15:00:57 RRSAgent has joined #lws 15:01:01 logging to https://www.w3.org/2026/02/16-lws-irc 15:01:01 RRSAgent, make logs Public 15:01:02 please title this meeting ("meeting: ..."), laurens 15:01:16 present+ 15:01:16 meeting: LWS WG Meeting - February 16th, 2026 15:01:19 present+ 15:01:33 AZ has joined #lws 15:01:36 agenda: https://www.w3.org/events/meetings/a19ab7dc-1753-433d-bac5-64e3ad8c0a43/20260216T100000/ 15:01:38 clear agenda 15:01:38 agenda+ Introductions & Announcements 15:01:38 agenda+ Issue Triage 15:01:38 agenda+ -> Agent Identification #57 https://github.com/w3c/lws-protocol/issues/57 15:01:38 agenda+ -> LWS Container Media Type #61 https://github.com/w3c/lws-protocol/issues/61 15:01:41 agenda+ -> Terminology: Resource Manager / Resource Controller / ... #27 https://github.com/w3c/lws-protocol/issues/27 15:01:49 present+ 15:02:03 present+ 15:02:07 chair: laurens 15:02:14 Luke has joined #lws 15:03:59 gibsonf1 has joined #lws 15:04:16 present+ 15:04:36 scribenick: acoburn 15:04:36 present+ 15:05:05 zakim, open agendum 1 15:05:05 agendum 1 -- Introductions & Announcements -- taken up [from agendabot] 15:05:41 present+ 15:06:12 laurens: seeing no announcements, moving along 15:06:12 present+ 15:06:17 zakim, open agendum 2 15:06:17 agendum 2 -- Issue Triage -- taken up [from agendabot] 15:06:20 RazaN has joined #lws 15:06:55 laurens: sharing screen from https://github.com/w3c/lws-protocol/issues 15:07:21 ... eBremer, as I understand, will create a PR to address #24 15:07:22 https://github.com/w3c/lws-protocol/issues/24 -> Issue 24 Reasons for separate rest bindings (by jeswr) [ready-for-pr] 15:07:43 ... eBremer assigned to the issue and marked as "ready for pr" 15:07:55 ... no new issues in the last week 15:08:20 zakim, open agendum 3 15:08:20 agendum 3 -- -> Agent Identification #57 https://github.com/w3c/lws-protocol/issues/57 -- taken up [from agendabot] 15:09:06 laurens: opened by uvdsl about use of CID documents in the current LWS protocol 15:09:13 ... room for collaboration with Solid CG 15:09:30 ... some consensus about how to bring WebID-based AuthN in line with current proposal 15:09:42 ... might also warrant further discussion 15:09:48 Present+ 15:10:12 uvdsl: the issue is a bit broader than just discussion CID and how to make it work with WebID 15:10:39 ... as proposed in the comments, concern about the requirement to use a URI for an agent identifier 15:11:16 laurens: there are two parts: (1) identity requirements, as currently formulated and (2) compatability problem with WebIDs 15:11:38 ... what are the reservations about agents being identified as URIs? 15:12:05 uvdsl: mostly concerned about dereferencing of URIs 15:12:19 ... worried about interop aspects 15:12:27 q+ to talk about dids 15:12:47 ack acoburn 15:12:47 acoburn, you wanted to talk about dids 15:13:14 acoburn: The minimum requirements for agent identification indeed involves URIs, not necessarily even HTTP URIs 15:13:36 ... we want both compatibility with what was used in Solid, but also provide interop with DID. 15:13:49 ... If we constrained to HTTP URIs that would explicitly exclude DID. 15:13:54 q+ to say that the proposal in the Issue says: Not limiting generality, HTTP(S)/REST is the baseline implementation requirement. 15:13:59 ... Now we do allow both forms. 15:14:20 ... An authentication suite can provide any kind of constraints on top of this. 15:14:37 ... Note that there is both the identification of the agent as well as the identification of the suite. 15:15:52 ... If you were to send a token (e.g. a JWT derived using a WebID based authn method), then the AS, which indicated support for the suite, can validate the identification of the agent being e.g. HTTPS. 15:15:55 scribe- 15:16:00 ack uvdsl 15:16:00 uvdsl, you wanted to say that the proposal in the Issue says: Not limiting generality, HTTP(S)/REST is the baseline implementation requirement. 