18:44:04 RRSAgent has joined #webauthn 18:44:04 logging to https://www.w3.org/2021/06/16-webauthn-irc 18:44:05 RRSAgent, make logs Public 18:44:07 Meeting: Web Authentication WG 18:44:12 Agenda: https://lists.w3.org/Archives/Public/public-webauthn/2021Jun/0059.html 18:56:35 matthewmiller has joined #webauthn 18:59:57 jfontana has joined #webauthn 19:00:23 elundberg has joined #webauthn 19:01:08 present+ 19:01:28 selfissued has joined #webauthn 19:02:14 present+ 19:02:41 nsteele has joined #webauthn 19:02:43 present+ 19:02:48 present + 19:05:57 present+ 19:08:01 agl: Google put out its latest plan that will come to a github issues in a few weeks. 19:08:14 dveditz has joined #webauthn 19:08:23 present+ 19:08:28 tony: once in form of an issue, we can crank up meeting times a bit. 19:08:54 https://github.com/w3c/webauthn/pull/1621 19:08:57 what agl referred to: https://groups.google.com/a/fidoalliance.org/g/fido-dev/c/go6GoFW27Dw 19:09:57 elundberg: I don't the modify parameters is in scope.We can make other pieces more clear. 19:10:32 ...i have re-writtend soem to make them more clear from RP and client authenticator 19:10:47 ...nothing here that are new requirements. 19:11:15 tony: reviewers? 19:11:28 present+ 19:11:36 shane: will review 19:11:55 aksahy: will review 19:12:02 https://github.com/w3c/webauthn/pull/1615 19:13:38 selfissue: I can look at this during call 19:13:53 https://github.com/w3c/webauthn/pull/1576 19:14:13 jeffH: this is ongoing. it is draft. 19:14:24 https://github.com/w3c/webauthn/pull/1425 19:14:51 elundberg: waiting on other issues, multiple keys, FIDO discussion 19:15:24 jeffH: this will come to W3C soon-ish on two key issue in WEb authn context. 19:15:54 ...continuity signal is how we think this will work. its a platform authenticator 19:16:35 agl: more depth will come. two keys is part of this, b ring back some of the hardware backed properties. 19:16:47 ...it is different than backing up keys, it is agument of that 19:17:14 DWaite: this is an extension. 19:17:29 agl: yes, extenstions are optional. need to prepare to accept. 19:17:39 ...two key would not come unsolicited 19:17:44 apple's "move beyond passwords" WWDC talk: https://developer.apple.com/videos/play/wwdc2021/10106/ 19:17:47 DWaite: concerned the other way 19:17:59 ....what if it does not come back with two keys 19:18:14 agl: this is in excess of what is there rigiht now. don't depend on second key 19:18:59 ...guidance, it is a risk signal 19:19:36 elundberg: R 19:19:55 ...RPs are expected to accept unsolicited extensions 19:20:23 ...our proposal has two options. 19:21:16 agl: for your context, maybe haredware bound key, that migth be way you would use it, don't see how it transports keys 19:21:42 elundberg: I meant delivering Key to RP 19:22:44 eluncberg: don't think recovery will be in near term. WE can wait for Google to come up with their scheme 19:23:37 https://github.com/w3c/webauthn/pull/1622 19:24:01 elundberg: large blob. I will look at the feedback. 19:25:00 https://github.com/w3c/webauthn/pull/1625 19:25:13 I'm good merging https://github.com/w3c/webauthn/pull/1615 19:28:23 https://github.com/w3c/webauthn/pull/1625 19:28:30 jeffH: merging 19:28:44 tony: matt can you merge #1625 19:30:21 matt: token binding it is unrecognized shape, what do you do? 19:30:47 agl: type errors are not called out in spec IDL takes care of that 19:30:55 ...not sure where these came from. 19:31:02 matt: they are very old, 3 years. 19:31:15 ...nothing is returning token binding these days. 19:33:26 tony: will leave token binding laying around 19:34:15 https://github.com/w3c/webauthn/issues/1620 19:34:35 tony: this is not a spec issue 19:34:41 ...how to handle 19:34:52 akshay: I will explain and likely close 19:35:36 DavV: itis firefox issue 19:36:00 https://github.com/w3c/webauthn/issues/1612 19:36:33 tony: this is deletion one; around for 4 weeks. no response. close? 19:36:39 elundberg: close 19:37:11 https://github.com/w3c/webauthn/issues/1624 19:37:51 agl: think this is CTAP/CBOR issue 19:39:38 tony: any issues to discuss 19:40:30 https://github.com/w3c/webauthn/issues/1618 19:40:52 elundberg; in past decided not to make a breaking change 19:41:00 ...is there more a case to re-consider 19:41:13 agl: this default is problematic in some scenarioes 19:42:02 ... there was misunderstanding if this was vulnerability - it seems it was not 19:42:23 agl: could set explicitly it to prefer 19:42:36 akshay: we needed some context where the user was 19:44:37 elundberg: we have the same resolution as before 19:44:47 selfissue: get the RPs to do the right thing here. 19:44:57 elundberg: I will update and close without comment. 19:48:33 agl: I will file an issue to get rid of token binding? 19:48:44 nSteele: I will work on PR. 19:50:51 rrsagent, draft minutes 19:50:51 I have made the request to generate https://www.w3.org/2021/06/16-webauthn-minutes.html wseltzer 19:53:14 dveditz has joined #webauthn 19:53:58 dveditz has joined #webauthn