17:59:19 RRSAgent has joined #webauthn 17:59:19 logging to https://www.w3.org/2021/04/07-webauthn-irc 17:59:21 RRSAgent, make logs Public 17:59:23 Meeting: Web Authentication WG 17:59:24 Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2021Apr/0019.html 19:02:04 present+ 19:02:58 jfontana has joined #webauthn 19:03:29 elundberg has joined #webauthn 19:03:47 present+ 19:04:43 present+ akshay, nadalin, agl, bill, rae, davidwaite, elundberg, sbweeden, johnbradley, timcappalli 19:04:52 tony: we are passed the Rec and in red stage 19:04:57 ...when do we publish? 19:05:07 wendy: Thursday - tomorrow 19:05:32 dveditz has joined #webauthn 19:05:42 agl: two implementation is resolved 19:05:44 present+ 19:05:47 tony: yes 19:06:02 ...agree on publishing 19:06:11 consensus is Thursday 19:08:07 agl: level 2 and CTAP 2.1 are tidy up specs 19:08:20 wendy: overall it makes the spec more secure 19:08:30 tony: thanks to everyone. 19:10:04 agl: have issue from fido2; credblob 19:10:23 ...we wanted to discuss it here 19:10:55 ...extension 19:11:26 akshay: trying to figure out why this is necessary, it is in client extensions. 19:12:21 selfissue: th point here is want to be consistent in the way extensions behave 19:13:05 agl: it lets RPs determine if the browser supports extension even if authenticator does not 19:13:30 tony: anything from FIDO land 19:13:42 agl: if an extension is not exposed at the webauthn level, it would not need a client output.... 19:13:44 jbradley: nothing relevant 19:14:21 PROPOSED: Adopt Level 2 Rec as FPWD for Level 3 19:14:27 [no objection] 19:14:31 nsteele has joined #webauthn 19:14:38 jeffh: so moved 19:14:39 present+ 19:14:42 tony: is there unanimous consent? 19:14:48 (yes) 19:14:50 RESOLVED: Adopt Level 2 Rec as FPWD for Level 3 19:14:59 tony: we can start the transition on Github 19:15:46 tony: we are going from master to main 19:15:53 tony: we can do it now or after the call. 19:16:22 ...objections? 19:16:42 tony: all set to go Main. 19:17:07 https://github.com/w3c/webauthn/issues/1591 19:18:09 tony: ok 19:18:14 https://github.com/w3c/webauthn/issues/1580 19:18:48 jbradley: i left a note to close it 19:19:16 tony: should we move to bi-weekly calls as we get going on Level 3 19:19:21 ...any support 19:20:06 agl: I expect Level 3 to be more robust than L2 19:20:31 ...won't be too long, two months would be disappointing 19:21:31 tony: meet in two weeks from today and go to that schedule. 19:21:54 ...we will go every other wednesday 19:24:59 https://github.com/w3c/webauthn/issues/1590 19:25:50 jeffH: spec says authenticator should implement signature counter feature, but in practice may not be much utility 19:26:52 jbradley: some usefulness, signature counter to detect cloning 19:27:04 ...optional in FIDO certification above Level 2 19:27:14 ...above Level 1 19:27:23 correction 19:28:31 shan: there is nothing for cloning detection 19:28:45 jbradley: counter is allowed to be zero 19:28:58 agl: we might tweak that 19:30:55 shane: having seen the counter in Chrome, I realized it was following the rules 19:32:47 agl: global counter across all creds. if attacked can get into service they can follow counter 19:33:06 ...they can craft false signatures and slip them in where they are OK 19:33:16 jbradley: but would have to be in real time 19:33:28 ...have to get the user to use the authenticator on the other site. 19:33:35 ...before they log in to legit site 19:33:47 agl: it takes some juggling 19:34:10 jbradley: real question, counter was intended for software 19:36:30 jbradley: we should change this in the security requirements at FIDO 19:38:18 agl: does not sound like we have consensus, I suggest closing it 19:38:34 jbradley: there is some more things in here with counters. 19:39:55 shane: I only see this when I use the conformance tool 19:41:34 agl: our model is the authenticator never stops. 19:42:51 s/authenticator/authentication/ 19:43:20 nsteele: the way we see this used with Apple devices, it is shared in os 19:43:48 jbradley: Chrome on Apple or Safari 19:43:54 nsteele: on chrome 19:44:22 nsteele: sorry, it is safari 19:46:51 jbradley: looks like we are closing this down, likely take it up in FIDO from a certification angle 19:47:19 agl: looks liek chrome on map uses time stamp 19:48:09 correction - that is chrome on mac 19:48:55 tony: jeff, you will close this 19:48:58 jeffH: yes. 19:49:04 tony: anything else? 19:49:08 calendar: https://www.w3.org/groups/wg/webauthn/calendar 19:49:46 rrsagent, draft minutes 19:49:46 I have made the request to generate https://www.w3.org/2021/04/07-webauthn-minutes.html wseltzer 19:49:57 rrsagent, make logs public 20:09:53 rrsagent, bye 20:09:53 I see no action items