16:44:45 RRSAgent has joined #webappsec 16:44:45 logging to http://www.w3.org/2016/01/13-webappsec-irc 16:44:47 RRSAgent, make logs world 16:44:47 Zakim has joined #webappsec 16:44:49 Zakim, this will be WASWG 16:44:49 I do not see a conference matching that name scheduled within the next hour, trackbot 16:44:50 Meeting: Web Application Security Working Group Teleconference 16:44:50 Date: 13 January 2016 16:44:53 wseltzer has changed the topic to: WebAppSec 13 January 16:52:47 gmaone has joined #webappsec 16:58:14 ckerschb_ has joined #webappsec 16:58:51 francois has joined #webappsec 17:00:02 present+ mkwst 17:00:12 present+ francois 17:00:16 jww has joined #webappsec 17:00:35 present+ bhill2 17:00:59 bhill2 has changed the topic to: https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0059.html 17:01:10 present+ dveditz 17:01:23 present+ jww 17:01:31 present+ terri 17:01:59 estark has joined #webappsec 17:02:27 present +gmaone 17:02:35 jochen has joined #webappsec 17:02:35 present +estark 17:02:42 thanks for setting up the meeting, wseltzer 17:02:55 can we do referrer policy first please? 17:03:00 sure 17:03:28 thx 17:04:11 present+ ckerschb 17:04:28 TOPIC: Agenda bashing 17:04:33 https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0059.html 17:04:36 present+ eisinger 17:04:38 present+ freddyb 17:04:43 bhill2: Any suggestions for agenda items? 17:05:16 mkwst: If we have time, we could chat about intranet/internet thing. 17:05:19 bhill2: Ok. 17:05:24 TOPIC: Minutes approval 17:05:29 http://www.w3.org/2011/webappsec/draft-minutes/2015-12-16-webappsec-minutes.html 17:05:41 bhill2: Objections to approving the minutes? 17:05:49 TOPIC: Documents for next teleconference. 17:05:52 All: 17:05:55 bhill2: Approved! 17:06:20 TOPIC: Outstanding Calls for Consensus and Comments 17:06:28 tanvi has joined #webappsec 17:06:32 SRI to Proposed Rec 17:06:33 bhill2: Topics for next time? Maybe the CORS thing if we don't have time today. 17:06:38 https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0020.html 17:06:39 bhill2: SRI to PR? 17:06:46 bhill2: Objections to moving ahead? 17:06:54 all: 17:07:04 bhill2: Huzzah. Approved, I'll send the transition request. 17:07:07 Mixed Content to Proposed Rec 17:07:09 present+ tanvi 17:07:16 https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0021.html 17:07:19 bhill2: Might have been a bit premature. 17:07:28 bhill2: Only one implementation of `block-all-mixed-content`. 17:07:41 bhill2: Is it worth bothering to do that and `upgrade-insecure-requests`? 17:07:49 ... Will produce less breakage. 17:08:14 ... Hours away from turning on `block-all-mixed-content` for FB employees because I want to surface breakage early. 17:08:26 ... Upgrade might hide that kind of breakage. I don't want to hide it. 17:08:37 ... That's a development scenario, not a production scenario. 17:08:41 ... Might not be worth implementing. 17:08:56 ... It seems like it's the future, though, so maybe it's nice to let folks opt into that world. 17:09:02 ... Mozilla folks? 17:09:18 tanvi: I brought this up. 17:09:26 ... The FB scenario isn't something we've thought about. 17:09:33 ... Other than that, I don't see the use cases. 17:10:08 mkwst: there are projects inside google planning to turn this on as a "strict mode", want to make sure they don't have http content 17:10:18 ... appealing to have strict vs. a transient upgrade mode 17:10:29 ... understand notion they are similar in nature, one is like a subset of the other 17:10:41 ... not everyone may see different use cases 17:10:41 tanvi: Couldn't you do this with CSP? 17:11:01 mkwst: doesn't cascade into frames 17:11:09 tanvi: Dan? 17:11:18 dveditz: I thought we had implemented it. :) 17:11:26 ... I don't see why we wouldn't, but I don't feel strongly about it. 17:11:33 tanvi: I'll take this back to the team, and report back. 17:11:41 ... In the meantime, what do we do about CR/PR? 17:11:56 bhill2: Feature at risk without 2 implementations, I'll object to my own CfC. 17:12:03 ... We'll wait. Waiting is fun. We like waiting. 17:12:42 ... I would rather hear "No" from Mozilla so we can start the process of removing it, as there's some exciting IPR process there. 