14:01:32 RRSAgent has joined #hb-secure-services 14:01:32 logging to http://www.w3.org/2016/06/16-hb-secure-services-irc 14:02:44 wseltzer: yes 14:03:17 virginie has joined #hb-secure-services 14:04:33 hello all, details of the call can be found here https://lists.w3.org/Archives/Public/public-hb-secure-services/2016Jun/0008.html 14:06:03 chaals has joined #hb-secure-services 14:06:29 Trying to dial in, just getting steady tone 14:06:49 (says it can't connect me to the call, after getting my name and trying…) 14:07:53 @chaals try this number local number from here : https://lync.gemalto.com/dialin 14:08:06 @marko, where do you call from ? 14:08:29 I'm in now. 14:09:10 present+ virginie, Bruno, Sebastien, marko, wseltzer 14:09:41 present+ Peter Hofmann 14:09:52 agenda+ Review of the current document 14:10:01 agenda? 14:10:30 agenda+ linking to the CG and its work 14:11:25 zakim, clear agenda 14:11:25 agenda cleared 14:11:30 zakim, please clear the agenda 14:11:30 agenda cleared 14:11:40 agenda+ Review of the current document 14:11:40 agenda+ document 14:11:47 agenda+ scoped credentials 14:11:55 agenda+ deliverables 14:12:01 agenda+ TPAC meeting 14:12:04 agenda? 14:13:36 [By the way, I'm trying to make a link to the work of this group, and wondering where I should link to…] 14:14:19 chaals, https://rawgit.com/w3c/websec/gh-pages/hbss.html#dfn-method-confirm is the document Sebastien is talking about 14:14:58 Sebastian: what has changed in document - a new introduction. Section 4.1.3.1 confirmation method. 14:15:50 to chaals, we are working on the mailing list https://lists.w3.org/Archives/Public/public-hb-secure-services/, and on the github area https://github.com/w3c/websec 14:15:55 chaals, here's the group's homepage: https://www.w3.org/community/hb-secure-services/ 14:18:33 [I think that we shold publish on a regular basis some post on the CG home page to give a clear view of the group activities and progress, thans chaals] 14:18:51 s/shold/should 14:18:58 s/thans/thanks 14:22:30 mark : will we have to use TEE for trusted UI 14:22:46 sebastien : all implementations are possible and we will have to add this into the document 14:23:00 peter : will it be a normative part ? 14:23:35 sebastien : it will be informal, as it will be implementation dependant 14:24:25 Virginie: reminder that we are not producing a standard, we are a non-normative group 14:25:28 peter : there will be different security and trust level depending into the context (with or without TEE, for example) 14:27:46 virginie : we may use a list-description of the context for executing the secure transaction confirmation 14:28:24 virginie : we might have to list technologies involved and possible scenarios (is there a TEE, yes, no, is there a tamper resistance storage of key, yes, no, ....) 14:28:47 peter : yes, that would be great for the srevice provider to make decision when/if to run the services 14:29:14 sebastien: privacy issues about keys managed in smartphone 14:29:14 sebasteine : we will have to be careful with the privacy, by dsclosing too much things to the web app 14:29:37 sebastien : this is why we decided to have the user involved into the choice of the credential to use for the confirmation 14:30:09 sebastien : we will have to have the user and the service provider involved in the choice 14:30:40 sebastien : we mentionned in previous discussion that the key will be associated with a given service provider, so the choice might be quite easy 14:31:16 sebastien : the role of the certificate authority can also be usefull to make a choise : the Service provider may have its own list of acceted CA 14:34:01 need increased explanation in section 5.1 and 5.2, plus add notion of attestation 14:34:24 attestation = information related to context of storage and execution 14:34:50 attestation notion can be reused for transaction confirmation and secure credential storage 14:35:21 Virginie: do we consider that attestation should be signed by someone, or up to browser to ensure that it cannot be modified? 14:35:45 Should not be replayable - needs to be ensured by some cryptographic signature 14:36:19 virginie : in the field today, there is no such as signed attestation 14:36:43 [note there's an attestation in the webauthn: Styling with Markdown is supported 14:36:46  Comment Close issue 14:36:55 May be added later on, when attestation is available on trusted UI component; FIDO already has concept of attestation 14:37:03 s/Styling with Markdown is supported/https://w3c.github.io/webauthn// 14:37:07 -> https://w3c.github.io/webauthn/ 14:37:12 s/ Comment Close issue 14:37:13 sebastien : the attestation will collect the information aboutvthe Tusted Ui and the secure storage capabilities 14:37:56 https://w3c.github.io/webauthn/#attestation 14:39:04 virginie : then what do we do ? 