19:03:45 RRSAgent has joined #webauthn 19:03:49 logging to https://www.w3.org/2024/01/31-webauthn-irc 19:04:08 Meeting: WebAuthn Weekly WG Meeting 19:04:19 Chair: AGL 19:04:25 Scribe: steele 19:04:38 Topic: Pull Requests 19:05:01 https://github.com/w3c/webauthn/pull/2018 19:06:13 Anders: We've received negative feedback regarding not assuming that localhost is a secure context, this should change 19:06:31 There are pending approvals and comments, will let sit for a week before moving forward on this PR 19:06:40 https://github.com/w3c/webauthn/pull/2019 19:07:17 Anders: meant to supplement #2018, drafted an example of what would be allowed 19:07:28 AGL: I think this is reasonable to be merged in alongside #2018 19:07:34 https://github.com/w3c/webauthn/pull/2017 19:08:35 present+ Tim,Emil,Anders,Nick,Adam,Shane,DavidWaite,Khaled,Lachlan,James,DavidTurner 19:08:44 Emil: Mike Jones wished to review this issue 19:08:51 https://github.com/w3c/webauthn/pull/1954 19:09:47 David: I have some real world examples on this and will write up a response, plan to re-address this next week to the WG 19:09:55 https://github.com/w3c/webauthn/pull/1953 19:10:37 David: Wanted to sanity check the example I created, wanted inout by John Bradley, considering merging this sooner although happy to revisit next week alongside #1954 19:11:04 Emil: Fine with merging but would like to check the example. I'm fine with merging as we'e delayed quite a bit 19:11:32 David: let's plan to merge next week unless there's a push otherwise 19:12:28 There may be a delay on this due to FIDO Plenary next week which might cancel the WG meeting 19:12:42 present+ Nina 19:13:03 No one present to discuss https://github.com/w3c/webauthn/pull/1951 19:13:15 https://github.com/w3c/webauthn/pull/1926 19:14:12 Shane: no one present from Microsoft to discuss, might reach out to MSFT's Ackshay directly 19:14:40 Tim: Monty Wiseman from BeyondIdentity might be able to help with this 19:14:57 ACTION: Tim and/or DavidTurner to connect with Monty 19:15:13 Nina returns to discuss https://github.com/w3c/webauthn/pull/1951 19:15:37 Nina: the API shape seems fine although there will be a request for changes incoming 19:15:44 present+ JohnPascoe 19:16:11 TOPIC: Issues 19:16:22 https://github.com/w3c/webauthn/issues/2016 19:16:56 Shane: I don't see anything that necessarily requires a change here. 19:17:07 Emil: I have something in mind an am getting around to it 19:17:19 https://github.com/w3c/webauthn/issues/2010 19:18:21 Nina: we have some internal tests that exercise this behaviour. This would be a browser bug, not a functional issue 19:18:27 AGL to close with followup comment 19:18:35 https://github.com/w3c/webauthn/issues/1984 19:19:22 consensus that this is a real and we'll draft a PR to fix it 19:20:17 ACTION: Nina to read through 1984 (the pull request, not the dystopian novella) 19:20:37 https://github.com/w3c/webauthn/issues/1980 19:20:55 Action: Remind Arnar to follow up with this post-FIDO Plenary 19:21:10 https://github.com/w3c/webauthn/issues/1979 19:21:14 Tony to follow up 19:21:19 https://github.com/w3c/webauthn/issues/1976 19:21:47 Nick: I'll follow up on this 19:23:30 TOPIC: Issue Backlog Combing 19:23:35 https://github.com/w3c/webauthn/issues/1962 19:24:49 John: Spec-wise, we still don't spell out the behavior in the spec here, but we now provide an AAGUID and strip it out for hardware keys 19:25:11 AGL: so the spec change needed is "zero out the AAGUID in the case of non-platform authenticators?" 19:25:39 John, who would have a lot of additional work if he were to write said PR: yes 19:27:11 Shane: I think it's great that platform providers provide an AAGUID, but I don't know if it matters whethere it gets 0'd out or not. If I request att = none, and I got back an AAGUID == 000s, I wouldn't care, because I don't need both 19:27:46 AGL: The identity of the platform authenticator was a forgone conclusion, things are evolving that only the identity of the hardware key is a forgone conclusion 19:28:01 Shane: isn't it okay to say, if att = none, 0 it out? 19:28:10 present+ MatthewMiller 19:28:27 Matthew: we lose our ability to hint 19:29:58 Nick: I want to show an identifier 19:31:38 Tim: if you as an RP are making changes to an authenticator, then you're probably asking for attestation. What do we want to give guidance to do? Request direct? 19:32:22 Shane: If I really want an AAGUID i'll just request direct 19:32:32 Matthew: that adds additional friction 19:33:12 i.e. additional warning modal for xplatofrm 19:40:05 Discussion around attestation and identifying providers, hardware keys, and platforms 19:40:22 Discussion around prioritizing this value 19:40:49 ACTION: agl to write a pull request to discuss in 2 weeks 19:41:15 https://github.com/w3c/webauthn/issues/1917 19:41:50 Shane: i thought the decision was "if an RP requested enterprise, but the authenticator couldn't provide it, it would provide direct attestation" 19:42:20 discussion that this would be higher priority than the AAGUID work 19:42:29 https://github.com/w3c/webauthn/issues/1913 19:42:50 Emil: chrome and firefox people, please take note 19:43:25 This is a browser issue regarding CSS rendering? 19:44:52 Nina: could possibly ask Bikeshed maintainer about this 19:45:00 https://github.com/w3c/webauthn/issues/1895 19:45:28 We tagged this issue open and then removed the PR, discussion 19:45:58 Emil: my opinion is that this feature wouldn't be impressive enough to motivate developing it further. 19:47:19 https://github.com/w3c/webauthn/issues/1859 19:47:29 Matthew: I would like to discuss this in person at a face to face meeting 19:47:56 AGL: Tony might not be thrilled but we can discuss in two weeks 19:48:40 Discussion around April 19th IIW face to face 19:51:16 Straw polling for Identiverse vs IIW F2F 19:55:05 https://github.com/w3c/webauthn/issues/1854 19:55:16 Nina: Great idea that no one has the time to do because low value 19:55:41 Matthew: you could achieve this with more efficient usage of abort controller in the client 19:55:51 i.e. the browsers 19:57:44 AGL: does anyone wish to fight for this issue? 19:57:47 none 19:57:56 AGL closes issue 20:03:06 TOPIC: additional topics 20:03:10 No meeting next week 20:03:20 Zakim, list participants 20:03:20 As of this point the attendees have been Tim, Emil, Anders, Nick, Adam, Shane, DavidWaite, Khaled, Lachlan, James, DavidTurner, Nina, JohnPascoe, MatthewMiller 20:03:28 RRSAgent, make logs public 20:03:33 RRSAgent, generate minutes 20:03:34 I have made the request to generate https://www.w3.org/2024/01/31-webauthn-minutes.html steele 23:09:54 steele has joined #webauthn