12:57:32 RRSAgent has joined #websec 12:57:32 logging to http://www.w3.org/2016/09/19-websec-irc 12:58:41 weiler has joined #websec 12:59:39 bhill2 has joined #websec 13:00:53 bhill2 has joined #websec 13:01:06 present+ bhill2 13:03:33 tara has joined #websec 13:11:08 . 13:11:39 Present+ hadleybeeman 13:11:59 present+ tara 13:12:02 Present+ OlivierThereaux 13:12:10 TOPIC: Security IG status 13:12:17 scribenick: bhill2 13:12:40 vg: this is a place to discuss new topics in security not in other WGs 13:12:58 ... try to have regular calls 13:13:17 ... introduced new topics, new security review process, creating a group of security experts 13:13:19 Present+SangwhanMoon 13:13:31 ... not a lot of security experts available to participate at this general level 13:13:48 ... maybe that means that w3c already addresses the specific needs (e.g. with WebAppSec & WebCrypto) 13:14:11 ... but still value in maintaining this group, so having quarterly meetings for people interested 13:14:24 ... summarize work happening in other groups and bring up new topics 13:14:47 ... recent new topics included overlap of security and accesibility 13:15:10 ... how to do security reviews across different w3c deliverables 13:15:25 ... still have the existing self-assessment questionnaire 13:16:13 ... charter about to expire, need to renew or extend 13:16:41 ... have to report the planned destiny of the group to the AC 13:17:22 ... w3c reorganizing; Sam is our contact for the week at least 13:17:42 ... do we need a new chair / co-chair? 13:17:57 q? 13:18:19 Kepeng has joined #websec 13:18:19 q- chaals 13:19:34 ryan ware: question about questionnaire 13:19:42 vg: been around 1 year 13:20:04 present+ shigeya 13:20:10 rw: have groups doing the questionnaire found issues? 13:20:29 vg: some have said it was helpful, others still expect "expert" review 13:21:13 vg: mikewest has been the primary author, published through the TAG 13:21:37 mkwst: useful in its current state but either too detailed or not detailed enough 13:21:42 brunoj has joined #websec 13:21:46 ... in a middle ground where not clear how people should use it 13:21:57 ... PING has been interested in making it more useful 13:22:21 twhalen: different set of questions for people doing review vs. doing spec authoriing 13:22:28 ... we have found it useful 13:22:46 ... have interest in picking it up and working with it 13:22:52 vg: but privacy related 13:23:09 twhalen: yes, not general security but privacy specific 13:23:23 hwlee has joined #websec 13:23:43 hadleybeeman: TAG would love that, having something to help assist thinking about security and privacy is very useful 13:24:01 ... needs more work and attention, how we use the term privacy depends on the context / content vs. browser 13:25:32 ???: some other IGs are focusing more on gap analysis and spinning off WGs 13:25:47 s/???/olivier 13:25:59 present+ wseltzer 13:26:08 present+ schuki 13:26:31 ... doesn't seem to be much of that here: because there isn't a gap or we're not in the right layer 13:26:31 vg: what I've been trying to do is to connect to new needs from members 13:26:32 ... but not much participation on the list about how to do that 13:26:35 ... major blocker on topics has been lack of contributors 13:26:43 rrsagent, make logs public 13:27:37 ... is anyone willing to spend 10 hours maximum working on this questionnaire to improve it 13:29:02 mkwst has joined #websec 13:29:07 I need to step out for 30 minutes. Be back. 13:29:59 vg: ongoing activity, feel recharter is more appropriate than extension 13:29:59 bhill2 has joined #websec 13:37:12 (my connection is too unreliable to continue scribing, I think, as is my jetlagged brain) 13:37:20 drogers: bridging the security research community to W3C 13:38:17 [volunteers to work on the Security Questionnaire earlier: rrware, Kepeng, schuki/GSMA ] 13:39:09 vg: other ideas we heard, domain security; trheat modeling 13:39:56 drogers: Where is our boundary, re domain/DNS security? 