IRC log of hb-secure-services on 2016-06-01
Timestamps are in UTC.
- 13:03:20 [RRSAgent]
- RRSAgent has joined #hb-secure-services
- 13:03:20 [RRSAgent]
- logging to http://www.w3.org/2016/06/01-hb-secure-services-irc
- 13:03:23 [Zakim]
- Zakim has joined #hb-secure-services
- 13:16:16 [wseltzer]
- wseltzer has changed the topic to: HB-Secure Services call 1400 UTC June 1, https://lists.w3.org/Archives/Public/public-hb-secure-services/2016May/0011.html
- 13:16:19 [wseltzer]
- Agenda: https://lists.w3.org/Archives/Public/public-hb-secure-services/2016May/0011.html
- 13:57:53 [colin]
- colin has joined #hb-secure-services
- 14:00:38 [phofmanntsy]
- phofmanntsy has joined #hb-secure-services
- 14:01:26 [wseltzer]
- present+ wseltzer
- 14:01:50 [virginie]
- virginie has joined #hb-secure-services
- 14:01:58 [acouvert]
- acouvert has joined #hb-secure-services
- 14:01:59 [virginie]
- hi all, call is starting :)
- 14:02:10 [wseltzer]
- present+ virginie, acouvert
- 14:02:12 [acouvert]
- hello everyone
- 14:02:54 [wseltzer]
- zakim, who is here?
- 14:02:54 [Zakim]
- Present: wseltzer, virginie, acouvert
- 14:02:56 [Zakim]
- On IRC I see acouvert, virginie, phofmanntsy, colin, Zakim, RRSAgent, schuki_, wseltzer
- 14:03:16 [phofmanntsy]
- present+ phofmanntsy
- 14:03:17 [Sebastien]
- Sebastien has joined #hb-secure-services
- 14:03:59 [wseltzer]
- present+ rigo
- 14:04:00 [rigo]
- rigo has joined #hb-secure-services
- 14:04:05 [wseltzer]
- present+ colin
- 14:04:23 [wseltzer]
- present+ bruno
- 14:04:37 [wseltzer]
- present+ Sebastien
- 14:05:03 [wseltzer]
- present+ opotonnier
- 14:05:13 [wseltzer]
- present+ Ketan
- 14:06:11 [virginie]
- agenda?
- 14:06:12 [mzwolinski]
- mzwolinski has joined #hb-secure-services
- 14:06:49 [Ketan]
- Ketan has joined #hb-secure-services
- 14:06:50 [virginie]
- agenda+ Welcome and introduction
- 14:06:54 [brunoj]
- brunoj has joined #hb-secure-services
- 14:07:12 [virginie]
- agenda+ CG objective reminder
- 14:07:26 [virginie]
- agenda+ Review of Morpho’s contribution (see https://rawgit.com/w3c/websec/gh-pages/hbss.html)
- 14:07:49 [virginie]
- agenda+ Discussing use case description
- 14:08:02 [virginie]
- agenda+ Discussing technical proposal
- 14:08:18 [wseltzer]
- zakim, who is here?
- 14:08:18 [Zakim]
- Present: wseltzer, virginie, acouvert, phofmanntsy, rigo, colin, bruno, Sebastien, opotonnier, Ketan
- 14:08:19 [virginie]
- zakim, who is here ?
- 14:08:21 [Zakim]
- On IRC I see brunoj, Ketan, mzwolinski, rigo, Sebastien, acouvert, virginie, phofmanntsy, colin, Zakim, RRSAgent, schuki_, wseltzer
- 14:08:21 [Zakim]
- Present: wseltzer, virginie, acouvert, phofmanntsy, rigo, colin, bruno, Sebastien, opotonnier, Ketan
- 14:08:21 [Zakim]
- On IRC I see brunoj, Ketan, mzwolinski, rigo, Sebastien, acouvert, virginie, phofmanntsy, colin, Zakim, RRSAgent, schuki_, wseltzer
- 14:08:52 [phofmanntsy]
- Peter Hofmann
- 14:09:00 [wseltzer]
- present+ mzwolinski
- 14:09:22 [virginie]
- agenda ?
