18:52:34 RRSAgent has joined #vcwg 18:52:38 logging to https://www.w3.org/2023/10/25-vcwg-irc 18:53:22 brent has changed the topic to: Meeting Agenda 2023-10-25: https://www.google.com/url?q=https://www.w3.org/events/meetings/36ecd2da-2ec3-4012-b74a-72546ab352f4/20231025T150000 18:53:35 brent has changed the topic to: Meeting Agenda 2023-10-25: https://www.w3.org/events/meetings/36ecd2da-2ec3-4012-b74a-72546ab352f4/20231025T150000 18:53:48 zakim, start the meeting 18:53:48 RRSAgent, make logs Public 18:53:50 please title this meeting ("meeting: ..."), brent 18:54:14 meeting: Verifiable Credentials Working Group Weekly Teleconference 18:54:21 chair: Brent Zundel 18:54:33 agenda: https://www.w3.org/events/meetings/36ecd2da-2ec3-4012-b74a-72546ab352f4/20231025T150000 18:59:04 pauld_gs1 has joined #vcwg 18:59:09 present+ 19:01:24 present+ 19:01:33 present+ shigeya 19:01:47 present+ manu 19:02:04 dmitriz has joined #vcwg 19:02:07 present+ 19:02:19 present+ bigbluehat 19:02:33 JoeAndrieu_ has joined #vcwg 19:03:23 present+ JoeAndrieu_ 19:03:25 selfissued has joined #vcwg 19:03:28 present+ 19:03:38 andres has joined #vcwg 19:03:48 present+ 19:04:05 scribe+ 19:04:28 brent: welcome everyone 19:04:28 TallTed has joined #vcwg 19:04:40 brent: our agenda is straightforward - wwe'll have a brief section on work item status updates 19:04:48 ... review pertinent PRs, then move into discussion of issues 19:04:54 ... primary issue being 1307 19:05:05 ... after that, will move to other 'Before CR' issues we need to address 19:05:14 ... anyone who would like changes to the agenda? 19:05:42 present+ 19:05:58 Topic: Work Item status updates/PRs 19:06:04 q+ 19:06:20 brent: Looking for brief status updates for each work item 19:06:25 ack manu 19:06:26 ... Manu, you're first up 19:06:31 https://github.com/w3c/vc-data-model/pulls 19:06:32 manu: I'll run through these really quickkly. 19:06:46 ... this is VC Data Model. there are 6 PRs that are newly opened over the last week 19:07:08 ... one of them is on adding a def'n for well-formedness. One is on suggesting the use of oblivious HTTP, one about adding a section on key management 19:07:30 present+ 19:07:31 ... other is Trust Boundaries & Considerations, another on JWTs [something], and the last is about explanation of use of graphs in VC DM 19:07:59 ... I'll also note that previous PRs marked 'Pending Close' have expired, so, we should close them (Brent) 19:08:20 brent: 2 of the Pending Closes are PRs waiting on companion PRs. and 2 have expired, will close 19:08:27 manu: got it 19:08:33 Orie has joined #vcwg 19:08:36 present+ 19:08:37 https://github.com/w3c/vc-data-integrity/pulls 19:08:38 ... moving on to Data Integrity 19:08:52 ... here are the DI PRs, one is a 'During CR', other is the 'At Risk' marker for Controller Doc 19:09:03 ... which we discussed yesterday. it's in PR Ready draft, will be merged in 2 days 19:09:15 ... there are no active open PRs for ECDSA suite, also none for EDDSA 19:09:21 ... all the issues are Post-CR 19:09:29 https://github.com/w3c/vc-bitstring-status-list/pulls 19:09:38 ... moving on to Status List. No open PRs for this, I've done the rename for the spec 19:09:46 ... and I think we picked the wrong name :) 19:10:02 ... don't want to bikeshed today, but a bunch of different status methods use bitstrings 19:10:19 ... we should pickk something else like 'Herd Privacy Status List' or similar (not for discuss today) 19:10:32 ... we might want to call out what this Status List is going to do 19:10:34 https://github.com/w3c/vc-bitstring-status-list/issues?q=is%3Aissue+is%3Aopen+label%3Abefore-CR 19:10:43 ... there's a number (30) of Before CR issues that need to be processed 19:10:53 ... and 8 of those are ready for PR, so expect updates & changes there over the coming weeks 19:11:00 ... that's it for me 19:11:04 q? 19:11:12 q+ 19:11:16 ack selfissued 19:11:29 selfissued: I can talk to the VC JOSE/COSE 19:11:33 present+ 19:11:40 ... there is one editorial PR by TallTed, 19:11:48 ... two editors believe it's ready to merge (strictly typo corrections) 19:11:56 ... there are only 2 Before CR issues remaining 19:12:06 ... one requires some language cleanup about using registered JWT claims in JOSE header 19:12:22 ... the other is about Controller Documents, which we'll have discussion about 19:12:27 ... so those are the two main things for CR 19:12:42 brent: we're ready to move forward to next topic 19:12:46 Topic: Issue Discussion 19:12:58 subtopic: https://github.com/w3c/vc-data-model/issues/1307 19:13:03 ... We'll begin with the continuation of the topic of our special topic call, which was Controller Doc 19:13:11 ... there were a number of proposals that were brought before the group 19:13:19 ... 