13:40:12 ???: Not sure. Wide range of technologies. 13:40:22 drogers: misplaced trust in the domain name. 13:40:27 s/???/yoshiro 13:40:41 virginie: Having a focused discussion on that during a call would be helpful. 13:41:30 ????: Re threat modelling. Started from the IETF protocols. There were problems in establishing this primary agreement, it was the source of vulnerabilities. 13:41:46 back 13:41:50 ...If we are reviewing specifications, there could be some broader context integrated into the view. 13:42:07 drogers: Right. Security protocol verification is IETF's. 13:42:30 ????: For W3C context; what the user is presented? What visual marks on the browser might they see? 13:42:45 drogers: The security model of the web (which isn't written down) 13:42:56 s/????/kaorumaeda/ 13:43:04 ????: Sometimes this isn't standardised. The browser vendors decide for themselves. 13:43:11 ...Something safer 13:43:17 drogers: there are a lot of academic papers on this 13:43:40 mikewest: Chrome is going to negative signals of insecurity. You should expect to be secure; we'll tell you if you're not. 13:43:56 ...We'll be affirmatively marking an HTTP page with a password field as BAD. 13:44:18 ...You shouldn't have to detect green (meaning secure); you'll look for red. (Meaning: not) 13:44:39 virginie: This relates also with what's going on with Permissions. Direct interaction with the user. 13:44:55 ...How do they treat this interaction... how to inject the security balance into this interaction. 13:45:30 [Discussion about Adrienne Porter-Felt's research. Tech lead for Chrome Security UI] 13:45:56 drogers: So there is security usability, within the general task of writing down the Web security model 13:46:06 ...Problem: there is no guidance for anybody. 13:46:16 ...We talked about this before, on webplatform.org. 13:46:49 q+ 13:47:07 virginie: to sum up... wseltzer, if we were to design a new charter: being the place where you drink tea and talk about security, PLUS being the place where education around vulnerabilities on the open web platform, 13:47:21 ...discussion about usabilitiy 13:47:35 wseltzer: I'll work with W3T to share a proposed draft charter. 13:47:55 ...I think we want to be specific enough to give people the info so they can tell us if they will send people to do the work 13:48:08 RRSAgent, draft minutes 13:48:08 I have made the request to generate http://www.w3.org/2016/09/19-websec-minutes.html sangwhan 13:48:19 RRSAgent, make minutes public 13:48:19 I'm logging. I don't understand 'make minutes public', sangwhan. Try /msg RRSAgent help 13:48:21 ...With my strategy hat on, it's interesting to hear the ideas about incubating new work. We don't need to be so specific there, but we can say "might include usability, anti-spoofing, etc" 13:48:31 ...Because one of our goals in incubation is to help groups to iterate. 13:48:41 RRSAgent, minutes are public 13:48:41 I'm logging. I don't understand 'minutes are public', sangwhan. Try /msg RRSAgent help 13:49:05 ...To do that, we may spawn off some community groups, add use cases to existing community groups. Bring back promising stuff to a WG to standards-track dev with patent policies, etc. 13:49:23 drogers: is it unusual for IGs to have general presentations on topics of interest? 13:49:36 wseltzer: No, that's appropriate. Web Payments IG have done some of that. 13:50:23 hadleybeeman: Can be woolly without some direction. 13:50:45 drogers: In security, we can be responding to topical issues; working out how we need to respond. 13:50:53 ...Patching specs, new specs, etc. 13:51:24 virginie: Wendy is going to lead the strategy. Ideas to her. 13:51:41 jeffjaffe: [Introduces himself] 13:51:50 ...Started a Security Research Group at IBM research in the 1980s 13:52:01 ...Spent a few years running IBM's security and networking business 13:52:16 ...In various other jobs, I keep trying to understand how to make things secure and haven't yet figured it out. But it's important. 