- 14:09:35 [wseltzer]
- zakim, take up agendum 1
- 14:09:36 [Zakim]
- agendum 1. "Welcome and introduction" taken up [from virginie]
- 14:10:28 [opoto]
- opoto has joined #hb-secure-services
- 14:10:44 [Laurent_]
- Laurent_ has joined #hb-secure-services
- 14:11:05 [wseltzer]
- present+ Laurent
- 14:11:33 [wseltzer]
- zakim, take up next agendum
- 14:11:33 [Zakim]
- agendum 2. "CG objective reminder" taken up [from virginie]
- 14:11:46 [opoto]
- present+ opoto
- 14:12:28 [wseltzer]
- virginie: goal of this CG is to demonstrate the value of using hardware-provided secure services for the Web
- 14:12:46 [wseltzer]
- ... aim to be quick, to spark conversations with user-agent-implementers
- 14:12:57 [wseltzer]
- ... in order to bring proposal to W3C
- 14:13:06 [wseltzer]
- ... timeline, a few months
- 14:13:26 [wseltzer]
- virginie: documentation and prototyping/demonstration
- 14:13:48 [wseltzer]
- zakim, take up next agendum
- 14:13:48 [Zakim]
- agendum 3. "Review of Morpho’s contribution (see https://rawgit.com/w3c/websec/gh-pages/hbss.html)" taken up [from virginie]
- 14:14:23 [wseltzer]
- virginie: Sebastien sent draft to list
- 14:14:48 [wseltzer]
- -> https://rawgit.com/w3c/websec/gh-pages/hbss.html Sebastien's draft Hardware Based Secure Services Report
- 14:14:57 [virginie]
- The draft is here : https://rawgit.com/w3c/websec/gh-pages/hbss.html
- 14:14:59 [wseltzer]
- Sebastien: review the high-level table of contents
- 14:15:19 [wseltzer]
- ... this is a draft to kick off conversation
- 14:16:05 [wseltzer]
- ... Terminology; Problem Statement; Use Cases
- 14:17:02 [wseltzer]
- ... Problem statment: key access, management, user verification
- 14:17:20 [wseltzer]
- ... API design
- 14:17:41 [wseltzer]
- ... at high-level, key usage, and secure credential storage and management.
- 14:18:07 [wseltzer]
- ... Architectures and security requirements
- 14:19:12 [wseltzer]
- virginie: thanks Sebastien! I sent some comments
- 14:19:52 [wseltzer]
- ... use cases are important, to convince implementers there's value
- 14:20:03 [wseltzer]
- ... questions?
- 14:21:19 [wseltzer]
- virginie: are we going to describe scenarios where smartcard or trusted UI is used?
- 14:21:42 [wseltzer]
- ... e.g. citizen identity, high-level?
- 14:21:54 [wseltzer]
- ... or more detailed to secure transaction confirmation, key management?
- 14:22:12 [wseltzer]
- Sebastien: possibly both
- 14:22:27 [wseltzer]
- ... e.g., Estonian citizen who wants to sign documents, needs to prove identity, make signature
- 14:22:46 [wseltzer]
- ... then propose use transaction confirmation as alternative
- 14:22:51 [wseltzer]
- ... to achieve functional goal
- 14:24:23 [wseltzer]
- Sebastien: if we want to add transportation, e-health, people should give input on the use cases
- 14:24:46 [wseltzer]
- virginie: I'll ping Deutsche Telekom on transportation
- 14:25:13 [wseltzer]
- ... remove topics on which there's no contribution (for the moment)
- 14:25:51 [colin]
- colin has joined #hb-secure-services
- 14:26:52 [wseltzer]
- virginie: a short paragraph on how secure transaction confirmation and secure credential storage support those use cases
- 14:26:56 [wseltzer]
- ... then move on to API
- 14:27:08 [mr]
- mr has joined #hb-secure-services
- 14:28:26 [opoto]
- opoto has left #hb-secure-services
- 14:28:46 [wseltzer]
- virginie: did we say we'd cover device authentication?
- 14:29:00 [wseltzer]
- Sebastien: Visa requested for online payments
- 14:29:11 [wseltzer]
- ... instead of explicit end-user authentication
- 14:30:13 [wseltzer]
- virginie: I was expecting an API for transaction confirmation; an API for using and storing keys
- 14:30:42 [wseltzer]
- Sebastien: so for signature, do we say "rely on webcrypto, with additional support"?