3 of them were resolved 19:13:29 ... check email / notes 19:13:52 ... there are 4 more proposals that have been brought up, 3 of them concerning the same thing, and one I'm very confident won't pass even after long convo 19:13:59 ... the focus will be around Key Discovery 19:14:19 ... specifically, discovery using '.well-known/' 19:14:19 ... one of the proposals says 'Shared doc will NOT use key discovery' 19:14:29 ... the other one says, maybe we should do key discovery using .well-known 19:14:37 q+ 19:14:47 ... would it be amenable to the group for the primary doc to do .well-known as primary mechanism 19:14:49 q+ to say that we might get more support for things if we can agree that the controller document has multiple options for any other spec to reference, even if those specs profile those things down 19:14:54 ... if there's consensus, we'll run a proposal 19:14:54 q+ 19:14:57 ack selfissued 19:15:12 selfissued: it makes sense to include that, it's a standards based key representation used in practice 19:15:19 scribe+ 19:15:19 ... so it makes sense to make it available to both securing specs. 19:15:23 ack dlongley 19:15:23 dlongley, you wanted to say that we might get more support for things if we can agree that the controller document has multiple options for any other spec to reference, even if 19:15:27 ... those specs profile those things down 19:15:34 dlongley: so, thinkking about our call yesterday and the resolutions, 19:15:43 ... and was thinking forward to how some securing specs might want to profile down 19:15:57 ... as we agreed in the last resolution, and other specs might want to keep those options open 19:16:06 ... given that, it only makes sense for the shared doc to provide multiple options 19:16:21 ... I think that's were some of us were thinkking when we were talking about things in common. 19:16:43 ... we might get more consensus on things like .well-known, if we agree that shared doc has things in it that may or may not be referenced by secured implementations 19:17:02 ... if we're ONLY going to put things into the shared doc that current specs reference, that'll show preference for options where it's not needed 19:17:09 Seems like showing preference for things that both specs use, would be good for implementers. 19:17:18 ... I'm concerned we'll end up making different decisions on that basis, stripping down the shared document 19:17:25 ... as a result, we might need to have multiple shared documents 19:17:28 ^ not when that preference doesn't exist, Orie. 19:17:48 ... might be better for us that the shared doc has things that securing specs MAY reference 19:18:19 ... that way, we can more likely get to a consensus on something like .well-known (given concerns of preference) 19:18:27 To say that the Data Integrity specs "prefer JWK" is not correct, it's provided as an option. 19:18:32 brent: just to repeat, we have one suggestion from Mike that .well-known be included 19:18:53 ... Dave is suggesting additionally that the core Controller Doc spec be inclusive of not just .well-known but other securing mechanisms / discovery mechanisms 19:19:06 ... so that specs like VC J/C and DI can choose among the options there as a profile 19:19:11 dlongley: yes, that's great 19:19:24 ... if we do that generally, across all of our options, we'll have a much easier time to come to consensus 19:19:32 ack dmitriz 19:19:32 q+ 19:20:00 tzviya has joined #vcwg 19:20:06 Kristina has joined #vcwg 19:20:26 q+ to oppose .well-known in the shared document as it relies on a centralized namespace 19:20:27 dmitriz: As a data point, about the .well-known mechanism, based on some recent VC implementations, there are a number of institutions like universities that are not allowed to create folders with dots in them. There are education institutions that can't put their keys in .well-known due to