13:52:45 virginie: Re Authentication of individuals... 5-min presentation 13:53:24 kaorumaeda_ has joined #websec 13:53:42 Kepeng: [referencing slides] 13:53:50 ...Real name authentication 13:54:59 ...Security threats in biometric authentication. Inject into the template. During the transmission, it could be lost/stolen 13:55:37 ...We use anti-spoofing detection. This is about making some movements or gestures to avoid a static information. You can move your hands, open/close your mouth, blink your eyes — to prove you're not a picture. 13:56:23 ...In Alibaba, we use fingerprint authentication, face recognition and iris. We have 100million users. We use for payment, egovernment and e-commerce. 13:56:49 ...This is a framework. We have a mobile device side and a server. 13:57:57 q+ 13:58:01 ...We have process flows. local and remote verification 13:59:57 ...The user can request authentication verification. Goes to the server, and the server asks for a specific kind of biometric info, like a fingerprint. 13:59:57 ...The user can then send it for verification. The server sends back a result. 13:59:58 virginie: The process flow is implemented in mobile devices and you want to bring it to the web? 13:59:58 kepeng: yes 13:59:58 ...Work happening at the Internet Finance Authentication Alliance. Related to FIDO. 13:59:58 ...Standardisation opportunities at the W3C for interactions with the browser 14:00:00 ...and which WG? WebAuth? WebSec? Any CGs? 14:00:12 virginie: any feedback? 14:00:14 q? 14:00:15 q+ 14:00:29 q- later 14:00:33 ack sangwhan 14:00:41 q+ 14:00:58 q=sangwhan, Sebastien, wseltzer 14:01:06 queue=sangwhan, Sebastien, wseltzer 14:02:00 ack sangwhan 14:03:14 sangwhan: how do you address the problem of coercion for biometrics? 14:03:30 ... you can't so easily refuse to give up a fingerprint 14:03:40 drogers: see also the sleeping parent attack 14:04:09 keiji has joined #websec 14:04:25 Sebastien: there's a database in India 14:04:54 drogers: does gov give you the daabase, or API? 14:05:18 Natasha: That’s no different to coercing someone to give you their password. 14:05:18 dodgers: like the “sleeping parent” problem in iOS. 14:05:24 ...Citizens register their biometric data, so that’s held in another place. The majority of biometric stuff happening in the GSMA world is not leaving the device 14:05:35 Hadleybeeman: this would be illegal in European Union countries. It would violate the Data Protection laws. 14:05:55 wseltzer: This is out of scope for the chartered WebAuth group. This would be a good place to discuss what to do with these ideas. 14:06:21 drogers: so your questions here are about access to the biometric sensor? So you need an API to the biometric sensor? 14:06:23 lukasz has joined #websec 14:06:27 hello! 14:06:34 virginie: I suggest we put these into discussion for the WebSec IG 14:06:39 q- 14:07:16 Yoshiro has joined #websec 14:07:21 oh hey hadleybeeman 14:08:24 q- 14:08:39 topic: Hardware Based Secure Services CG 14:08:49 s/dodgers/drogers/ 14:09:08 natasha: This is different for very large companies, who can have contracts with existing databases. 14:09:08 virginie: might be different use cases ,depending on the business and the local laws. 14:09:19 drogers: [see slides] 14:10:08 ... HBSS workshop in London, hosted by MoFo, brought in good expertise 14:10:48 ... since then, group has been working, led by Sebastien 14:11:54 http://googleforwork.blogspot.pt/2016/09/pushing-the-boundary-of-Chrome-OS-Security-with-Verified-Access.html 14:12:10 mkwst: I'll look into this 14:12:43 drogers: there seems to be increasing interest in hardware security; our aim is to identify and prioritize 14:13:29 vg: we have some demonstrations 14:13:44 ... objectives, to discuss next steps for the CG work 14:14:02 ... CG developed a report explaining use cases: egovernment, ebanking 14:14:14 ... security sensitive operations, e.g. signing documents 14:14:27 ... work to describe API for 2 techncial features 14:14:50 ... secure management of credentials for cryptographic operation in hardware-based technology 14:15:07 ... 