- 14:30:44 [brunoj]
- q+
- 14:30:57 [wseltzer]
- rrsagent, draft minutes
- 14:30:57 [RRSAgent]
- I have made the request to generate http://www.w3.org/2016/06/01-hb-secure-services-minutes.html wseltzer
- 14:31:29 [wseltzer]
- opoto: we can reuse webcrypto with additional notion of a crypto provider
- 14:31:31 [rigo]
- q+
- 14:31:37 [wseltzer]
- ack brunoj
- 14:31:53 [wseltzer]
- brunoj: hardware backing on webcrypto would answer 80-90% of use cases
- 14:32:11 [wseltzer]
- ... is that an acceptable option?
- 14:32:52 [wseltzer]
- ... that would be valuable
- 14:33:23 [wseltzer]
- virginie: that proposal could be made to W3C, either to extend WebCrypto or in a new WG
- 14:33:26 [wseltzer]
- ack rigo
- 14:35:30 [wseltzer]
- rigo: issue of unscoped token
- 14:36:38 [colin_]
- colin_ has joined #hb-secure-services
- 14:36:42 [rigo]
- rigo: We shouldn't preclude too many things. CGs are made to explore. We will find new issues running down the generic use cases, find that imagined issues aren't as dramatic and perhaps add needed futures (scope of tokens)
- 14:36:59 [rigo]
- RRSAgent, please draft minutes
- 14:36:59 [RRSAgent]
- I have made the request to generate http://www.w3.org/2016/06/01-hb-secure-services-minutes.html rigo
- 14:39:03 [rigo]
- sebastion: scope could be within the key itself to avoid relying on browser implementation
- 14:39:57 [wseltzer]
- https://www.w3.org/TR/webauthn/
- 14:40:03 [virginie]
- in web authentication : scoped is aused here : https://w3c.github.io/webauthn/#iface-credentialInfo
- 14:40:41 [Sebastien]
- sebastien: proposition to rely upon existing keys with scoping enforced by browsers
- 14:41:02 [brunoj]
- https://www.w3.org/TR/2016/WD-webauthn-20160531/#scopedcredentialinfo ?
- 14:41:10 [wseltzer]
- [[ Scoped credentials are always scoped to a single WebAuthn Relying Party. ]]
- 14:41:27 [wseltzer]
- https://w3c.github.io/webauthn/#use-cases
- 14:46:00 [wseltzer]
- virginie: work to propose amendment to webcrypto that supports storing a scoped key in hardware
- 14:46:03 [colin]
- colin has joined #hb-secure-services
- 14:50:57 [virginie]
- scribenick : virginie
- 14:51:29 [virginie]
- bruno : how do you select the key in the TEE or Secure Element ? how will be managed the choice ? any naming rule ?
- 14:51:47 [virginie]
- sebastien : do you mean pre-filterning the type of SE that may be used ?
- 14:51:51 [virginie]
- bruno : yes
- 14:52:06 [virginie]
- bruno : and usually there is only one credential
- 14:52:33 [virginie]
- sebastien : filtering is also about being able to discover what is inside the providers
- 14:53:07 [virginie]
- sebastien : proposal is not to allow to select by the user, it is more about the authority that will help making choice
- 14:53:54 [rigo]
- q+
- 14:54:11 [virginie]
- bruno : thinking about the already enrolled credentials in the web part
- 14:54:39 [virginie]
- bruno : discovering can be risky, but the discovery could be made by OS and/or by browser
- 14:55:08 [virginie]
- bruno : in current implem, you can select at browser level the type of video/camero you want to use
- 14:55:43 [virginie]
- sebastien : yes, and video is not a sensitive value, whereas, secure element and sensitive application may be more complex to handle
- 14:56:05 [virginie]
- sebastien : discovering by a simple service request, has to be protected
- 14:56:38 [virginie]
- rigo : an API must not deal with User Interface, the web app will handle it
- 14:57:36 [virginie]
- rigo : about the naming, ig you find id in the web, you can always turn them into URIs, so, we should be cerfull allowing any web app scanning key presence without user consent
- 14:57:46 [brunoj]
- q+
- 14:57:48 [virginie]
- s/cerfull/carefull
- 14:57:56 [rigo]
- ack ri
- 14:58:29 [brunoj]
- q-
- 14:59:27 [virginie]
