20:49:47 RRSAgent has joined #webappsec 20:49:47 logging to http://www.w3.org/2013/06/04-webappsec-irc 20:50:12 rrsagent, set logs public visible 20:50:43 Meeting: WebAppSec WG Teleconference, 04-June-2013 20:50:47 Chair: bhill2, ekr 20:50:55 Agenda: http://lists.w3.org/Archives/Public/public-webappsec/2013Jun/0022.html 20:56:28 bhill has left #webappsec 20:59:56 ccarson has joined #webappsec 21:00:05 zakim, this is 92794 21:00:05 ok, bhill2; that matches SEC_WASWG()5:00PM 21:00:36 +ccarson 21:00:45 +??P2 21:00:49 +ekr 21:00:55 +bhill2 21:00:59 zakim, ??P2 is gioma1 21:00:59 +gioma1; got it 21:01:19 dveditz has joined #webappsec 21:01:20 ekr has joined #webappsec 21:01:23 +Wendy 21:01:48 +[IPcaller] 21:01:58 Zakim, IPcaller is dveditz 21:01:58 +dveditz; got it 21:02:41 -gioma1 21:02:51 +gopal 21:02:52 abarth has joined #webappsec 21:02:54 +??P2 21:03:07 zakim, ??P2 is gioma1 21:03:07 +gioma1; got it 21:03:35 zakim, who is here? 21:03:35 On the phone I see abarth, ccarson, ekr, bhill2, Wendy, dveditz, gopal, gioma1 21:03:37 On IRC I see abarth, ekr, dveditz, ccarson, RRSAgent, Zakim, bhill2, gmaone, timeless, mkwst_, odinho, trackbot, wseltzer 21:03:54 zakim, ??p2 is gmaone 21:03:54 I already had ??P2 as gioma1, gmaone 21:04:01 -gioma1 21:04:15 +??P2 21:04:21 zakim, ??P2 is gmaone 21:04:21 +gmaone; got it 21:04:57 Minutes from last month's call: http://www.w3.org/2013/05/07-webappsec-minutes.html 21:05:14 RESOLVED: minutes approved 21:05:50 scribenick: dvetitz 21:06:00 scribe: Dan Veditz 21:06:04 scribenick: dveditz 21:06:08 puhley has joined #webappsec 21:06:31 minutes from last time (5/7/2013) is approved 21:06:32 + +1.415.832.aaaa 21:07:00 zakim, aaaa is puhley 21:07:00 +puhley; got it 21:07:11 bhill2: last minute agenda wrangling, abarth would like to discuss script nonce maturity 21:07:43 ...: if we have any more time we can add discussing the UI safety issues Peleus brought up on the list 21:07:47 Topic: tracker 21:07:48 https://www.w3.org/2011/webappsec/track/actions/open?sort=owner 21:07:59 ... topic tracker opened 21:08:15 ... abarth had an issue to check with accessibility team 21:08:32 abarth: not done 21:09:04 abarth: thought I had done content-types for reports, I'll do that right now 21:09:07 bhill: do you want me to run the tracker? 21:09:36 +[Mozilla] 21:09:49 bhill2: assume dveditz has not done his since he just got editor access [dveditz; yup] 21:10:02 tanvi has joined #webappsec 21:10:18 Zakim, who is here 21:10:18 tanvi, you need to end that query with '?' 21:10:24 Zakim, who is here? 21:10:24 On the phone I see abarth, ccarson, ekr, bhill2, Wendy, dveditz, gopal, gmaone, puhley, [Mozilla] 21:10:26 On IRC I see tanvi, puhley, abarth, ekr, dveditz, ccarson, RRSAgent, Zakim, bhill2, gmaone, timeless, mkwst_, odinho, trackbot, wseltzer 21:10:28 bhill2: action 130, referrer control policy -- is that in the spec? 21:10:34 Zakim, [Mozilla] is tanvi 21:10:34 +tanvi; got it 21:10:52 bhill2: don't see it, going to assume all the open actions are going to remain open 21:11:03 https://www.w3.org/2011/webappsec/track/issues/raised 21:11:05 bhill2: raised issues 21:11:20 ... 7 at this point 21:12:08 ... issue 44, can table that for now until we discuss how script-hash interacts with script nonce 21:12:29 ... wait on issue 47, dveditz's addition of spec language for meta header 21:12:38 willdo 21:12:45 ... ekr can you close issue 48 since we have spec text to address it? 21:13:05 ... issue 49, add http response code to report. anyone want to take that? 21:13:12 https://www.w3.org/2011/webappsec/track/issues/49 21:13:32 ... neil had asked if it would be possible to add this 21:13:49 abarth: you can give that to me 21:13:59 ACTION abarth to add HTTP response code to reports in CSP 1.1 21:13:59 Created ACTION-139 - Add HTTP response code to reports in CSP 1.1 [on Adam Barth - due 2013-06-11]. 