2d, secure transaction confirmation 14:15:19 ... over to you, Sebastien 14:16:03 https://rawgit.com/w3c/websec/gh-pages/hbss.html 14:16:26 -> https://rawgit.com/w3c/websec/gh-pages/hbss.html CG Report: Hardware Based Secure Services features 14:16:50 Sebastien: aim to enable use and management of secure services, hardware-based solution 14:17:46 Sebastien: [summarizes report's goals] 14:19:06 ... question about request validation by the end user 14:19:24 ... bridge between low-level API and Web 14:20:11 ... replace management by extensions or Java plugins 14:20:27 ... for pre-existing keys 14:21:26 ... Give the end-user enough information to know what they're signing or authorizing, not just a binary blob 14:21:51 ... Transaction confirmation: give user something readable to understand and accept = user consent 14:22:21 ... e.g. if end-user is requested to accept a withdrawal from an account 14:22:38 ... non-repudiation message 14:22:57 ... sign operation, with non-repudation message and binary data 14:24:17 ... these need to generate requirements on operating system environment 14:24:34 vg: CG goal to make minimal viable product for those APIs 14:24:45 ... also capture what we can do, don't know how to do. 14:25:24 Sebastien: second, key management 14:25:32 ... classical crypto matters, based in secure element 14:25:56 ... so it looks like webcrypto API plus implmentation paramater to say whether it's software or hardware 14:26:19 vg: this part drafted by Aurelien from Gemalto, who couldn't be here 14:27:20 Sebastien: Section 5, implementation requirements 14:27:56 vg: report got CG review 14:28:07 ... about 10 people actively reviewed 14:28:33 ... goal here to get broader feedback. Is it workable? 14:28:39 [coffee break] 14:28:44 rrsagent, draft minutes 14:28:44 I have made the request to generate http://www.w3.org/2016/09/19-websec-minutes.html wseltzer 14:28:57 [return in 20 min] 14:32:45 rrsagent, pointer? 14:32:45 See http://www.w3.org/2016/09/19-websec-irc#T14-32-45 14:42:53 rrware has joined #websec 14:48:59 shigeya has joined #websec 14:50:25 kaorumaeda has joined #websec 14:51:34 kaorumaeda_ has joined #websec 15:06:16 chaals has joined #websec 15:14:31 Yoshiro has joined #websec 15:21:24 [returned] 15:21:32 [discussion of WebUSB] 15:26:29 bhill2: FIDO UAF v1 had a whitelist capability 15:26:54 ... signing over a DOMstring turns out to be really tricky because of fonts, unicode 15:27:02 s/whitelist/transaction verification/ 15:27:07 ... then made it a bitmap 15:27:24 Sebastien: but accessibility challenges with images 15:27:35 bhill2: we had ASCII or image, not unicode 15:27:49 JeffH: transaction confirmation is an optional extension in WebAuthn 15:27:59 ... we changed the confirmation string 15:28:52 vg: todo, liaise with WebAuthn 15:29:57 Sebastien: back to the issues: attestation retrieval by issuing authority 15:31:09 ... post-issuance of keys 15:31:13 ... secure context 15:31:28 vg: WebCrypto rcently decided to require secure contexts 15:32:01 Sebastien: identity attributes 15:32:21 vg: for futre development 15:32:44 drogers: attribute based encryption... it's fairly new, suggest we don't go there now 15:33:50 Ketan: don't you need user attributes for individual autentication? 15:33:59 ... WebAuthn takes care of device authentication 15:34:49 vg: Does API require attributes to be usable? 15:35:02 Ketan: Gap is to do all the web API requirements at the hardware level 15:37:05 ... we have webcrypto, what's missing is ability to address a key on a device 15:37:12 ... as Sebastien pointed out 15:37:21 vg: do you need discovery and user interaction? 