15:16:21 uvdsl: I did not comment on the PR for the AuthN proposal 15:16:22 Beau has joined #lws 15:16:43 ... the general approach is fine, and I agree for the general perspective to have a discovery part 15:17:05 ... not arguing against that in particular. Worried about incompatible, non-interoperable systems 15:17:37 ... worried about the interoperability of the spec, would like to have a minimum baseline, such as HTTP CIDs 15:17:38 +1 on minimum baseline http cids 15:17:50 +1 uvdsl 15:18:16 https://github.com/w3c/lws-protocol/issues/57 -> Issue 57 Agent Identification (by uvdsl) [needs-discussion] 15:18:18 laurens: to resolve this, would a minimum HTTPS authN suite resolve this? 15:18:24 +q 15:18:29 ack uvdsl 15:19:03 uvdsl: two parts: one is to have an HTTP-based CID authentication suite as a minimum baseline 15:19:15 q+ to talk about federations/non-open ecosystems 15:19:29 ack acoburn 15:19:29 acoburn, you wanted to talk about federations/non-open ecosystems 15:19:33 scribe+ 15:19:50 acoburn: I wanted to mention that in an open ecosystem this is fine. 15:20:03 ... There will be many ecosystems that don't exist in an open ecosystem. 15:20:27 ... Those implementations may choose not to support an HTTPS baseline. 15:20:41 q+ to ask why the spec should be catering towards silos? 15:20:44 scribe- 15:20:45 q+ 15:20:50 ack uvdsl 15:20:50 uvdsl, you wanted to ask why the spec should be catering towards silos? 15:21:14 uvdsl: why do we consider closed ecosystems that create silos as a first class audience? 15:21:27 scribe+ 15:21:36 acoburn: One of the things we want is broad adoption. 15:21:44 ... This includes various types of architectures. 15:21:57 ... One of these architectures is an open ecosystem & distributed model. 15:22:14 q+ to confim whether the chairs deem adoption more important than interoperability? 15:22:20 ... Another widely supported architecture is a federation. 15:22:32 ... Federation requires a different kind of model. 15:22:41 ... We don't want to choose one over another. 15:22:48 q? 15:23:00 ... We're not trying to say everything must follow a single model. 15:23:14 scribe- 15:23:18 ack gibsonf 15:23:48 gibsonf: on open vs closed, if you're closed, you can do whatever you want 15:23:58 q+ to talk about regulated industries 15:23:59 q+ 15:24:22 +1 to gibsonf1 15:24:27 ack uvdsl 15:24:27 uvdsl, you wanted to confim whether the chairs deem adoption more important than interoperability? 15:24:28 ... if it's not open, I wouldn't call that LWS 15:24:54 uvdsl: I want to confirm that adoption is more important than interop? 15:25:00 laurens: I think both are important 15:25:20 ... federated ecosystems require just as much interop as open ecosystems 15:25:47 ack acoburn 15:25:47 acoburn, you wanted to talk about regulated industries 15:25:49 ... federated ecosystems should not be precluded from our work here 15:25:53 scribe+ 15:26:33 acoburn: I want to bring up areas Inrupt has experience in for highly regulated industries which require very strict controls over who can and cannot login and what the trust chain is. 15:26:51 ... Limiting access is vital here. 15:27:00 q+ 15:27:10 ... Requiring all LWS implementations support an open ecosystem is not going to happen 15:27:13 scribe- 15:27:18 ack pchampin 15:27:25 pchampin: we should not frame the discussion as open vs. closed 15:27:31 q+ to contradict the notion that a technical requirement such as supporting http-based authentication has implications on the governance-level on restricting trusted issuers 15:27:33 ... federated systems are somewhere in between 15:27:53 ... as for adoption is more important than interop -- this is not black and white 15:28:12 ... having non-open systems use open technologies is beneficial 15:28:36 q? 15:28:38 ... I supported uvdsl's original point, but am convinced by laurens' and acoburn's points 15:29:06 ... I would be in favor of defining a compliance level or profile where certain baseline requirements are present 15:29:24 q+ to talk about the existing authn discovery mechanism 15:29:46 ack gibsonf 15:29:49 laurens: describing a conformance class seems like a good idea, as long as it's not a requriement for the baseline spec 15:30:00 gibsonf: by federated, is this on the internet? 