacks we're looking at right now are attacks on nonces, not on `strict-dynamic`. 17:13:03 ... Two broad categories of attacks 17:13:11 ... 1. Injection of `` tags. 17:13:49 ... Alters the meaning of relative URLs, which means that nonced `">` 17:23:09 bhill2 has joined #webappsec 17:23:15 ... Similarly, URL fragments are sometimes reflected (routing, etc). 17:23:28 ... A few other similar mechanisms. 17:23:53 ... You can run a similar kind of attack based on the cachability of a document. 17:24:25 ... Load the page, use the first payload to exfiltrate nonces, then `.back()`, then `.forward()`, etc. 17:24:38 ... If the injection doesn't depend on the URL, this is exploitable. 17:25:29 ... 1. Perhaps we can prevent the nonce from being stolen? 17:25:44 ... 2. Perhaps we can prevent the nonce from being reused, if/when stolen. 17:26:04 scribenick: dveditz 17:26:21 mkwst: any questions based on ArturJanc's explanations? 17:27:01 dveditz: Artur, you mentioned two ways to steal the nonce. CSS and dangling markup. 17:27:04 ... Is there another I missed? 17:27:21 ArturJanc: Dangling markup is a pretty big category. 17:27:26 bhill2 has joined #webappsec 17:27:52 ... `