their web control panels and whatnot. It's useful, but not everyone can use it. 19:20:28 present+ 19:20:31 ack selfissued 19:20:35 selfissued: two responses 19:20:54 .. first to Dmitri - I certainly believe you, but if they can't use .well-known, they can't produce OAuth metadata, just a bunch of things they can't do 19:21:09 ... I feel for the people in those environments, but that may be not our problem to solve 19:21:14 ... I appreciate Dave's thoughtful remarks 19:21:29 ... my intent is to only have things in the shared controller doc that will be used for /both/ securing specs 19:21:31 Good thing did:web allows you to but controller documents at arbitrary locations... 19:21:44 q+ to agree with selfissued (gasp) 19:21:49 ... if it lets us move forward, I'd hold my nose and accept some things that were not used by both, as long as the securing specs could profile it to say 'don't use this part' 19:21:50 ack JoeAndrieu_ 19:21:50 JoeAndrieu_, you wanted to oppose .well-known in the shared document as it relies on a centralized namespace 19:21:58 +1 to Mike, document everything in the shared spec and then profile down, that can get us to consensus 19:22:06 JoeAndrieu_ I'm not a fan of .well-known because it's anchored in a centralized resource/url 19:22:32 ... and I don't think that it applies to all our situations. I don't see VCs as a subset of the modern web, I see them as larger 19:22:52 brent: just to clarify, are you opposed to .well-known included at all, or to it being the /only/ mechanism 19:23:00 JoeAndrieu_: at all 19:23:06 ack manu 19:23:06 manu, you wanted to agree with selfissued (gasp) 19:23:12 i can hold my nose if everything (key formats, etc.) is in the shared doc and secured specs can profile down. 19:23:22 s/secured/securing/ 19:23:33 manu: I wanted to agree with what Dave was saying, and what Mike Jones just said. it would be fine to include a number of things in the controller doc, put them in a single document 19:23:42 +1 to Manu 19:23:47 ... and when you go to profile, you can say 'Do not use X or Y, we don't want you doing that' -- that's perfectly fine 19:24:04 ... we'd provide all the options in the controller doc spec, and then securing specs will profile them 19:24:19 ... that feels like a good compromise, people who don't want to use features can call them out 19:24:22 This is what SD-JWT VC spec does. It mentions multiple mechanisms: .well-known, DID, x.509, etc. https://datatracker.ietf.org/doc/html/draft-ietf-oauth-sd-jwt-vc-01#name-obtaining-public-key-for-is . 19:24:22 +1 to a resolution that says we provide all the "controller-document-related options" in the shared controller doc spec and then each securing spec profiles that down to what they accept. 19:24:30 +1 Manu, although i still hope we can limit the controller document options to "good ones", if we can't agree on what good is, its ok to just split the difference. 19:24:37 And I think we should do the same here 19:24:43 ... so, +1 to that. What that would mean is that we'd include 'publicKeyJWK', 'publicKeyMultibase', we'd include .well-known discovery mechanism 19:24:49 ... we'd include multiple algos in there 19:25:08 ... which means that the entirety of the contents of the DI spec could be lifted & placed into the new spec (minus DI-specific language) 19:25:24 ... and we can add everything related in the JOSE/COSE spec. and add the language "Do not use X feature" etc. 19:25:28 +1 to Manu, very supportive of that approach -- and its sounds like others in IRC would support as well. 19:25:29 ... so, +1 to that if it helps us move forward 19:25:52 ... I also don't like .well-known, but I'd hold my nose to it being added to the shared spec 19:25:59 brent: I believe we have roughly a path forward 19:26:19 ... we had one person comment that an aspect would not be acceptable; everyone else seems to be willing to move forward with this (the profiling approach) 19:26:27 For a data point, for some usecases we will use .wll-known 19:26:30 ... so I think we're to the point of trying to craft proposal language 19:26:39 s/will-known/well-known 19:26:46 ... I'm happy to do that unless someone else wants to craft resolutions 19:28:30 brent: here is draft proposal, anyone opposed? (and if yes, how should we change it) 19:29:32 JoeAndrieu_ I have some concerns re temporality. the controller document 'will include', which seems in the future? 