15:30:09 laurens: yes, on the internet/web 15:30:23 gibsonf: this can be constrained any way you like, though 15:31:51 ... if you use a different authentication method but no one uses it, it would pass the test 15:32:24 laurens: we have tried allow/deny lists, it is detrimental to interop 15:32:33 ... introduces greater complexity 15:32:56 ... not opposed to a baseline profile 15:33:02 q? 15:33:05 ack uvdsl 15:33:05 uvdsl, you wanted to contradict the notion that a technical requirement such as supporting http-based authentication has implications on the governance-level on restricting trusted 15:33:08 ... issuers 15:33:31 uvdsl: I don't think gibsonf is suggesting that everything can be solved by http 15:33:48 ... there is a difference between technical interop and governance 15:34:38 laurens: schemes that restrict trusted issuers do work 15:35:00 uvdsl: we have a federation for research institutions 15:35:07 ... in Germany 15:35:16 q? 15:35:20 ack acoburn 15:35:20 acoburn, you wanted to talk about the existing authn discovery mechanism 15:35:21 scribe+ 15:35:31 acoburn: A couple of things were mentioned here 15:35:57 ... gibsonf brought up that the authorization server should claim to support a authn scheme which it does not fully support. 15:36:12 That is not what gibsonf1 said. He said that it does support it, but the governance prevents any agent to authenticate it. 15:36:32 ... We have a resource server that stores the LWS resources which points to the authz server which has references to supported mechanisms in its discovery. 15:36:54 ... We want to determine which mechanisms must be present in the discovery of the authorization server. 15:37:12 ... If you claim to support something you should actually do that properly. 15:37:26 ... Different organizations have different needs. 15:38:14 ... Let's imagine you have an authentication suite "Open Ecosystem WebID", in that case the authz server advertises support. 15:38:21 q+ to clarify that I propose a baseline that MUST be supported. I did not propose a mechansim to advertise what is supported. 15:38:22 ... All of the components are already there. 15:38:45 scribe- 15:38:48 ack uvdsl 15:38:48 uvdsl, you wanted to clarify that I propose a baseline that MUST be supported. I did not propose a mechansim to advertise what is supported. 15:39:20 uvdsl: would like to clarify that my proposal is not a mechanism to discover the authentication scheme a server supports 15:39:43 ... I would like a baseline for what servers must support 15:40:06 ... the argument that certain federations don't want to use that baseline isn't a sufficient argument, IMO 15:40:50 laurens: there are two ways we can approach this: 1. work with a conformance profile 15:41:08 ... 2. requiring a MUST have for all servers based on HTTP is something I would oppose 15:41:22 ... would be in favor of introducing as a profile 15:41:40 q+ 15:41:47 ack Luke 15:41:52 acoburn: inrupt would also oppose a required baseline 15:41:59 q+ 15:42:05 Luke: IBM/Redhat would also oppose a required baseline 15:42:05 ack gibsonf 15:42:37 gibsonf: the dangerous part is that, if nothing is required, then it's just wild-west, that would not encourage adoption 15:42:52 ... it makes a mess of things 15:44:07 laurens: what is the difference between that approach and introducing a profile? 15:44:11 q+ 15:44:20 gibsonf: if it's optional, then it will only work in some places 15:44:31 q+ to support the creation of the HTTP-based CID (e.g. via then OIDC). I believe that we should provide at least one tangible example that can directly be implemented. 15:44:32 q+ to talk (again) about regulated industries 15:44:43 ach pchampin 15:44:54 ack pchampin 15:45:04 pchampin: to +1 what laurens suggested, we must be clear about the scope of a profile 15:45:23 ... if we define profiles, then we need to define the scope of the profile 15:45:46 ack uvdsl 15:45:46 uvdsl, you wanted to support the creation of the HTTP-based CID (e.g. via then OIDC). I believe that we should provide at least one tangible example that can directly be 15:45:49 ... implemented. 15:45:51 ... that should be a strong signal for what profile should be used on the open web 15:46:15 uvdsl: we would still prefer an HTTP baseline mandated, we acknowledge that others oppose this 15:46:45 ... In that case, I would create a tangible example that can be implemented, I do not want a hollow spec 15:47:09 ... I would like a guideline for one authentication spec 15:47:21 uvdsl "implementability" is a requirement to move to Recommendation, per the W3C process :) no "hollow spec" allowed 15:47:29 laurens: we seem to be converging on a profile 15:47:32 ack acoburn 15:47:32 acoburn, you wanted to talk (again) about regulated industries 15:47:37 scribe+ 15:47:47 pchampin, yes! thank you :) 15:48:02 acoburn: For regulated industries you cannot assume any authentication scheme is going to be accepted. 