21:14:10 dan: you can make actions the way bhill just did 21:14:12 ... also a bug filed into the tracker about specifying best practices, you can give that to me as well 21:14:23 https://www.w3.org/Bugs/Public/show_bug.cgi?id=22256 21:14:41 ACTION abarth to add text addressing https://www.w3.org/Bugs/Public/show_bug.cgi?id=22256 21:14:41 Created ACTION-140 - Add text addressing https://www.w3.org/Bugs/Public/show_bug.cgi?id=22256 [on Adam Barth - due 2013-06-11]. 21:15:41 bhill2: issue 51 How to handle externally defined with -- is it worth defining an "import-src"? 21:16:05 ... or treat custom elements as a constellation where yiou have to specify script-src, style-src, etc 21:16:34 abarth: i think we should use script-src, if we use something new people who are trying to control scripts could be bypassed by this new thing 21:16:55 abarth: I'd like to make it possible for the spec that defines this thing to specify which policy it falls under 21:17:22 ... I want to get away from use defining everything under the sun but allow other specifications to reference how they are covered by CSP 21:17:33 bhill2: last two rae issues for me and I have not looked into those 21:18:14 Topic: Script API to CSP 21:18:19 http://lists.w3.org/Archives/Public/public-webappsec/2013May/0000.html http://infrequently.org/2013/05/use-case-zero/ 21:18:25 http://yehudakatz.com/2013/05/24/an-extensible-approach-to-browser-security-policy/ 21:18:45 ... next item is looking at the security policy script interface based on the responses on the mailing list, discussion involving alex russel and edward vela 21:19:18 abarth: I think there are 2 parts of this -- some object that corresponds to the parsed representation of the policy string, and .... ? 21:20:05 ... the original api we had was a way to query an effective policy, the second one, but didn't provide a string representation of the parsed policy 21:20:16 ... I think if we separate those we can address alex's issues 21:20:26 bhill2: anyone else have any comments? 21:21:11 ... I think we still have an open question of how to give an advanced user fined-grained control and I'd like to continue to explore that beyond CSP 1.1 21:21:39 abarth: I think we can talk when I make my proposal, how to incrementally grow the capabilities 21:21:51 bhill2: next topic, security model for SVG components 21:22:27 ... haven't had the time to really grok what this is about -- seems like it would take a deep understanding of the issues to address 21:22:48 ... we don't seem to have the right people involved on the call, does anyone here feel they could summarize? 21:23:38 abarth: issue is that some oc the SVG mechanisms are mediated by CSS and some aren't. what should the policy be for these loads? 21:24:14 ... some of them want it to be simple like image loads, and some thought it should use CORS because of possible information leaks 21:25:53 ekr: it was hard to tell if there was any real risk here 21:26:28 abarth: even if you make things public with CORS it's better than not using CORS because it divorces cookies from the request and makes it less likely a server will leak personal/private data 21:27:04 ekr: I promised to loop bz in because he's not on the call.... do we have a clear statement of position we can give him? 21:27:26 -gopal 21:27:28 abarth: I'm happy to write it. I'd write it "this is my opinion" not the sense of the call thouigh 21:28:00 bhill2: I like that statement of CORS... should it apply to link rel=import too? 21:28:05 abarth: yes it should 21:28:31 bhill2: ... this is general advice not just how it applies to CSP, that would be a good thing to have a discussion on 