19:29:41 ... or is it possible for securing specs to adjust what goes into it? 19:29:53 ... so, causality needs clarifying 19:30:08 +1 to brent's interpretation 19:30:19 brent: my understanding is - both DI and Jose/cose would be written in the controller doc, as they're written today 19:30:20 ... and then they could be modified as profiles etc 19:30:28 sorry bad paste 19:30:52 PROPOSAL: The shared Controller Document specification will include all Controller Document features that are used by the securing specifications today, and each individual securing specification can profile the Controller Document spec down to make specific choices as desirable. 19:31:18 q+ 19:31:19 brent: does that help with causality, Joe? 19:31:23 JoeAndrieu_ yes 19:31:24 ack Kristina 19:31:56 q+ 19:32:01 ack manu 19:32:02 Kristina: it seems that this resolution does not apply to just key discovery, but other aspects as well. is the intent to just mix all the features from the securing specs? 19:32:19 manu: yes, my understanding as well. just to be crystal clear, 19:32:45 ... I'm looking at the VC DI controller doc section right now. it defines effectively what's found in DID Core, says you can use 'publicKeyJwk' and 'publicKeyMultibase', and the secretKey properties too 19:32:58 ... defines multibase bytes normatively 19:32:59 the vc data integrity controller document defines capability system and encryption related terminology, which is not used in vc data model today. 19:33:01 q+ 19:33:05 and VC-JOSE-COSE talks about .well-known (or would) and that would be put into the shared doc too. 19:33:09 ... I don't know what's in VC JOSE/COSE, maybe Orie and Mike could speak to it 19:33:16 ... I'm hearing the .well-known stuff would move in there 19:33:28 ... also believe that we have a 'Retrieve Verification Method' algorithm that'd move into the shared doc 19:33:40 ... that also has a set of processing errors (table) 19:33:51 ... things like, throwing an error about invalid controller doc, id, etc 19:33:52 +1 to Manu 19:33:55 ... the errors would move too 19:34:05 ack Orie 19:34:28 Orie: accurate. just in terms of current VC JOSE/COSE spec - it has already a profiled-down version, just needs to be able to refer to correct term definitions 19:35:01 ... current version in latest draft just expresses preference for common JOSE/COSE key representations. Does not contain elaboration on capabilityDelegation, capabilityInvocation or keyAgreement, as they're not used in VCs currently, to my kknowledge 19:35:20 ... so when we constructed it, we took the DI definition, removed 'proof', multibase, the delegation and key agreement keys 19:35:23 q? 19:35:27 Clear, thank you. 19:35:30 +1 for VC-JOSE-COSE to continue to profile down in the way Orie says. 19:35:36 brent: with that, we are ready to run the proposal 19:35:42 PROPOSAL: The shared Controller Document specification will include all Controller Document features that are used by the securing specifications today, and each individual securing specification can profile the Controller Document spec down to make specific choices as desirable. 19:35:49 +1 19:35:58 +1 19:36:00 +1 19:36:03 +1 19:36:03 +1 19:36:04 +1 19:36:06 +1 19:36:08 +1 19:36:10 +1 19:36:10 +1 19:36:13 +1 19:36:23 +1 19:36:38 RESOLVED: The shared Controller Document specification will include all Controller Document features that are used by the securing specifications today, and each individual securing specification can profile the Controller Document spec down to make specific choices as desirable. 19:36:42 q+ 19:37:00 brent: if II'm understanding correctly, this single proposal captures all of the stuff from the remaining resolutions & proposals from yesterday 19:37:01 +1 to Brent, this captures the rest in one way or another. 19:37:04 ... I think we can move to other issues 19:37:05 ack manu 19:37:05 q+ 19:37:11 manu: agreed 19:39:10 ack selfissued 19:39:28 selfissued: question to chairs (I'm open to many different answers) -- is it time to request volunteers to workk on this new shared doc? 19:39:29 q+ 19:39:38 brent: If there are folks on the call who want to volunteer, I'd love to hear it 19:39:43 selfissued: I'll volunteer 19:39:44 ack manu 19:39:48 manu: I'll volunteer 19:40:15 https://github.com/w3c/vc-data-model/issues?q=is%3Aopen+is%3Aissue+label%3Abefore-CR+sort%3Aupdated-asc+-label%3A%22pr+exists%22+-label%3A%22ready+for+PR%22+ 19:40:19 brent: solid editorial team. others are also welcome to volunteer now, or reach out to chairs. 