- option 1 : the user select the key, option 2 : the user pre-defines a choice that the borwser owns, option 3 : the certification authority is the main trigger to elect the right key
- 15:01:13 [virginie]
- it is discussed that the borwser first filter based on CA, and at the end of the day, the user will have to be aware that this is happening
- 15:01:38 [rigo]
- key discovery is certainly a fingerprinting issue
- 15:03:28 [virginie]
- q+
- 15:03:33 [virginie]
- q-
- 15:05:06 [virginie]
- sebastien : about the digital sinature, we will have to sign the document without displaying it to the user
- 15:05:41 [virginie]
- sebastien : thus, it will be the choice of the service provider to accept the signature with some non-repudiation data
- 15:06:20 [virginie]
- sebastien : there should have some nested operation, such as signing document, then signing the message, and checking both are valid
- 15:06:40 [rigo]
- q+
- 15:07:05 [virginie]
- rigo : why document can not be presented in trusted UI
- 15:07:17 [rigo]
- ack rig
- 15:07:36 [virginie]
- sebastien : because Tusted UI has some capabilities which are limited
- 15:08:17 [virginie]
- sébastien : thus we have to provide a complex document signature, but we have to add another step for the non-repudiation
- 15:08:38 [virginie]
- sébastien : we need to provide something that is understood by the end user
- 15:15:02 [wseltzer]
- q+
- 15:15:18 [virginie]
- rigo : feel there is a limitation in stating that a large or complex document can not be used in a Trusted UI, and this is not suitable to the web spirit
- 15:15:55 [virginie]
- sebastien : but the garantee that the user confirm the content has to take into account the accessibility, the capability of the user to actually check every bit of the docu, including the images
- 15:16:26 [virginie]
- rigo : we should define an intermediate levl where we can garantee that there is a 'some' security in the digital signature
- 15:16:43 [virginie]
- to rigo, please check I correclty reported your statement :)
- 15:17:36 [virginie]
- sébastien : the trusted Ui should not rely on the browser, but on the system underlying (TEE or operating system, or whatever is able to provide some secure display)
- 15:17:56 [virginie]
- s/whatever/whatever or a middleware
- 15:18:01 [wseltzer]
- q-
- 15:19:30 [virginie]
- virginie : lets comment the chapter 5
- 15:19:49 [virginie]
- sébastien : this is description of the different elements that will be involved into that solution
- 15:20:29 [virginie]
- sébastien : there are some parts touching the browser, parts touching the operating system, each of them having their caracteristics (Windows and android hving different security models)
- 15:20:49 [virginie]
- sébastien : it is a decsription of the security requirements
- 15:23:16 [brunoj]
- ok for me
- 15:23:33 [brunoj]
- +1
- 15:23:33 [Sebastien]
- +1
- 15:23:35 [rigo]
- -1 very difficult that week
- 15:23:37 [virginie]
- +1
- 15:23:52 [colin]
- colin has joined #hb-secure-services
- 15:26:17 [virginie]
- https://www.w3.org/community/hb-secure-services/participants
- 15:27:53 [wseltzer]
- virginie: next meeting June 15
- 15:28:03 [wseltzer]
- [adjourned]
- 15:28:10 [wseltzer]
- zakim, list attendees
- 15:28:10 [Zakim]
- As of this point the attendees have been wseltzer, virginie, acouvert, phofmanntsy, rigo, colin, bruno, Sebastien, opotonnier, Ketan, mzwolinski, Laurent
- 15:28:17 [wseltzer]
- rrsagent, make logs public
- 15:28:21 [wseltzer]
- rrsagent, draft minutes
- 15:28:21 [RRSAgent]
- I have made the request to generate http://www.w3.org/2016/06/01-hb-secure-services-minutes.html wseltzer
- 16:18:08 [mzwolinski]
- mzwolinski has joined #hb-secure-services
- 16:18:54 [mzwolinski]
- mzwolinski has left #hb-secure-services
- 16:54:23 [phofmanntsy]
- phofmanntsy has joined #hb-secure-services
- 17:13:12 [phofmanntsy]
- phofmanntsy has joined #hb-secure-services