16:57:19 RRSAgent has joined #webauthn 16:57:19 logging to http://www.w3.org/2017/04/19-webauthn-irc 16:57:21 RRSAgent, make logs public 16:57:21 Zakim has joined #webauthn 16:57:23 angelo has joined #webauthn 16:57:23 Zakim, this will be 16:57:23 I don't understand 'this will be', trackbot 16:57:24 Meeting: Web Authentication Working Group Teleconference 16:57:24 Date: 19 April 2017 16:58:00 weiler has changed the topic to: agenda: https://lists.w3.org/Archives/Public/public-webauthn/2017Apr/0244.html 16:58:07 agenda: https://lists.w3.org/Archives/Public/public-webauthn/2017Apr/0244.html 16:58:28 weiler has joined #webauthn 16:59:04 present+ jfontana, weiler 16:59:49 present+ 16:59:57 present+ 17:01:10 present+ 17:01:17 present+ jcj_moz 17:01:28 scribenick: jcj_moz 17:01:44 jeffh has joined #webauthn 17:01:50 present+ jeffh 17:02:06 present+ mkwst 17:02:39 apowers has joined #webauthn 17:02:52 vgb has joined #webauthn 17:03:09 present+ 17:03:29 present+ angelo, battre 17:04:01 kpaulh has joined #webauthn 17:04:09 present+ 17:04:27 present+ 17:04:34 selfissued has joined #webauthn 17:04:48 present+ 17:06:04 Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2017Apr/0244.html 17:06:39 zakim, who is here? 17:06:39 Present: jfontana, weiler, jochen___, wseltzer, battre, jcj_moz, jeffh, mkwst, vgb, angelo, jyasskin, kpaulh, selfissued 17:06:41 On IRC I see selfissued, kpaulh, vgb, apowers, jeffh, weiler, angelo, Zakim, RRSAgent, battre, wseltzer, jyasskin, jcj_moz, schuki, adrianba, jochen___, slightlyoff, mkwst, 17:06:41 ... trackbot 17:06:55 gmandyam has joined #webauthn 17:07:05 alexei-goog has joined #webauthn 17:07:06 present+ 17:07:34 wseltzer: We have a pretty detailed agenda, so the team can help move things forward 17:07:41 Topic: Pull Requests 348, 350, 375, 378, 378, 384, 389, 407 and 408 (Rolf to explain 407 and 408) 17:07:45 angelo: Maybe we can just start, we are all looking at #384 17:08:02 angelo: jeffh has given his stamp of approval, does anyone have comments? are we ready to move forward? 17:08:17 vgb: I put in a minor comment this morning that is not really blocking 17:08:28 ... It's a thing we need to address down the road but we don't need to block the PR on it 17:08:37 https://github.com/w3c/webauthn/pull/384 17:08:44 ... I'd like to get dirk and alexei-goog to chime in as well because they had the most coherent counter to the proposa 17:09:13 present+ apowers 17:09:15 alexei-goog: My understanding is the call on Friday ended with alexei-goog and dirk agreeing to merge this in and deal with the fallout 17:09:33 alexei-goog: We reserve the right to tel you 'we told you so' multiple, multiple times 17:09:46 present+ gmandyam 17:09:56 jeffh: Yeah, so I've a couple minor nit comments that if mikewest agreed could fix up before merging 17:10:05 mkwst: I'll get those after this call 17:10:26 jeffh: We need a real, proper security considerations section somewhere 17:10:39 angelo: So, after mkwst makes the change that jeffh requested, are we ready to merge? 17:10:58 (jeffh will do the merger) 17:11:08 angelo: mkwst, you'll be able to make the change today? 17:11:13 mkwst: Yes. 17:11:47 https://github.com/w3c/webauthn/pull/409 17:11:49 angelo: We're talking about things blocking CTAP, PR #409, I want to clarify that this is everything in PR 384, the only addition is having a new bit 17:12:37 alexei-goog: I took a look at the current CTAP spec and I don't see any reference to 'TUI' 17:12:50 vgb: There's an outstanding PR from Alex Rudisky 17:13:00 alexei-goog: There's a PR out in CTAP that has TUI in it? 17:13:05 vgb: Yes, I can dig up the number 17:13:17 jeffh : We shouldn't be using the term 'identity' 17:13:30 ... we should stay away from the term, we're only doing authentication 17:14:09 angelo: The idea here is the authenticator tests the fingerprints... 