19:40:34 brent: the first issue we'll talk about is issue 1303 19:40:36 subtopic: https://github.com/w3c/vc-data-model/issues?q=is%3Aopen+is%3Aissue+label%3Abefore-CR+sort%3Aupdated-asc+-label%3A%22pr+exists%22+-label%3A%22ready+for+PR%22+ 19:40:53 subtopic: https://github.com/w3c/vc-data-model/issues/1303 19:41:06 brent: noting this is labeled as 'Before CR', but we don't have anyone assigned 19:41:14 ... 'Remove at-risk marker for Evidence' 19:41:25 ... where do we go with this? 19:41:27 q+ 19:41:32 ack Orie 19:41:46 Orie: the linked issue is about termsOfUse, which is one of the expiring pending close ones? 19:42:06 manu: it'll be merged on its current path 19:42:23 q+ 19:42:30 Orie: to recap, there is an open PR, looks like it'll get merged. so once we see something about Evidence, we'll remove at-risk marker 19:42:38 ack manu 19:43:04 manu: we should ask the EBSI folks to see if they volunteer? 19:43:23 brent: sounds like Dmitri is also volunteering, so, with permission, I'll assign it to you 19:43:47 brent: next issue, 1292 19:43:52 subtopic: https://github.com/w3c/vc-data-model/issues/1292 19:44:00 brent: Prefer Arrays and Objects 19:44:13 q+ 19:44:19 ... labeled as Before CR, no assignment. there's a bit of a conversation between folks. Orie - can you give us status? 19:44:23 ack Orie 19:44:45 Orie: as you all know, our conforming docs are compact JSON-LD docs. So, in lots of cases, the JSON is polymorphic -- either a string or an array object, etc 19:45:03 ... any of the predicates (schema, proof, subject, etc) can either be string, object, or array 19:45:19 ... reason for that is how RDF data model treats graph representation 19:45:29 ... unfortunately, this causes problems for strongly typed languages 19:45:54 ... these are very common bugs 19:46:07 ... I've run into them hundreds of time. Can we reduce this sort of thing? 19:46:12 q+ 19:46:19 brent: other thoughts? 19:46:31 ack dlongley 19:46:49 dlongley: brief comment - we had a number of issues where we said, to increase interop, we should do a few of these things, 19:46:55 ... without normatively requiring 19:47:06 ... so maybe non-normative advice would suffice, for interop? 19:47:14 q+ 19:47:22 dlongley maybe you can propose some normative SHOULD language? 19:47:30 ack manu 19:47:30 brent: suggestion before the group - can we address non-norm / post-CR, for future us to deal with? 19:47:33 Orie: normative "SHOULD" hasn't worked in other places... 19:47:54 manu: I'm a bit on the fence about this. might be good to go all the way to SHOULD, I'd be -1 for MUST 19:48:08 ... we could put SHOULD normative language for objects, for arrays for single values, etc. 19:48:30 ... the problem is (and we've tripped over this in the past), yhou don't want it so that systems that aren't written to be robust when you DON'T do it, fail 19:48:51 ... so, should we urge everyone to support polymorphism (like with accessor functions)? 19:48:59 ... it's dicey 19:49:15 ... one alternate approach is to go the other way, and enforce all those variations in our test suites 19:49:25 q+ 19:49:41 manu: I'm fine with either route - SHOULD, or non-normative advice 19:50:02 ack dmitriz 19:50:03 scribe+ 19:50:22 dmitriz: How do people about "always require arrays"? 19:50:29 I would be +1 to always requiring arrays, based on our implementation experience 19:50:33 -1 some software already doesn't do that... 19:50:36 I'd +1 19:50:36 ... we do that in other specs 19:50:42 I'd be -1 to that ... 'cause there will be people that don't want to do that and we can't make them. 19:50:44 @dlongley - what do you mean? 19:50:57 +0.5 19:50:57 -1 to new shape requirements... 19:51:00 +1 19:51:02 q+ 19:51:06 kristina has joined #vcwg 19:51:07 ack selfissued 19:51:12 I'm not sure what the implications are. 19:51:15 present+ kristina 19:51:19 q+ 19:51:20 selfissued: this seems odd. what would this possibly accomplish? 