IRC log of wpwg on 2022-08-18
Timestamps are in UTC.
- 14:00:27 [RRSAgent]
- RRSAgent has joined #wpwg
- 14:00:27 [RRSAgent]
- logging to https://www.w3.org/2022/08/18-wpwg-irc
- 14:00:31 [Ian]
- Meeting: Web Payments WG
- 14:00:42 [Ian]
- Agenda: https://github.com/w3c/webpayments/wiki/Agenda-20220818
- 14:01:05 [Ian]
- Regrets: NickTR
- 14:01:07 [Ian]
- Chair: Ian
- 14:01:09 [Ian]
- Scribe: Ian
- 14:01:13 [Ian]
- present+
- 14:01:19 [Anne]
- Anne has joined #wpwg
- 14:01:23 [Ian]
- present+ David_Benoit
- 14:01:29 [Ian]
- present+ Erhard_Brand
- 14:01:34 [Ian]
- present+ Gerhard_Oosthuizen
- 14:01:38 [Ian]
- presnet+ Gregoire_Leleux
- 14:01:40 [JMGirard]
- JMGirard has joined #wpwg
- 14:01:43 [Ian]
- present+ Jean-Michel_Girard
- 14:01:47 [Ian]
- present+ Anne_Pouillard
- 14:01:50 [Gerhard]
- Gerhard has joined #wpwg
- 14:01:56 [Ian]
- present+ Steve_Cole
- 14:02:01 [Ian]
- present+ Stephen_McGruer
- 14:02:26 [Ian]
- present+ Jean-Luc_di_Manno
- 14:02:32 [Ian]
- present+ Tomoya_Horiguchi
- 14:02:44 [Ian]
- agenda+ SPC updates
- 14:02:49 [Ian]
- agenda+ TPAC Check-in
- 14:02:57 [Ian]
- agenda+ canMakePayment Use Cases
- 14:03:10 [Steve_C]
- Steve_C has joined #wpwg
- 14:03:17 [Ian]
- present+ Suzie_Annezo-Sébire
- 14:03:25 [Ian]
- present+ Bastien_Latge
- 14:03:36 [SuzieAS]
- SuzieAS has joined #wpwg
- 14:04:53 [Ian]
- zakim, take up item 1
- 14:04:53 [Zakim]
- agendum 1 -- SPC updates -- taken up [from Ian]
- 14:05:06 [Ian]
- Start with https://github.com/w3c/secure-payment-confirmation/pull/198
- 14:05:11 [JeanLuc]
- JeanLuc has joined #WPWG
- 14:05:38 [Ian]
- smcgruer_[EST]: This is an alignment with Web Authentication. We used "rp" instead of "rpid" and want to fix that to align with WebAuthn
- 14:05:44 [Ian]
- ...this is reasonable but also a breaking change. :(
- 14:05:52 [Ian]
- ...the resulting assertion is affected
- 14:06:07 [Ian]
- ...the field name changes
- 14:06:16 [Bastien]
- Bastien has joined #WPWG
- 14:06:20 [Bastien]
- present+
- 14:06:24 [Ian]
- ...my proposal is for implementations to continue to produce "rp" but also add "rpid"
- 14:06:38 [Ian]
- ...and we would deprecate "rp" over time.
- 14:06:47 [Gerhard]
- +1 for the change, before larger adoption...
- 14:06:49 [Ian]
- ...an alternative is to not make the change.
- 14:07:04 [Ian]
- smcgruer_[EST]: I think it's reasonable to make the change while small-ish number of users.
- 14:07:18 [Ian]
- present+ Manish
- 14:07:34 [benoit]
- benoit has joined #wpwg
- 14:07:39 [Ian]
- Ian: Thoughts on 3DS integration cost?
- 14:07:43 [Ian]
- Bastien: I can check.
- 14:08:00 [Ian]
- ...a priori I don't see an issue.
- 14:08:13 [Ian]
- smcgruer_[EST]: Verifying the assertion is out of scope of 3DS strictly speaking
- 14:09:00 [Ian]
- ACTION: Bastien to check with the EMV 3DS WG
- 14:09:44 [benoit]
- +q
- 14:09:44 [Ian]
- PROPOSED: Change "rp" to "rpid" in the SPC specification.
- 14:09:52 [Ian]
- ack benoit
- 14:10:06 [Ian]
- benoit: What would the deprecation plan be?
- 14:10:46 [Ian]
- smcgruer_[EST]: Usually we measure usage of features as part of deprecation. But we don't measure things in this case.