17:13:19 ... "Probably" is a particularly bad answer. 17:13:25 ... Certainty would be nice. 17:14:35 mkwst: Reporting requirements? Currently none. Might be useful enough to be a requirement. 17:15:04 bhill2: Would be great to have. Probably not essential for PR. I'd settle for things breaking. 17:15:35 tanvi: Cascade makes reporting interesting. 17:15:37 tanvi: one issue is when it cascades into frames - be reporting on foreign content 17:15:59 dveditz: can treat it like we do redirects 17:16:19 CSP3 to FPWD 17:16:28 https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0034.html 17:16:52 UI Security - new major editors' draft 17:16:58 https://lists.w3.org/Archives/Public/public-webappsec/2015Dec/0024.html 17:16:59 bhill2: Expires Friday. Might be a good time to read CSP3. 17:17:18 ... Would like feedback on UI Security before issuing a CfC to FPWD. 17:17:21 teddink has joined #webappsec 17:17:28 ... Please read, and tell the group about it. 17:17:31 zakim, who is here? 17:17:31 Present: mkwst, francois, bhill2, dveditz, jww, terri, ckerschb, eisinger, freddyb, tanvi 17:17:33 On IRC I see teddink, tanvi, jochen, estark, jww, francois, ckerschb_, gmaone, Zakim, RRSAgent, bhill2, yoav, freddyb, mounir, tobie, timeless, Josh_Soref, dveditz, slightlyoff, 17:17:33 ... mkwst, terri, schuki, Mek, xiaoqian, trackbot, wseltzer 17:17:36 ... Let's move Referrer Policy up. 17:17:37 TOPIC: Referrer Policy 17:17:51 Apologies for my tardiness - dialing in now. 17:17:58 jochen: Quick update. We hammered out `referrerpolicy` attribute on and . 17:18:09 ... Need to update published draft. 17:18:22 ... We're missing spec tests for that feature. 17:18:34 s/// 17:18:47 ... Requests for other elements as well. for instance. 17:19:10 ... Referrer policy delivered via CSP. Ran into some issues with things like redirects. 17:19:28 ... Now looking into a dedicated `Referrer-Policy` header which has clearly defined behavior in cases like this. 17:19:40 dveditz: Do you mean that redirects could change the policy as you redirect? 17:19:57 jochen: Consider `t.co`: if you go through that page, the default policy applies. 17:20:13 ... We need to deliver the policy together with the response. 17:20:34 dveditz: Why wouldn't you carry the original policy through the redirect chain? 17:20:48 jochen: What if you enter a URL into the address bar? No original policy. 17:21:02 ... That forces default policy. 17:21:13 dveditz: If there is a policy, we need to decide which policy wins, right? 17:21:38 jochen: If you do a client-side redirect (e.g. load the page, then navigate yourself) you also get to choose the policy. We should take that into account. 17:21:52 ... Ok. 17:22:08 ... Still open: `ping-from` needs referrer policy definition. 17:22:24 present+ wseltzer 17:22:29 ... CSS's integration with Fetch is poorly defined. 17:22:44 ... Will need to work with that group to understand/define the integration. 17:23:01 estark: One more open issue: JSON syntax for the `referrer-policy` header, maybe? 17:23:12 ... Initially specced as a string, but maybe we want to be more flexible for the future. 17:23:56 mkwst: One suggestion was to use a quoted string, which would be forward-compatible with a JSON syntax in the future. 17:23:56 mkwst: one suggestion is to use a quoted string vs. bare string which would keep familiar syntax but be forward compatible 17:24:03 estark: I like that idea. 17:24:12 bhill2: When would you like to publish a new working draft? 17:24:40 jochen: Soon. Both Firefox and Chromium would like to ship the `referrerpolicy` attribute, as least what we have now. 17:24:50 ... Requires spec tests to be present, but we should of course also update the draft. 17:25:06 bhill2: Two implementations that are going to ship, is it worth calling "level 1" done? 17:25:24 jochen: Anne proposed that we actually move most of this to the HTML spec. I dunno. 17:25:42 ... I'd rather finish the few remaining points and see where we go from there. 17:25:58 bhill2: Would be good to get a heartbeat update out, since there are large sites using this in important ways. 17:27:05 ... Reasonable stable spec is good for interop. Should publish a new WD update. 