19:51:31 ... if stuff is naturally a singleton, it should be represented as such 19:51:32 Agree with selfissued 19:51:34 ack manu 19:51:36 +1 to Mike 19:51:47 q+ 19:51:51 q+ 19:52:20 ack Orie 19:52:22 @manu - amend the proposal to 'require arrays when it's NOT a functional item' (single-only) 19:52:39 Orie: it wouldn't be issuer (since you're not allowed multiple), but it would mean multiple subjects 19:52:42 q+ to say we don't express arity for properties. 19:52:51 ... so, if you're only allowed to have an object or a string, you'd still see singleton 19:53:21 ... remember, this compact JSON-LD doc is an instance of the RDF data model, so we get the array polymorphism from that 19:53:46 ack dmitriz 19:53:55 not sure if there's a "net improvement" here... we might improve in one direction and cause harm in another. 19:54:27 in the real world there are multiple issuers. 19:54:45 dmitriz: To respond to all 3... Mike - reason we're discussing is this is a cause for a bunch of bugs, singleton vs. array... Orie - disagree that we're inheriting polymorphism from RDF data models, we're inheriting it from the real world -- sometimes it's a singleton, sometimes it's an array. Manu - you have a point, but it's amenable - require arrays only when arrays are possible (single items only require singletons). 19:54:48 we are inheriting from using JSON-LD for conforming documents. 19:54:50 ack manu 19:54:50 manu, you wanted to say we don't express arity for properties. 19:55:13 manu: people are suggesting 'require arrays whenever arrays are possible'. we don't have expressions of arity except in spec 19:55:26 one place this is very likey to cause bugs is credentialSchema and credentialStatus 19:55:35 ... the vast majority of the vocabularies don't specify arity; people don't go through the trouble of doing that 19:55:51 ... we can say 'in OUR specification, we do specify the arity' for the fields defined in VC DM 19:55:52 zakim, close the queue 19:55:52 ok, brent, the speaker queue is closed 19:55:59 ... but that falls apart the moment you extend the core DM 19:56:03 ... so, this might be brittle 19:56:10 present- 19:56:20 ... I don't think we can require enforceable arity 19:56:31 push this to credentialSchema <-- 19:56:39 ... unless we require JSON Schemas for all VCs, this is non-enforcible 19:56:50 if you want it, use `credentialSchema`... that's one thing it's for, right? 19:56:56 ... we can provide non-norm guidance for people not to do it 19:57:08 s/enforcible/enforceable/ 19:57:19 brent: counter-proposal, if I understand, is 'Do nothing' 19:57:20 I am fine closing the issue. 19:57:29 ... turning mike over to Kristina 19:57:37 present+ pauld_gs1 19:57:48 Kristina: I am stepping down as a co-chair of this WG. after this call, I'll make a PR removing myself from readme 19:57:58 ... and close couple of PRs, will remove my rights, etc 19:58:17 Sorry to hear that you're stepping down, Kristina -- thank you for your service to the group! 19:58:19 ... if anyone has questions, feel free to reach out to me 19:58:19 ... thank you all, for the opportunity! 19:58:21 Thanks for all your help Kristina! enjoy the time back : ) 19:58:23 brent: thank you Kristina, it has absolutely been a pleasure 19:58:35 brent: thanks everyone, see you next week 19:58:54 zakim, who is here? 19:58:54 Present: brent, shigeya, manu, dmitriz, bigbluehat, JoeAndrieu_, selfissued, andres, dlongley, TallTed, Orie, dlehn, Kristina, pauld_gs1 19:58:57 On IRC I see tzviya, Orie, TallTed, andres, selfissued, JoeAndrieu_, dmitriz, pauld_gs1, RRSAgent, Zakim, brent, dlehn, Jem, cel[h], saysaywhat, Github, bumblefudge1, cel[m], npd, 19:58:57 ... w3c_modbot, MojGraph, ounfacdo, seabass, bumblefudge, shigeya, dlongley, manu, rbyers, hadleybeeman, bigbluehat, Dongwoo, cbiesinger, stenr, cel, csarven, rhiaro 19:59:25 present+ andres 19:59:31 zakim, end the meeting 19:59:31 As of this point the attendees have been pauld_gs, brent, shigeya, manu, dmitriz, bigbluehat, JoeAndrieu_, selfissued, andres, dlongley, TallTed, Orie, dlehn, Kristina, pauld_gs1 19:59:34 RRSAgent, please draft minutes 19:59:35 I have made the request to generate https://www.w3.org/2023/10/25-vcwg-minutes.html Zakim 19:59:43 I am happy to have been of service, brent; please remember to excuse RRSAgent. Goodbye 19:59:43 Zakim has left #vcwg 19:59:47 rrsagent, bye 19:59:47 I see no action items