00:00:28 abarth: I can tell you a little how we deal with similar issues. compositor is able to do hit testing (3d graphics has multiple buffers, kind of like that, one "layer" is touch) 00:01:37 bhill2: this will be something to melt my brain against 00:01:45 abarth: I can link to some design documents 00:01:50 bhill2: that would be helpful 00:01:53 issue-53? 00:01:53 ISSUE-53 -- UI Security model for composited drawing models -- raised 00:01:53 http://www.w3.org/2011/webappsec/track/issues/53 00:02:16 bhill2: 5:00 -- anyone have any fundamental rewrites they want to suggest in the next 30 seconds? 00:02:23 [all] no! 00:03:05 bhill2: are the issues just raised something that should block a new working draft? show of hands for moving to the next round 00:03:18 RESOLVED: advance current ED to WD for UI Security 00:03:18 (consensus assent, no objections) 00:03:39 bhill2: with that we'll call it a day, start tomorrow at 9:30 00:04:09 tlr: one second... the UI-safety piece is exceeding the old charter? 00:04:32 bhill2: no, it's explicitly part of the old chartter, andy insisted it was there as a condition of my being a chair of the WG 00:04:45 bhill2: virginie wanted to update us on web crypto 00:04:57 virginie: nothing specific, but just let everyone know the statue 00:05:08 [WebCrypto: http://www.w3.org/2012/webcrypto/ ] 00:05:09 virginie: working one main API, Web Crypto api. 00:05:31 virginie: you can create a key, shape it iwht the right parameters and use that to sign things 00:06:02 virginie: we are almost done in terms of functionality -- everything is drafted. w have some sensitive functions we would like to add 00:06:41 virginie: so we are planning to go for Last Call in october. PWD in May 00:07:17 virginie: most of you have delegates participating in the spec.also have another spec with same timeline, web crypto discovery api 00:07:45 virginie: do you have pre-existing keys you want to use, led by Mark (?) from Netflix 00:07:57 virginie: we also have a spec with use cases and requirements 00:08:09 virginie: it would be great for yoiu guys to have a look at the spec 00:08:35 virginie: another topic not in the WG because too much politics, tryin to describe the security model of the web 00:09:11 virginie: crypto we need to define trust, never ending discussions on where the trust boundaries were. we're just supposed to deliver a tool 00:09:46 virginie: hoping you can help define the web security model or we (both groups) can work together to define it 00:10:05 virginie: how to integrate that into the W3C documentation effort 00:10:33 bhill2: I pointed them at the paper abarth wrote with Devdatta 00:11:25 drogersuk: there's a lot of good will toward doing this and there's a potential home in Web platform. need to reach out to OWASP out of courtesy 00:12:00 abarth: glad the webcrypto group is taking security seriously 00:12:12 drogersuk: lot of detractors as well, flaming on twitter etc 00:12:40 bhill2: what is a principal, how does same-origin policy relate to server-side and client-side code 00:12:59 bhill2: "crypto is useless because you can't defend against the site that delivered it to you" 00:13:22 virginie: do we need to specify, "to be secure you need to use X.Y.Z technologies" 00:14:07 virginie: in order to use the Web Crypto api as it is you have to have high crypto skills. detractors say web developers aren't so smart and it's a footgun (not her term) 00:14:52 tanvi: are extensions using the same API as developers working on web sites, or are there multiple layers and extensions have access to a lower leve'? 00:15:02 virginie: we did not make that distinction 00:17:11 drogersuk: we tried to get into the high level api, but it became very complex -- different groups needed different things. didn't reach a proper conclusion on it 00:18:03 virginie: we will document how to use the low level API correctly. High level is not existing, we hope people will write libraries to do higher level services 00:18:27 drogersuk: that went alongisde the dev docs, describing how people were using these insecurely 00:19:23 drogersuk: the level of documentation we're at is different from what most web developers need. needs to be friendlier, more explanations. developers are creating large amounts of insecurity by trying to work around the current web capabilities 00:20:06 bhill2: chair discretion, we need to call a halt now. we have scheduled to talk about this tomorrow 00:20:11 tlr: what time? 00:20:41 bhill2: we have dimitri coming at 9:30, maybe can get to this at 10:30? 