18:51:19 RRSAgent has joined #webauthn 18:51:19 logging to https://www.w3.org/2022/06/01-webauthn-irc 18:51:21 RRSAgent, make logs Public 18:51:22 Meeting: Web Authentication WG 18:55:24 jfontana has joined #webauthn 19:05:30 nina has joined #webauthn 19:06:52 jfontana has changed the topic to: 01 06 2022 19:07:15 rrsagent, make logs public 19:08:00 elundberg has joined #webauthn 19:10:43 present+ 19:11:30 zakim, meeting: Web Authentication WG 19:11:30 I don't understand 'meeting: Web Authentication WG', jfontana 19:11:43 present+ agl, ay, davidturner, davidwaite, nina, nadalin, johnbradley, jfontana, timcappalli, johnpascoe, nsteele, wseltzer 19:12:10 zakim, Meeting: Web Authentication WG 19:12:10 I don't understand 'Meeting: Web Authentication WG', jfontana 19:12:59 tony: putting off the licensing decision 19:13:03 ...don't know the issues. 19:13:10 wendy: ready to take that off the agenda 19:13:32 agl: caBLE is now called Hybrid 19:14:01 davidT: FIDO did not like this name 19:14:40 jbradley: we need to nail it down for the transport hint 19:15:13 ...soem question if caBLE is a release thing or not 19:15:43 ...are hints going to hang around 19:16:00 agl: I would like FIDO marketing group to choose things fairly quickly. 19:16:19 TimC: they know this is not a outward facing thing 19:16:31 davidT: need something to describe it. 19:16:55 agl: caBLE is the cross flow 19:19:06 wendy: should share vaccination status before you go on site at Microsoft 19:19:32 jbradely: i think you need to do it the day before. 19:20:41 s/share/provide hosts with/ 19:20:45 tony: pull requests 19:20:57 https://github.com/w3c/webauthn/pull/1703 19:21:14 present+ akshay 19:21:15 agl: is matt around? missing 19:21:25 tony: need to look at this. 19:21:40 agl: looks like a future thing 19:21:45 https://github.com/w3c/webauthn/pull/1695 19:22:13 TimC: I thought it was done. need some sign-offs 19:22:44 https://github.com/w3c/webauthn/pull/1663 19:23:03 agl: there are changes. look at commits, attestation controls, signatures, etc. 19:23:14 ...we might have a second sig. 19:23:57 jbradley: will there be different UI 19:24:42 agl: quite possibily, but the design is not done yet. Attestation controls will be with enterprise 19:25:06 jbradley: doesn authenticator need to dig around or get something from RP? 19:25:37 agl: authenticator gets attestation field. in reg. there is a flag, with assertions it does not now. 19:26:28 ago: browser can always set the value. 19:26:42 ...the authenticator would figure it out from there. 19:26:54 jbradley: need some sort of filter. 19:27:23 agl: no. the authenticator still has to use to same rules 19:27:36 ...it has to look at existing signal 19:27:40 ..like CTAP 2' 19:27:49 jbradley: or it only works on mode1 19:27:56 ...mode 1 19:28:33 agl: think CTAP tweak is needed for assertions. 19:28:53 https://github.com/w3c/webauthn/pull/1576 19:28:59 nina: 19:29:12 ...akshay can you look at this? 19:29:38 Akshay: it is waiting on me and JBradley. 19:30:00 jbradley: I will look at it next week. 19:30:18 tony: akshay willl you be on? 19:30:25 Aksahy: yes, where I left off 19:31:10 https://github.com/w3c/webauthn/pull/1736 19:32:02 agl: looks good to me. 19:32:14 ...should land next week 19:32:19 https://github.com/w3c/webauthn/pull/1737 19:32:46 nSteele: we talked about this. this takes out mention of some pass throughs 19:32:58 tonuy: you will take this one. 19:33:46 https://github.com/w3c/webauthn/pull/1733 19:34:00 tony: go back to emil, his is on the line 19:34:24 elundberg: this is nothing to correct #1736 19:34:45 elundburg: who reviews now that jeff is gone 19:34:56 agl: I have approved it. 19:35:04 tony: matt needs to approve 19:35:32 https://github.com/w3c/webauthn/pull/1733 19:35:39 elundberg: need to add reviewers 19:36:12 akshay: I will look 19:36:29 https://github.com/w3c/webauthn/pull/1732 19:36:46 agl: this is revert to some commits for PR extension 19:37:01 tony: will we see the same issues 19:37:30 akshay: the arguments are lessened now 19:37:43 wendy: mozilla is back in the group 19:37:50 tony: target this at Mozilla 19:38:54 https://github.com/w3c/webauthn/pull/1718 19:39:24 agl: not sure this PR is headed to inclusion 19:39:29 elundberg: I agree 19:39:58 elundberg: I will look at it. 19:40:06 tony: I will leave as un-triaged 19:42:17 https://github.com/w3c/webauthn/pull/1730 19:42:38 elundberg: PR open 19:42:48 tony: you feel this will break 19:43:17 agl: removing generic processing - it is a non-breaking change. 19:43:58 https://github.com/w3c/webauthn/pull/1713 19:44:20 eluncberg: wanted to focus on transports 19:44:33 ...not more to say here. 19:45:17 akshay: close 19:45:59 https://github.com/w3c/webauthn/pull/1711 19:46:27 elunberg: I intend to talk this on some time. 19:46:47 ...this is worth doing 19:47:07 ...get in #1063 and #1064 19:47:11 https://github.com/w3c/webauthn/pull/1710 19:47:23 elundberg: will do that one as well 19:48:52 https://github.com/w3c/webauthn/pull/1708 19:49:17 agl: we don't have a way to talk about this 19:49:33 ...it is part of Passkey 19:49:40 TimC: this will come for Passkey site 19:50:08 https://github.com/w3c/webauthn/pull/1681 19:50:17 tony: this may go back to payments. 19:50:34 ...assume this will get fixed when needed. 19:50:45 agl: not sure the name is pertinent 19:52:02 tony: any issues we want to talk about? 19:52:09 ...before the face to face. 19:53:11 agl: deprecation of U2F API in Chrome is expiring at end of July, speak to us very, very soon. 19:53:41 ...we like some change to Chrome are coming, we will send out notice ahead of time , but where. 19:53:56 TimC: the Community Adoption WG 19:54:02 ..do it via Slack 19:54:09 ... we can share a slide 19:54:24 s/a slide/from the email list/ 19:55:13 chair: Nadalin, Fontana 19:55:19 rrsagent, draft minutes 19:55:19 I have made the request to generate https://www.w3.org/2022/06/01-webauthn-minutes.html wseltzer 20:59:31 kaiju has joined #webauthn