- 14:10:57 [Ian]
- ...we would start by producing both fields in the assertion
- 14:11:23 [Ian]
- ...I expect we would announce a timeline and talk loudly about it
- 14:11:38 [GregoireLeleux]
- "rpId" is part of the webAuthenCredList in 3DS spec
- 14:12:08 [Ian]
- present+ Susan_Koomen
- 14:12:21 [benoit]
- +1 support proposal
- 14:12:22 [Ian]
- present+ Rolf_Lindemann
- 14:12:24 [GregoireLeleux]
- yes, that's the input creds
- 14:12:30 [smcgruer_[EST]]
- +1 support proposal
- 14:12:59 [Steve_C]
- +1
- 14:13:02 [Anne]
- +1
- 14:13:03 [Ian]
- rolf: +1
- 14:13:04 [JMGirard]
- +1
- 14:13:31 [Sue]
- Sue has joined #wpwg
- 14:13:33 [Ian]
- Topic: WebAuthn and cross-origin credential creation
- 14:13:33 [Ian]
- https://docs.google.com/document/d/1mMgktymuzspnhfKC9i6_yBfb_VqXcc-DiBBhe0TSv5I/edit
- 14:14:01 [Rolf]
- Rolf has joined #wpwg
- 14:14:11 [Ian]
- smcgruer_[EST]: we've heard both for SPC and other payments use cases with FIDO is a desire to enroll a user in a cross-origin iframe in a merchant page rather than redirect.
- 14:14:21 [Ian]
- ...so SPC enables this but WebAuthn does not
- 14:14:26 [Ian]
- ...I have heard people say it is useful generally
- 14:14:54 [Ian]
- ...so it would be good to migrate this into Web Authn; there's a standing issue there on that topic
- 14:14:59 [Ian]
- ...I'd like to get the WPWG's support for this
- 14:15:02 [Rolf]
- What is the WebAuthn issue number?
- 14:15:18 [Ian]
- https://github.com/w3c/webauthn/issues/1656
- 14:16:05 [Ian]
- IJ: Any highlights for reasons this did not previously get traction?
- 14:16:37 [Ian]
- smcgruer_[EST]: The three concerns cited previously on this topic:
- 14:16:41 [Ian]
- 1) Tracking
- 14:17:06 [Ian]
- ...our proposal helps on this by requiring "user activation" which is not originally required in Web Authentication.
- 14:17:23 [Ian]
- 2) Regulatory questions
- 14:18:08 [Ian]
- ...I think that usage is relevant here and so not inherently problematic.
- 14:18:46 [Ian]
- smcgruer_[EST]: There was also some confusion in the original WebAuthn conversation; the goal is here for origin A to create a credential for itself; not create a credential for another origin.
- 14:18:54 [Ian]
- ...I think Google's FIDO folks would be ok with this change.
- 14:19:07 [Ian]
- Rolf: This is different from cross-origin invocation with special bit, right?
- 14:19:10 [Ian]
- smcgruer_[EST]: Correct.
- 14:19:31 [Ian]
- Rolf: If I receive and assertion, can I observe that it was created in a cross-origin iframe?
- 14:19:43 [Ian]
- ...the existence of such information could help garner support.
- 14:19:54 [Ian]
- smcgruer_[EST]: I would be open to that.
- 14:20:16 [Ian]
- ...we need to think about whether there are privacy implications.
- 14:20:48 [Ian]
- smcgruer_[EST]: Also note that the caller knows that they are creating an assertion in an iframe.
- 14:21:02 [smcgruer_[EST]]
- s/in an iframe//
- 14:21:21 [Ian]
- Rolf: It's not clear you can disable invocation in an iframe easily.
- 14:21:37 [Ian]
- smcgruer_[EST]: There are headers you can load to stop it. It's the caller's javascript the decides where to call.
- 14:21:51 [Ian]
- Rolf: Be sure to tell people that they can disable something, and how to do so.
- 14:22:19 [Ian]
- smcgruer_[EST]: Good point. I can add to the proposal mention of headers and possibly adding topOrigin
- 14:22:39 [Ian]
- ACTION: smcgruer_[EST] to update the proposal to discussion of how to disable the functionality.
- 14:22:50 [JeanLuc]
- X-Frame-Options: DENY ?