00:20:54 tanvi: have we decided on tpac? 00:21:14 bhill2: we need to send it to the list and see how people respond definitively 00:21:30 exeunt 00:22:05 s/dveditz_/dveditz/g 00:22:23 trackbot, end meeting 00:22:23 Zakim, list attendees 00:22:23 As of this point the attendees have been +1.650.488.aaaa, mkwst_, bhill, abarth, drogersuk, wseltzer, Dan_Veditz, tlr, Neil_Matatall, Jeff_Hodges, puhley, Tanvi, +1.781.369.aabb, 00:22:27 ... +1.781.369.aacc, adrianb, David_Ross 00:22:31 RRSAgent, please draft minutes 00:22:31 I have made the request to generate http://www.w3.org/2013/04/26-webappsec-minutes.html trackbot 00:22:32 RRSAgent, bye 00:22:32 I see no action items 16:15:16 RRSAgent has joined #webappsec 16:15:16 logging to http://www.w3.org/2013/04/26-webappsec-irc 16:15:18 RRSAgent, make logs world 16:15:18 Zakim has joined #webappsec 16:15:20 Zakim, this will be 16:15:20 I don't understand 'this will be', trackbot 16:15:21 Meeting: Web Application Security Working Group Teleconference 16:15:21 Date: 26 April 2013 16:16:52 dveditz has joined #webappsec 16:17:25 Present+ bhill2 16:17:31 zakim, this is 92794 16:17:31 ok, wseltzer; that matches SEC_WASWG(F2F)12:00PM 16:19:59 + +1.781.369.aaaa 16:20:31 zakim, aaaa is gopal 16:20:31 +gopal; got it 16:22:02 gopal, anything you want to add to the agenda? 16:22:04 we can't hear you 16:23:31 -gopal 16:23:52 +gopal 16:30:52 Topic: Web Components isolation and confinement model 16:30:54 https://dvcs.w3.org/hg/webcomponents/raw-file/tip/explainer/index.html#isolation-confinement-and-encapsulation 16:39:19 present+ David_Rogers 16:39:30 puhley has joined #webappsec 16:40:02 Discussion of component isolation, confinement and encapsulation 16:40:32 zakim, Paypal has bhill2, drogersuk, virginie, tlr, wseltzer, jeffh, puhley 16:40:32 +bhill2, drogersuk, virginie, tlr, wseltzer, jeffh, puhley; got it 16:41:03 zakim, Paypal also has Dimitri_Glazkov 16:41:03 +Dimitri_Glazkov; got it 16:41:34 jeffh has joined #webappsec 16:42:51 does someone have a link for the doc that's on the screen ? 16:43:19 https://dvcs.w3.org/hg/webcomponents/raw-file/tip/explainer/index.html 16:43:26 drogersuk_ has joined #webappsec 16:43:38 scribenick:drogersuk 16:43:50 scribenick:drogersuk_ 16:44:08 DG: you can have offset parents as a member of a node 16:44:30 dimitri Glazbov (sp?) is holding forth on Introduction to Web Components (link above) 16:44:40 Dimitri Glazkov 16:44:42 ..because of the CSS object model.. I'm not sure what the security sensitivity of render time is 16:44:45 ..style will leak 16:44:58 ..information, whether it is useful or not is a question 16:45:20 ..there is a massive thing about inventory targeting 16:45:27 we're looking at section 9 Isolation, Confinement and Encapsulation 16:45:42 abarth has joined #webappsec 16:46:05 ...when you are in shadow DOM.. it will feel like you moved, outside.. to the user, it won't seem like anything 16:46:17 ..(talking about hovering over +1 buttons etc.) 16:46:37 ..there have been other approaches proposed 16:47:07 ..things like date object are just built out of javascript, with some privileged apis 16:47:24 + +1.650.648.aabb 16:47:25 ..could let other people have access to those privileged apis, but not desirable idea 16:47:38 ..shadow DOM is not a scripting context. 16:47:44 ..all scripting is assumed the same 16:47:49 Zakim: aabb is abarth 16:47:59 Zakim, aabb is abarth 16:47:59 +abarth; got it 16:48:44 (DG shows diagram on whiteboard of how boundaries work) 16:49:16 Discussion about where keyboard presses are captured etc. 16:49:46 DG: there is no formal concept of how events are stopped at the shadow DOM boundary 16:49:51 ...it is wide open at the moment 16:50:16 ..the notion is we don't want to leak any references out of the shadow DOM 16:51:04 ..by default, all these things are traversable. You can reach into the shadow DOM 16:51:26 ..we don't want to stop them reaching into it, just not accidentally 16:51:43 DV: so we can't jail it off 16:52:00 DG: it is not a capability in the spec right now 16:52:17 ...all browsers use shadow DOM now for widgets 16:52:20 Shadow DOM: http://www.w3.org/TR/shadow-dom/ 16:52:45 TLR: ..and it can still reach out of that shadow DOM too...? 16:52:49 DV: Yes 16:53:25 (discussion of what security model applies) 16:54:03 ..we're concerned about 3rd party javascript 16:54:16 DG: "all i want to do is protect the hosting page from the 3d-party included code" 16:54:26 DG / AB: ..distrust in both directions 16:55:16 DG: I'm fine with a very limited comms model with each other, where there is a 'great wall' - events which are fired within don't reach anything 16:55:23 AB: events are the easier case 16:56:33 TLR asks if the model would create a security boundary between two trees, both of which have the same origin? 16:56:44 DG: I think we should contemplate different origins 16:56:58 TLR: we have places where we expect JS code to do origin checks 16:57:24 (iframe sandbox suggestion) 16:58:13 DG: turns out workers doesn't work across origins 16:59:38 DG: (whiteboards ideas about link ref) If it is cross-origin it will load in its own scripting reference 17:00:41 ..the element is somehow registered in the main document, if someone uses the 'like' tag (it is somehow cloned / cutdown in the main doc) 17:00:59 ..some element is created and has some shadow DOM tree that exists in the document 17:01:20 BH: sounds a lot like an iframe 17:01:35 DG: there are advantages, global state and interaction etc 17:01:43 BH: Global state is part of the problem... 17:02:02 DG: it's lifetime will have to match the lifetime of the document too 17:02:13 DG: most documents only have one like button 17:02:50 (last comment was DV 17:03:00 BH: lots of sites will have more than one like button 17:03:43 Pella: today facebook likes are using