21:28:54 Topic: broadening default-src semantics 21:28:58 ... moving on. broadening default-src semantics 21:29:01 http://lists.w3.org/Archives/Public/public-webappsec/2013Jun/0000.html 21:29:48 abarth: summary-- Yehuda Katz cornered me that we shouldn't have to update the CSP spec every time the "web" spec gets updated 21:30:14 ... he was focusing on default-src, but really it was about writing the spec more generally 21:30:33 ... there might be some loads that are not specifically controllable that would fall back to default-src 21:30:44 bhill2: anyone object to that 21:31:16 ACTION abarth to update CSP 1.1 default-scr language to be more general, including coverage of areas not specified by other directives 21:31:16 Created ACTION-141 - Update CSP 1.1 default-scr language to be more general, including coverage of areas not specified by other directives [on Adam Barth - due 2013-06-11]. 21:31:35 Topic: nonce-source 21:31:36 http://lists.w3.org/Archives/Public/public-webappsec/2013Jun/0013.html 21:31:39 bhill2: last topic, nonce-source 21:32:47 ... email says currently nonce is only defined for script-src and style-src -- should it be more general (any directive) or does it only make sense for those two directives 21:33:11 dveditz: I'm inclinced to limit it to script and style, which are the ones with unsafe-inline 21:33:51 bhill2: should we say it can't be used in default-src ? 21:34:26 abarth: the way it's in the spec right now it's very much like "unsafe-inline" -- you can put it in default-src currently, but it only take effect in the directives that understand it 21:34:36 ... nonce is currently written the sme way 21:35:10 bhill2: we had this discussion about data: and things as well, are those useful to think about in these terms? 21:35:39 abarth: the interesting one there is data: because if you whitelist data: you're sort of whitelisting script injection so there nonce might make sense 21:36:54 abarth: the people I talk to who want to use nonce it's overwhelmingly for inline scripts which can't be removed for various reasons like performance 21:37:07 ... haven't heard anyone complain about not being able to use data: uris 21:37:41 bhill2: ok, we'll limit it to script and style for now since that's been the focus and people can bring up broadening it later if they like 21:37:57 abarth: I've been talking to a number of people considering CSP who have gotten somewhat through their implementation 21:38:14 ... they're running up agains the inline-script problem -- where there are a couple they can't remove 21:38:27 ... they got really interested in nonce-src 21:38:50 ... how far are we from candidate recommendation, maybe for all of CSP 1.1 or something with "strong consensus" 21:39:11 ... how would the working group feel if chrome implemented nonce-src ahead of the standards 21:39:49 bhill2: my feel as the chair is that we're getting close to feature complete on 1.1, maybe a few things we've discussed that aren't in there 21:40:10 bhill2: referrer tag, return status code 21:41:08 ... to move beyond (??) we have to have a reasonable demonstration that we have compatible implementations, not a complete test suite necessarily, but can't mark 2/3 incomplete or unready 21:41:20 abarth: the biggest risk you didn't mention was the script interface 21:41:45 ... can the WG push forward with what we have and put the script interface into a later version of CSP? 21:42:06 bhill2: we could do that, but the biggest hurdle is interoperable implementations 21:42:45 ... since mozilla is the only other one with a CSP 1.0 implementation this will largely depend on when Mozilla can get CSP 1.1 features implemented 21:42:58 tanvi: our CSP 1.0 implementation will be in Firefox 23 21:43:08 bhill2: congratulations 21:43:20 ... do you know when you're going to have CSP 1.1 stuff implemented? 