- 14:23:03 [Ian]
- https://docs.google.com/document/d/1h6xgrp0Rwe9b3xs3RYgJ-3SJEwqjLP7jRtAc6DmBFbk/edit?pli=1
- 14:23:16 [smcgruer_[EST]]
- JeanLuc: I think that is correct, or use SAMEORIGIN
- 14:23:43 [Rolf]
- https://www.w3.org/TR/webauthn-3/#dom-collectedclientdata-crossorigin
- 14:23:45 [Ian]
- [We observe that there's a flag in WebAuthn that indicates iframe was cross-origin]
- 14:24:11 [Ian]
- smcgruer_[EST]: Jean-Luc, that may be it or another one like "same origin only"
- 14:24:53 [Ian]
- PROPOSAL: Adopt the Proposal to re-raise issue of cross-origin creation with the WebAuthn WG (after stephen's edits)
- 14:25:02 [Ian]
- Ian: +1
- 14:25:20 [Anne]
- +1
- 14:25:28 [JMGirard]
- yep +1
- 14:25:28 [Rolf]
- +1
- 14:25:35 [Gerhard]
- +1
- 14:25:38 [Steve_C]
- +1
- 14:25:43 [smcgruer_[EST]]
- +1 (do I count? ;))
- 14:25:45 [Ian]
- so RESOLVED
- 14:26:09 [Ian]
- Topic: TPAC check-in
- 14:26:34 [Ian]
- https://github.com/w3c/webpayments/wiki/Agenda-TPAC2022
- 14:28:23 [Ian]
- present+ Carey_Ferro
- 14:29:19 [careyf]
- careyf has joined #wpwg
- 14:30:17 [smcgruer_[EST]]
- Rolf: https://docs.google.com/document/d/1h6xgrp0Rwe9b3xs3RYgJ-3SJEwqjLP7jRtAc6DmBFbk/edit may be useful reading, it's my proposed plan for this
- 14:30:48 [smcgruer_[EST]]
- Rolf: It does include such an extension in the WebAuthn space which maps to the FIDO CTAP bit
- 14:31:21 [smcgruer_[EST]]
- Sorry, the above is said from Stephen to Rolf, for clarity
- 14:31:45 [Ian]
- Rolf: RP can ask the user in advance if they want to use cross-origin.
- 14:36:04 [Ian]
- -> https://www.w3.org/2022/09/TPAC/#registration Registration
- 14:36:46 [smcgruer_[EST]]
- q+
- 14:36:51 [Ian]
- ack smcgruer_[EST]
- 14:37:16 [Ian]
- https://www.w3.org/wiki/TPAC/2022/SessionIdeas
- 14:38:53 [Ian]
- Ian: Any suggestions for topics?
- 14:39:23 [Ian]
- https://docs.google.com/document/d/1Bxm7_gc-Wi7ZjWlgOMPbq3Kdv0L3lgvkkcVaQIFgPx8/edit#heading=h.dvz4zyoilau4
- 14:41:06 [careyf]
- Fun fact: there's another TPAC also happening at the same time in Vancouver as our W3C TPAC
- 14:41:33 [smcgruer_[EST]]
- And they're first when you google "TPAC Vancouver" ! :D
- 14:41:44 [smcgruer_[EST]]
- 'Third Party Advantage Conference'
- 14:42:37 [Ian]
- Topic: canMakePayments
- 14:42:41 [careyf]
- I saw that Stephen! lol
- 14:42:55 [Ian]
- (This relates to Payment Request)
- 14:42:58 [Ian]
- -> https://github.com/w3c/payment-handler/issues/401 Issue 401
- 14:43:05 [Ian]
- "Request for use cases: "canmakepayment" event"
- 14:43:40 [Ian]
- smcgruer_[EST]: We are looking at privacy topics generally (Sandbox) and this touches on all APIs, including PR API and PH API.
- 14:43:47 [Ian]
- ...we've published a list of issues
- 14:43:56 [Ian]
- -> https://github.com/rsolomakhin/webpayments/blob/gh-pages/privacy/issues/README.md
- 14:44:04 [Ian]
- ...we have some ideas for mitigations of these concerns
- 14:44:12 [Ian]
- ...we'll discuss more at TPAC
- 14:44:25 [Ian]
- ...canMakePayment (and equivalent in Android) carries a lot of information
- 14:44:46 [Ian]
- ...so we'd like to be sure we understand the use cases for this functionality so that we can properly mitigate the risks.
- 14:46:42 [Ian]
- Ian: Would be good at TPAC to hear more about Chrome [And Other] view of PR API future
- 14:46:48 [Ian]
- smcgruer_[EST]: Yes, let's chat
- 14:47:04 [Ian]
- Topic: AOB?
- 14:47:16 [Ian]
- Topic: Next meeting
- 14:47:16 [Ian]
- TPAC
- 14:47:30 [Ian]
- (No meeting 1 or 8 Sep)
- 14:47:49 [Ian]
- RRSAGENT, make minutes
- 14:47:49 [RRSAgent]
- I have made the request to generate https://www.w3.org/2022/08/18-wpwg-minutes.html Ian
- 14:47:53 [Ian]
- RRSAGENT, set logs public
- 15:00:50 [GregoireLeleux]
- GregoireLeleux has left #wpwg
- 15:01:53 [careyf]
- careyf has left #wpwg
- 15:01:57 [Steve_C]
- Steve_C has joined #wpwg
- 15:02:38 [Bastien]
- Bastien has left #wpwg
- 15:05:39 [Gerhard_]
- Gerhard_ has joined #wpwg