14:39:36 sebastein : we may just consider that the device manages attestation transarently at first usage 14:40:08 V: If a user agent implements the API, and wants to integrate attestation first, how can we do that? 14:40:30 S: because there is no attestation, we cannot request to support attestation. So first verstion would be without attestation. 14:41:27 Second version: as a result of transaction confirmation, the confirmation/cryptographic element + attestation to give additional information to server about the environment 14:42:09 V: What would be this piece of information? S: provided by the browser V: How would the browser get this information? 14:43:04 S: for smart card, it would be something new, so would not be there at the first day. Expect that TEE would provide description of its environment. Way to prove to service provider that it has been certified. 14:44:24 V: would like to measure work in explaining why we need attestation. 14:45:43 sebastien : this would have to be managed at key issuance/creation 14:45:59 S: for transaction confirmation, too complex for service providers to implement individually. Manage at key issuance. Certificate authority will issue key only if managed by TEE. 14:46:03 sebastien : thus the service provider would not have to manage this kind of complexity 14:46:56 V: suggests Sebastien writes requirement for attestation into document. 14:47:47 https://rawgit.com/w3c/websec/gh-pages/hb-secure-services/SafranIdentitySecurity_Authorization-model-for-Javascript-usage-of-hardware-based-keys.pdf 14:47:49 Agenda: scoped credentials 14:57:59 mark : are you proposing that, in the rowser approach, that the same key is used across different services ? 14:58:09 mark : how do you garantee the pricavy ? 14:58:21 sabstien : it will be undre the exclusive control of the user 14:58:27 s/undre/under 14:59:36 virginie : whihc solution do you prefer ? 14:59:52 bruno : prefers the second approach with ADSL 15:00:04 mark : suggests that we have a pro/con analysis 15:00:14 sebastien : yes, I can provide that 15:00:35 bruno : in the second approach the user is participating to the authorization od domains 15:01:08 sebastien : the seocnd approach needs work on the UA side, as it is a complete new feature 15:01:52 sebastien : but it fulfills the expectation of the user controling all the credential and taking into account the service provider policy 15:02:07 s/seocnd/ second 15:03:23 Virginie: priorities for community group: secure credential storage needs to be written, scoped credentials would be priority 3 behind secure credentials + transaction confirmation 15:04:00 Virginie: may ask CG members for more input on the scoped credentials proposal 15:05:01 Virginie: want CG to be able to show to browser vendors what we can do, so will need some implementations 15:05:40 Ideas to improve webcrypto API to include secure storage suggestion 15:06:11 Virginie: how can we present prototypes? Would Sebastien have a demo in September? 15:06:58 Sebastian: has modified middleware available already; need to link to transaction confirmation API 15:07:11 V: would it be available for a mobile? 15:07:44 Sebastian: would be a PC-based demo. Agrees definitely need to do something on mobile 15:07:53 V: more willing to work on mobile side 15:08:45 S: mostly done on Chrome, or Firefox. V: Gemalto to work on Firefox 15:09:28 Agenda: should we meet during TPAC? W3C meeting in September in Portugal. 15:10:00 virginie : will you be at TPAC ? 15:10:03 +1 15:10:07 Mark: not in Lisbon, not sure whether Colin would attend 15:10:15 +1 15:11:04 Virginie: ask w3c about possibility to invite non-w3c members. 15:12:14 V: Wednesday at W3C is open to absolutely anyone,brainstorming day 15:13:07 phofmanntsy has joined #hb-secure-services 15:14:55 Virginie: Sebastian's document still needs to have some use cases. Ping Brian for bank-related services. 15:15:38 V: Could Peter have a look at the different use-cases? 15:17:41 +1 15:17:44 -1 for Tues 28th. 15:18:10 Will check with Paul/Colin for 28th. 15:19:55 Will have next meeting on Tuesday 28th at 1400 UTC 15:20:39 quit 15:21:37 zakim, please generate minutes 15:21:37 I don't understand 'please generate minutes', virginie 15:22:33 rrsagent, please generate minutes 15:22:33 I have made the request to generate http://www.w3.org/2016/06/16-hb-secure-services-minutes.html virginie 15:24:01 rrsagent, set logs world-visible 16:21:25 chaals has joined #hb-secure-services