15:37:36 Ketan: you can provide API, or discovery function 15:37:54 vg: do you believe it has to have discovery of keys, or of physical devices? 15:38:02 Ketan: key-level 15:38:25 ... user decides which key to use 15:39:01 Sebastien: privacy issues pose problem with key discovery at API level 15:39:21 ... need way to filter 15:39:36 ... trusted UI presents filtered choice to user 15:42:15 keiji has joined #websec 15:42:16 Sebastien: todos, a few typos, implementation security requirements 15:43:14 vg: next steps: what to do with this report and demo 15:43:32 ... we need to talk to UA providers, see their interest in WG creation 15:44:10 drogers: we should validate what we've written with those prior commments 15:44:23 ... ID gaps with WebAuthn 15:45:20 ... we were asked to draft APIs, privde requiremens, demos 15:45:24 ... you've done a great job 15:45:58 shigeya has joined #websec 15:46:16 vg: next steps: improving, socializing, start drafting WG charter if there's interest 15:46:28 drogers: deadline for feedback 15:46:49 vg: one month? 15:47:07 drogers: give Sebastien another week to finalize and publish report 15:47:16 ... one month feedback period 15:47:22 q+ 15:47:38 drogers: virginie and I will try to document the feedback 15:47:59 ... by early Nov 15:48:19 present+ Kaoru_Maeda 15:48:21 vg: reporing to the CG what's UA reaction to our proposal 15:48:50 ... I'll give brief reprot at today's AC meeting 15:51:00 shigeya has joined #websec 15:52:26 wseltzer: the CG should publish Final Specification to lock-in patent commitments 15:52:36 ... and then go through evaluation with ecosystem 15:52:54 drogers: so by December, be ready to go to AC, if that's the conclusion 15:53:48 Topic: Wrap-up 15:53:56 vg: security jam session Wednesday 15:54:23 ... status update on W3C work, collect potential new security needs 15:54:43 ... and I'll give update in AC meeting 15:57:30 wseltzer: Thanks Virginie, and also David, Sebastien, Aurelien for working on the CG report 15:57:47 schuki: you can also do presentation to IETF SAAG 15:59:08 rrsagent, draft minutes 15:59:08 I have made the request to generate http://www.w3.org/2016/09/19-websec-minutes.html wseltzer 15:59:38 Topic: Biometric Authentication (return) 16:04:28 JeffH: consider the FIDO Alliance's work as a different way to do biometric verification 16:04:39 ... it's bad for privacy to keep a public database of biometrics 16:04:59 bhill2: recent paper showing that 3 photographs were enough to break biompetric proof of liveness 16:05:20 Sebastien: and yet many countries are using biometrisc for ID verification 16:06:38 bhill2: one you start shipping biometrics over the wire, you're opening up new attacks 16:07:47 s/one/once/ 16:08:30 marta: more border crossings now using automated gates 16:09:26 bhill2: still scale difference from the possibility of a data breach, biometrics aren't secret even if people would like to treat them as secret 16:09:57 ... not every problem is a good idea to solve 16:11:33 bhill2: I'm not saying the problems aren't legitimate; rather, as security experts, we have the responsibility to make sure we're solving them in a good way 16:11:40 ... not creating privacy/security nuclear waste 16:12:21 dsinger: if someone wants to claim "I'm the person whose ID was verified," we might want to find a better way to address 16:12:33 kepeng: I agree that the solution raises some privacy issues 16:12:55 ... password and verification codes also have some flaws 16:13:08 ... this one is not perfect, but it works in China 16:13:24 Ryan: this one is a flaw that we already know is trivially exploitable 16:13:45 marta: and if biometric data is stolen, you can't change it 16:14:01 JeffH: it's not a secret; we all are shairng our biometric data right here 16:14:15 ... we need to figure out how to use it in a secure