21:43:26 tanvi: I don't know the timeline 21:44:16 bhill2: you (abarth) suggested moving nonce out from behind the flags.... if we have two implementations of that specific feature and it seems solid and not likely to change then that seems possible 21:45:00 ... right now you have to turn the features on using command-line flags. nonce is so useful for implementers that chrome would like to enable it without having to do that 21:45:18 tanvi: I don't know how long it will take for us to get to that 21:45:57 abarth: we're going to drop support for the prefixed header, they're not healthy for the web. We're adding new stuff to the official header, but only if you specify a runtime flag 21:46:53 ... I'd like to get people using CSP, and the last blocker for some of these groups is support for nonce-src. I don't want to end-run the W3C process, but I'd like to get this feature out there 21:47:18 bhill2: if you want to ride the bleeding edge in your product there are ways to do that that are less risky 21:47:39 ... joel weinberger has volunteered testcases for that feraturte that will help ensure interoperability 21:48:19 ... that will help answer whether this is stable and ready for use. that's better than fragmenting the spec into more subversions to get this feature rolling 21:49:00 ... I'll end with a plug for testing: anyone out there a github wizard and can help us move the testcases from mercurial to github? 21:49:21 ... there's currently a one month lag between me checking in a testcase and it showing up in public 21:49:38 q+ 21:49:42 ... have heard that github will make this process better but i'm a total github noob 21:50:00 ekr: what's he wanting to do, import the history from mercurial? 21:50:18 q- 21:50:29 bhill2: there's some particular way to set up github for that kind of access 21:51:19 ekr: wendy can you help us find out what the requirements for that would be? I don't want to import it all and find out it has to have special directory names or files 21:51:26 wseltzer: I can do that 21:51:56 ekr: does w3c have a github account? if not I can do it under mozilla. I don't want to do it under my name in case I get hit by a bus and then no one can access it 21:52:11 wseltzer: yes, we do but I don't know the process yet 21:52:37 bhill2: I want to host a "test the web forward" here in seattle. would like someone to do that in the bay area too 21:52:45 ACTION wseltzer to email bhill, ekr, and tobie re github setup 21:52:45 Created ACTION-142 - Email bhill, ekr, and tobie re github setup [on Wendy Seltzer - due 2013-06-11]. 21:52:51 ... have script-src completely covered, but there's more to do 21:52:55 -puhley 21:53:10 -ekr 21:53:11 thanks. 21:53:11 -Wendy 21:53:26 rrsagent, make minutes 21:53:26 I have made the request to generate http://www.w3.org/2013/06/04-webappsec-minutes.html bhill2 21:53:30 -tanvi 21:53:32 -ccarson 21:53:32 -dveditz 21:53:36 rrsagent, set logs public visible 21:53:42 zakim, list attendees 21:53:42 As of this point the attendees have been abarth, ccarson, ekr, bhill2, gioma1, Wendy, dveditz, gopal, gmaone, +1.415.832.aaaa, puhley, tanvi 21:53:44 -gmaone 21:53:55 rrsagent, make minutes 21:53:55 I have made the request to generate http://www.w3.org/2013/06/04-webappsec-minutes.html bhill2 21:53:56 -abarth 21:54:03 -bhill2 21:54:04 SEC_WASWG()5:00PM has ended 21:54:04 Attendees were abarth, ccarson, ekr, bhill2, gioma1, Wendy, dveditz, gopal, gmaone, +1.415.832.aaaa, puhley, tanvi 21:56:39 bhill2 has left #webappsec 22:00:33 puhley has left #webappsec 22:08:23 tanvi has left #webappsec 22:16:29 neilm has joined #webappsec 23:07:49 neilm_ has joined #webappsec 23:17:56 neilm has joined #webappsec