15:48:22 ... Choosing your own health application or banking app is going to be different from a chat application. 15:48:37 I 15:48:48 scribe- 15:49:37 laurens: for resolution of issue #57, we can draft an authentication suite that is HTTP based. Do we have any volunteers? 15:49:37 https://github.com/w3c/lws-protocol/issues/57 -> Issue 57 Agent Identification (by uvdsl) [needs-discussion] 15:49:45 q+ 15:49:50 ack uvdsl 15:49:57 uvdsl: I would be willing to co-edit this 15:50:09 https://github.com/w3c/lws-protocol/issues/57 -> Issue 57 Agent Identification (by uvdsl) [needs-discussion] 15:50:26 laurens: if you can do a first draft and then bring it back to the WG 15:50:51 uvdsl: do you have an indication of timeline? FPWD/CR/etc 15:51:05 laurens: one of the agenda points is about FPWD 15:51:17 ... ideally this would be end of March 15:51:28 ... would that timing work for you, uvdsl? 15:51:45 uvdsl: that timeframe may work, we will see 15:52:19 laurens: issue #61 is about the LWS media type 15:52:19 https://github.com/w3c/lws-protocol/issues/61 -> Issue 61 LWS Container Media Type (by acoburn) [needs-discussion] 15:52:47 ... we want to determine the media type used for containers and storage description metadata documents 15:53:10 ... we got some feedback from the JSON-LD community that application/lws+json media type makes the most sense 15:53:32 ... would like to hear if there is any opposition to using that media type 15:53:43 q? 15:53:48 +1 supportive of that media type 15:53:55 q+ 15:53:56 q+ also fallback? 15:54:01 ack uvdsl 15:54:15 uvdsl: is this defining a new media type? 15:54:21 q+ to ask also about the fallback 15:54:29 laurens: this would not define a new media type with IANA 15:54:48 uvdsl: how would this work if a client asks for JSON? 15:55:12 laurens: there is some wording from the Activity Streams spec to also return JSON 15:55:20 ack fallback? 15:55:22 ack bendm 15:55:22 bendm, you wanted to ask also about the fallback 15:55:39 bendm: would this also work if a client asks for application/ld+json 15:55:45 +1 to Ben's concern :) 15:55:48 q+ to talk about fallbacks 15:55:58 ack acoburn 15:55:58 acoburn, you wanted to talk about fallbacks 15:56:02 scribe+ 15:56:48 acoburn: I would like to see the default be application/lws+json but in the IANA considerations section we could mention it conforms to application/json and application/ld+json that would resolve this. 15:56:56 q+ to ask so there is an IANA description needed? 15:57:01 ... There is wording from ActivityStreams which allows us to do exactly that. 15:57:04 ack bendm 15:57:04 bendm, you wanted to ask so there is an IANA description needed? 15:57:33 bendm: there is an IANA description needed? 15:57:40 q+ 15:57:48 acoburn: The ActivityStreams community put this in a considerations section afaik. 15:57:54 ack pchampin 15:58:02 scribe- 15:58:29 pchampin: I think this is wrong -- the IANA considerations section is for formal registrations with IANA 15:58:55 ... I do see an application/activity+json application is present 15:59:13 https://www.iana.org/assignments/media-types/application/activity+json 15:59:26 ... the work of the group is to write the IANA considerations section, the W3C staff contact will help with the registration part 15:59:40 RRSAgent, make minutes 15:59:41 I have made the request to generate https://www.w3.org/2026/02/16-lws-minutes.html acoburn 15:59:48 Good discussion today, thank you all! 15:59:59 laurens: thank you for the discussions today 16:00:07 RRSAgent, make minutes 16:00:08 I have made the request to generate https://www.w3.org/2026/02/16-lws-minutes.html acoburn 16:00:30 bendm has left #lws 16:00:54 present+ bendm 16:01:16 i|is about the LWS media type|Topic: LWS Media-type 16:01:18 RRSAgent, make minutes 16:01:19 I have made the request to generate https://www.w3.org/2026/02/16-lws-minutes.html acoburn 16:01:50 m2gbot has joined #lws 16:04:52 acoburn has left #lws