17:27:15 TOPIC: Subresource Integrity - starting work on Level 2 17:27:48 freddyb: Hi! 17:27:53 ... Long list of things we intend to do. 17:28:19 ... I think we ought to prioritize integrity policies. Have some interest inside Mozilla, which is helpful. 17:28:29 ... Would require integrity for a certain set of HTML elements. 17:28:46 ... Probably live in a different header, as far as I understood mnot's comments on the issue. 17:28:47 GitHub also expressed interested in SRI policies 17:29:13 ... Would probably also want to support so we don't require a header. Interesting for CDNs (GitHub Pages, for instance) 17:29:24 ... Other things: adding integrity to other elements. 17:29:37 ... That's a bit tricky, since we don't want to block on the complete download before we do the hashing. 17:29:41 ... Still needs research. 17:29:58 ... Other things: signatures? public key for a resource? 17:30:13 ... Might be other things: jww? francois? 17:30:41 bhill2: Would like to hear from UA implementers about things they're interested in implementing. 17:31:00 jww: From my perspective, I'm interested in what developers want. Signatures are one big thing. Downloads another. 17:31:14 ... Pretty open to seeing how folks are using SRI in the next months, and building off of that. 17:31:20 francois: Would echo jww's comments. 17:31:31 ... Important to see what might get adopted before we spec and implement features. 17:31:42 ... We've heard that GitHub wants the policy stuff freddyb talked about. 17:32:02 ... Also heard requests for support for images. Blocks progressive rendering. 17:32:08 ... Might be fine for some use-cases. 17:32:20 ... Would be helpful to have feedback from developers. 17:33:03 mkwst: Have you looked at agl's proposal for streaming? Merkle trees, etc? Long time ago. 17:33:17 freddyb: Seems like a good way to go. Don't remember the syntax. 17:34:11 jww: Talked with yoav about extracting SRI information to a central place in the page. 17:34:20 jww: Also. Caching. That's a big topic. 17:34:49 bhill2: Proxy vote on dev's behalf. He wants signatures. Dropbox is interested. 17:35:04 ... Also good to to talk to about streaming syntax, as a distributor of large files. 17:35:23 s/distributor/purveyor/ 17:35:57 bhill2: All interesting cases. I like being driven by developer use cases. I think these topics are things we've had sporadic activity on the list now for a long time. 17:36:04 ... Would be good to see a little more direction from editors. 17:36:15 ... Pick one or two things to drive a spike through. 17:36:48 ... Everyone has their priorities. If you have a good idea of a direction in which to lead the community, especially one which you'd implement, please do so. 17:37:27 https://mikewest.github.io/cors-rfc1918/ 17:37:37 TOPIC: opt-in CORS-like policy for intranet/internet bridging requests 17:37:49 mkwst: sent out a doc a week ago, premise is that intranet is distinct from internet 17:37:55 ... browser should not give one direct access to the other 17:38:16 ... we've had a formal distinction by RFC 1918 for a decade, haven't acted on it as a browser community 17:38:32 ... large number of devices that believe they exist in a bubble that doesn't include the internet 17:38:43 ... false of course, browser is a confused deputy pivot point between these worlds 17:38:55 ... routers are particularly problematic, history of CSRF attacks 17:39:19 ... also pieces of software hosted on users computer and grant excessive privileges, e.g. yesterday's TrendMicro vuln disclosure 17:39:34 ... tried a year or two w/ Mixed Content to block this 17:39:45 ... treating RFC1918 as mixed content subject to blocking 17:39:58 freddyb: I'll get back to work on the Bikeshed branch, but it's a little complicated because Dev and Francois (reasonably) requested that I do a pure conversion first without any textual changes, and my current branches has a number of (minor) changes. 17:40:00 ... objected to by developer community and removed 17:40:18 ... would like to revisit by using CORS preflight as an explicit opt-in for intranet resources 17:40:23 ... to talk to internet resources 17:40:29 jww: ah, right. 