17:14:17 jeffh: Doesn't User Verification Method signal that? 17:14:54 vgb: #1 this is in the core thing, so even if you don't implement UVM it's there 17:15:53 ... #2 the TUP only shows if the user is present, this stands-in for when the user is identified 17:16:27 rrsagent, make log public 17:16:33 rrsagent, draft minutes 17:16:33 I have made the request to generate http://www.w3.org/2017/04/19-webauthn-minutes.html weiler 17:17:20 angelo: So Jeffh wants to avoid the name... 17:17:20 jeffh: I didn't say I was OK with adding the bit, either 17:17:59 jeffh: this is an ad-hoc piece 17:18:58 angelo: We have about 7 bits left, are you saying we should not use them? 17:19:07 jeffh: No, I'm saying this is an ad-hoc approach 17:19:36 angelo: This is the kind of use case we have, and based on that use case we've added this new hting 17:21:07 selfissued: We shouldn't block on this 17:21:19 ... (we should do it) 17:21:50 This is an important distinction between any person present and a specific person present. Unless we have a specific counter-proposal that has support, we should do this. 17:21:53 https://github.com/w3c/webauthn/pull/217 17:22:26 alexei-goog: I need to read it, and it assumes changes to CTAP which I also haven't read 17:22:52 vgb: I hear jeffh's concern that we might be doing things in a less methodical way than we want 17:23:25 ... We did go through a certain approach to try and get agreement about the use cases for this, and TUI - badly named though it may be - helps with one of those use cases we came up with 17:23:49 ... One of the things we need to figure out is: either we're missing something in our use case classification (which we did a long time ago) or this does not implement that classification 17:24:01 ... I'd like to get a better sense of the objection 17:24:23 jeffh: OK, but we're not trying to merge this today? 17:24:32 angelo: No, we're just trying to have the discussion 17:24:51 q? 17:24:54 ... PR 378 is another one that I'm looking at right now 17:25:50 gmandyam: I have a question -- TUI... So the user verification bit is part of the auth data and it goes to a discrete auth. Is the idae that there might be authenticators that might support two modes of authentication? Like a touch and also a fingerprint? 17:25:58 ... Is this for multi-mode authenticators? 17:26:24 angelo: The intent of this is if it's a multi-mode authenticator, then as long as this can identify the user that's fine 17:26:33 gmandyam: No... 17:26:45 vgb: The intent of this bit is no different than TUP 17:27:09 ... The existence of this doesn't mean we're postulating about the mechanics of autheticators, we just want to know what it did 17:27:34 ... User Verification is supposed to be used the same way, it's signed over that says I actually verified the user's identity 17:27:40 jeffh: You performed user verification 17:27:57 vgb: Yes, that. This may lead to developers that find it useful to be multi-mode like that 17:28:13 ... but this is to define when I established presence, vs when verified identity 17:30:08 selfissued: Process point- we should do the priority implementation PRs 17:31:40 angelo: The reason I want to handle 409 is that it's blocking CTAP 17:31:54 alexei-goog: I think it'll be easier to handle after the CTAP PR merges 17:32:08 angelo: moving on to 378 17:32:49 https://github.com/w3c/webauthn/pull/378 17:33:00 angelo: I believe jeffh made some comments 17:33:30 jeffh: I need to review this in the same ... 17:33:54 jeffh: 378 and 409 are related in my nominal perspective 17:34:02 present+ nadalin 17:34:06 ... but I've been distracted with 384 of late, and I'll commit to reviewing this stuff in the next couple of days 17:34:18 vgb: it's actually 378, 348, and 409 17:37:23 selfissued: At the request of the WG, I've done a lot of work in 389 to clarify extensions, and jeffyasskin believes its ready to merge 17:37:30 jeffh: I was trying to review it before the call 17:37:54 credman: Are 407 / 408 going to break anything? 17:38:11 vgb: They're just adding things to enums and specifying additional behavior 17:38:21 alexei-goog: The attestation format and the UAF...? 17:38:32 ... You might see another one coming down for U2F 17:38:48 jeffh: I don't think those are necessarily... we'd like to get those by CR timeframe, but not WD-05 17:39:02 credman: I agree it's late in the game, but I'm afraid they'll break implementation 17:39:27 alexei-goog: We're doing things that are restructuring the APIs completely. Adding the enum is the least destructive thing we've done this month. 