19:34:56 RRSAgent has joined #webauthn 19:34:56 logging to https://www.w3.org/2022/02/23-webauthn-irc 19:34:59 RRSAgent, make logs Public 19:35:00 Meeting: Web Authentication WG 19:35:14 Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2022Feb/0051.html 19:35:23 wseltzer has changed the topic to: 23 Feb Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2022Feb/0051.html 19:57:51 jfontana has joined #webauthn 20:03:08 matthewmiller has joined #webauthn 20:04:10 tony: any update on a face to face meeting 20:04:23 ...for the WG 20:04:55 ...charter updates? 20:05:01 wendy: not yet. 20:05:56 tony: Tim any update on face to face 20:06:14 selfissue: he's trying to reserve space 20:07:09 selfissued has joined #webauthn 20:07:15 present+ 20:08:07 tony: 9am to 4 pm. Date would be June during RSA. 9th or 10th 20:08:31 selfissue: 9th is more likely to draw participants. 20:08:38 9-4 Thursday of RSA, June 9 20:09:59 https://github.com/w3c/webauthn/pull/1695 20:10:51 elundberg has joined #webauthn 20:10:54 present+ 20:11:01 tim: work in progress 20:11:03 https://github.com/w3c/webauthn/pull/1663 20:12:27 jfontana_ has joined #webauthn 20:13:45 https://github.com/w3c/webauthn/issues/1699 20:15:03 elundberg: seems like fair change to make, more clarity. I can do an editorial change 20:15:14 tony: do in this release? 20:15:44 jbradley: not sure proposal works. it may still accept U2F key, but the bits are not there 20:16:04 elundberg: more like to use preferred over required 20:17:17 shane: should remain in the policy of the RP 20:17:36 elundberg: maybe we should clarify here? 20:18:03 elundberg: need policy to drive decision 20:18:38 jbradley: not sure this is correct way to clarify 20:20:16 elundberg: I will update this one. 20:20:32 https://github.com/w3c/webauthn/issues/1696 20:22:41 tony: this relates to #1637 20:23:07 jeffH: leave this one open. 20:23:16 https://github.com/w3c/webauthn/issues/1694 20:23:37 selfissue: IANA registry. I can do that. 20:24:39 https://github.com/w3c/webauthn/issues/1688 20:25:09 shane: I'd still like this option, but don't think platform vendors will support 20:25:22 agl: it wouldn't be high priority 20:28:31 shane: can't filter to improve experience 20:30:04 agl: this PR is plausible 20:30:17 this issue, not PR 20:32:43 jbradley: behind a policy this won't be a big seller 20:33:12 ...having a hard time with this, we can keep it around 20:33:21 ...is customization possible 20:33:46 ...see challenges platform authenticator may not have an AAGUID 20:34:50 elundberg: can this be put behind flags 20:35:26 ...we could use an enterprise authenticator flag 20:36:59 agl: don't want flag to make this look like it is more secure 20:37:26 present+ agl, andrebuttner, dveditz, davidturner, davidwaite, jpascoe, elundberg, jfontana, jeffh, johnbradley, kenbuchanan, nadalin, matthewmiller, mikejones, sbweeden, timcappalli, wseltzer 20:43:49 As recorded in https://github.com/w3c/webauthn/issues/1694, I have submitted the registration request to IANA. 20:45:45 shane: I think it is an active discussion and we need technical folks to catch up 20:46:08 ...we close this issue, a similar one will come back 20:50:10 tony: anything happening with caBLE 20:50:17 agl: cable is on FIDO 2 20:50:30 dveditz has joined #webauthn 20:50:41 present+ 20:50:46 agl: this is still possible 20:51:38 jbradley: two new untriaged 20:55:16 https://github.com/w3c/webauthn/issues/1701 21:05:03 chairs: Nadalin, Fontana 21:05:06 rrsagent, draft minutes 21:05:06 I have made the request to generate https://www.w3.org/2022/02/23-webauthn-minutes.html wseltzer 21:05:11 rrsagent, make logs public