17:40:54 ... expect a new response granting access based on signalling the network type it is willing to talk to 17:41:06 q+ 17:41:26 q+ 17:41:27 ... I'm interested in experimenting in Chrome, need to look at network stack to see when and how we know about the network location 17:41:47 ... what I'd like to know is whether this is a problem that the group is interested in addressing 17:41:53 ... and is this mechanism appealing? 17:41:57 ack wseltzer 17:42:08 wseltzer: thanks for bringing this up, seems interesting to me 17:42:27 ... will need some developer advice because people will say "this breaks my internal development workflow" 17:42:42 ... need ways to do testing of sites and services that show up on intranets in development 17:43:00 mkwst: need to support developers, but we will break things, too 17:43:13 q+ 17:43:25 ack dveditz 17:43:48 dveditz: have long wanted to do this, initial attempts have been shot down because of breakage 17:43:56 ... maybe we can get past it as a bigger group. 17:44:05 ... RFC1918 is a hack and the problem predates this 17:44:36 ... would be nice if we can open the possibility that UAs can add e.g. enterprise management features to do this more explicitly 17:44:53 mkwst: one piece of feedback is that proxies are an interesting way to do this, e.g. with a PAC file 17:45:51 bhill2: we should ask IE about this - very long history and lots of experience with this kind of thing (zones, proxies, intranet only settings, etc.) 17:46:00 ... maybe ask Eric Lawrence to weigh in 17:46:13 mkwst: also I would like help on how this works with IPv6 17:46:23 I can also find folks in Edge (former IE, of course) as needed to help discuss the Zones issues, although Eric is a good resource as well. 17:47:09 mkwst: happy to come back to more complex things once we get the simple ones done 17:47:46 dveditz: from a spec thing would be nice to block the IP, at impl the layers were far apart and made it hard to block 17:48:23 ... and DNS game playing can make this hard to implement, too 17:48:56 dveditz: I believe that Opera did this... 17:49:09 mkwst: they did this in Presto, do not do it today 17:49:37 dveditz: would be interesting to hear feedback from their users 17:49:49 q? 17:49:59 ack bhill 17:50:12 bhill2: Not to let the perfect be the enemy of the good, but: 17:50:34 ... CORS + MIX only halfway blocks this attack. 17:50:56 ... The attacks we're interested in can be accomplished with a redirect or navigation. 17:51:20 q+ 17:51:24 ... The breakage we'd introduce by blocking navigation might be large. Much larger than treating it as mixed content. 17:51:49 mkwst: spec intends to cover navigation, that is both a concern and a challenge 17:52:04 dveditz: When we tried it, we blocked navigations. XHR was one way to do it, redirects were another. 17:52:16 ... That's when we ran into problems where machines in the intranet... 17:52:31 ... For a home user it worked well, more complex cases were less clearcut. 17:52:39 bhill2: I worry that this would break SAML and SSO systems. 17:53:03 ... I want to go to externalportalformybenitits.com, redirects internally for token, redirects back out. 17:54:29 mkwst: yes, but hopefully it will be easy for such systems to opt-in 17:54:47 ... an alternative midpoint is to use an interstitial and have the user click OK 17:54:56 ... gives us runway to talk to vendors and get the products fixed 17:55:55 mkwst: I don't see this as a separate spec, I think it would be a note here and actual text would go into Fetch, Websockets, etc. but not be a normative resource here 17:56:57 Thanks! 17:57:03 zakim, list attendees 17:57:03 As of this point the attendees have been mkwst, francois, bhill2, dveditz, jww, terri, ckerschb, eisinger, freddyb, tanvi, wseltzer 17:57:10 rrsagent, make minutes 17:57:10 I have made the request to generate http://www.w3.org/2016/01/13-webappsec-minutes.html bhill2 17:57:15 rrsagent, set logs public-visible 17:57:18 bye :-) 17:57:32 ckerschb_ has left #webappsec 18:06:06 bhill2 has joined #webappsec 18:06:29 bhill2 has joined #webappsec