17:39:35 jeffh: Let's review before the next call 17:39:56 409, 384, 378 -- that is Angelo's list for WD-05 17:39:56 angelo: After 409 and 384 and 378 are merged in, we can apply wd-05 to them later if we want 17:40:08 .... we can have a WD-05 version there, and that'll be the Edge implementation 17:40:17 ... and we'll match the Chrome and Firefox implementations later on 17:40:24 ... and as long as there's no breaking change we'll be fine 17:40:42 https://github.com/w3c/webauthn/pull/389 17:40:42 selfissued: I think we should merge in 389 because it's not breaking aknig and it makes a bunch of stuff clearer. 17:40:48 jeffh: I tend to agree 17:40:54 ... can I review it ? 17:41:01 ... I'm happy to get it merged before next call. 17:41:08 angelo: I don't think it's a priority for implementation 17:41:14 jeffh: I think it is 17:41:20 selfissued: It is a priority for implementation 17:42:07 ... I want the decision on the call that unless jeffh thinks it is terrible, that he'll merge it by tomorrow 17:42:15 credman: (agrees with the above) 17:42:24 rrsagent, draft minutes 17:42:24 I have made the request to generate http://www.w3.org/2017/04/19-webauthn-minutes.html weiler 17:42:27 credman: We want the WD-05 as soon as possible 17:42:46 ... I want jeffh to look at it ASAP so we can close down WD-05 17:42:48 jeffh: OK 17:42:58 angelo: That's fine 17:43:17 vgb: How do you feel about 350? 17:43:19 https://github.com/w3c/webauthn/pull/350 17:43:30 angelo: I think that's important, but it's a fix 17:43:46 jeffh: still some vgb comments. I'll take a look at that also 17:43:54 ... it's stale, it needs a merge 17:44:08 angelo: for 350 I have less of concern 17:44:30 alexei-goog: Looking at 350, it says throw NotFoundError and that seems great, but then it says Key Storage and .... 17:44:33 angelo: That's a mishap 17:45:07 jeffh: So we're not going to review until angelo polishes PR 350 17:45:17 angelo: that's all of the things that I think, that I consider blocking us 17:45:50 credman: I'd like some explanation on 407 and 408 17:46:00 jeffh: I talked with you about those face-to-face 17:46:08 credman: I understood they were coming 17:46:33 alexei-goog: Can you make sure the face-to-face discussion makes it on the list? 17:46:35 jeffh: OK 17:46:45 credman: Is there something you want to tell us? 17:47:14 jeffh: Both Rolf and I have mentioned this in the not too distant past - if you have a UAF-enabled smartphone, you should be able to have a CTAP shim added to it and then use it as a roaming authenticator for a WebAuthn-enabled device 17:47:30 gmandyam: It doesn't even have to be CTAP, it can be 17:47:40 jeffh: Yes, but there's a zillion devices in the field, so it seems good to enable this 17:47:48 gmandyam: Qualcomm is in favor of this 17:48:08 alexei-goog: When we were deciding if we needed a separate credential type for U2F, we decided we didn't need to 17:48:24 ... we decided (the metadata) was enough 17:48:41 ... Is that not the case for UAF? Is it not possible to indicate you're OK with a UAF device given what's there? 17:48:51 jeffh: That's a good question, as part of review we'll have to answer that 17:49:07 alexei-goog: We did think about this, adding a U2F type, and we decided we didn't need to 17:50:50 present- 17:58:37 zakim, list participants 17:58:37 As of this point the attendees have been jfontana, weiler, jochen___, wseltzer, battre, jcj_moz, jeffh, mkwst, vgb, angelo, jyasskin, kpaulh, selfissued, alexei-goog, apowers, 17:58:40 ... gmandyam, nadalin 18:02:35 The list of PRs to go through before the end of the week, and close, is 409, 384, 378 18:02:54 Consensus eus is that should close out WD-05 18:03:20 Meeting adjourns with the acknowledgement that we should be releasing WD-05 next 18:03:26 s/eus is/is/ 18:04:03 chair: wseltzer, selfissued, nadalin 18:04:07 rrsagent, draft minutes 18:04:07 I have made the request to generate http://www.w3.org/2017/04/19-webauthn-minutes.html weiler 18:51:31 weiler has joined #webauthn 18:54:37 weiler has joined #webauthn 20:18:30 Zakim has left #webauthn