fashion 16:14:27 bhill2: we have it because everyone wants to share photos 16:14:38 ... and on the other side, theres the OPM data breach 16:15:11 dsinger: further, photos have data about more than one person; we don't have good handle on the privacy and security issues that raises 16:16:20 bruno: linking biometric to "real" identity, what does that mean? 16:17:38 ... I think this is important work 16:17:58 Sebastien has joined #websec 16:18:08 Ketan: Why doesn't FIDO do this? 16:18:30 (face spoofing: https://www.youtube.com/watch?v=ohmajJTcpNk#t=206) 16:18:31 JeffH: it's out of scope. We self-assert all the time; for the vast majority of transactions, that's sufficient 16:19:06 Bruno: bank is acting as identity provider 16:20:30 JeffH: Kantara initiative has done work on identity proofing 16:21:01 dsinger: about singular identity; bank is only confirming that the user of the credit card is the person to whom they issued it 16:21:07 ... I don't have a singular identity 16:21:25 hadleybeeman: that's more complicated when talking about money laundering regulation 16:21:40 drogers: preregistration fraud 16:22:02 ... e.g., someone who lives in a village suddenly gets a passport and doesn't know it, and someone else is traveling on it 16:22:17 bhill2: what can we do in W3C? create interesting primitives and let others work with them 16:22:27 ... e.g. attestable sensors on a device 16:23:18 ... would let someone else build proof of liveness from two cameras 16:23:48 marta: can we standardize what should be forbidden? 16:24:05 ... to tell people not to do it 16:24:15 mkwst: WG note or TAG Finding 16:24:54 hadleybeeman: TAG findings need to be based n architecture of the web 16:25:23 drogers: one of the strengths of FIDO is that the biometric remains on the device 16:25:50 ... attestation, we know that the device is happy with the situation, not what the biometric scanned was. 16:26:27 bhill2: I'm a FB user, I lost my device, how do I log in? Solution isn't just "take a selfie and send it over the wire" 16:26:37 ... it's a real use case 16:26:53 ... putting together measures from attested sensors is a more interesting solution 16:27:26 ... W3C makes voluntary reocmmentaitons, not certification. FIDO certifies, and can say "shalt not" 16:27:43 mkwst: data from attested sensors can be biometric too 16:28:14 bhill2: hypothetical attested camera wouldn 16:28:24 ... wouldn't be ok in FIDO 16:29:36 JeffH: you get attestation of the device as a public-private key set up at manufacturing time; sign message with the private key, metadata service gives attributes aobut the authenticator 16:29:40 ... if you care 16:29:57 mkwst: in many cases, you care about continuity, not identity 16:30:16 JeffH: WebAuthn (FIDO is only the certification) 16:30:38 ... registration, create a new public-private key 16:30:45 ... user verification is local, abstracted away 16:31:13 ... WebAuthn relying parties don't see the means of local authenticaiton;but keys minted on a per relying party basis 16:31:24 vg: there's still work to do 16:31:38 ... on the security and privacy considerations, and on what the Open Web platform needs 16:31:55 bhill2: I share the use case, we'd love to solve it correctly 16:32:19 vg: Wednesday's session will be bread 16:32:22 s/bread/broad/ 16:32:36 [adjourned] 16:32:58 vg: look for follow-up in WebSec IG and HBSS CG 16:33:04 Ketan: follow-up? 16:33:16 vg: we'll have some debriefs on HBSS 16:33:22 s/[adjourned]// 16:33:30 [adjourned] 16:34:06 rrsagent, make minutes 16:34:06 I have made the request to generate http://www.w3.org/2016/09/19-websec-minutes.html wseltzer 17:24:25 kaorumaeda has joined #websec 19:17:56 bhill2 has joined #websec 19:18:58 bhill2 has joined #websec 21:00:29 kaorumaeda has joined #websec 21:48:24 bhill2 has joined #websec 21:50:09 bhill2 has joined #websec 21:56:26 keiji has joined #websec 22:26:59 keiji has joined #websec