- From: Joe Steele <steele@adobe.com>
- Date: Tue, 16 Jul 2013 09:13:47 -0700
- To: "public-html-media@w3.org" <public-html-media@w3.org>
- Message-ID: <F6A309FB-0573-43D6-966C-D764818C5EBD@adobe.com>
http://www.w3.org/2013/07/16-html-media-minutes.html Joe Steele ________________________________ [http://www.w3.org/Icons/w3c_home]<http://www.w3.org/> HTML Media Task Force Teleconference 16 Jul 2013 Agenda<http://lists.w3.org/Archives/Public/public-html-media/2013Jul/0010.html> See also: IRC log<http://www.w3.org/2013/07/16-html-media-irc> Attendees Present glenn, markw, +1.760.533.aaaa, joesteele, +44.303.040.aabb, davide, paulc, pladd, +1.212.512.aacc, [Microsoft], adrianba, JoeHallCDT, ReimundoGarcia, johnsim, +1.425.202.aadd, ddorwin, pal Regrets Chair paulc Scribe joesteele Contents * Topics<http://www.w3.org/2013/07/16-html-media-minutes.html#agenda> * Role Call<http://www.w3.org/2013/07/16-html-media-minutes.html#item01> * Previous Minutes<http://www.w3.org/2013/07/16-html-media-minutes.html#item02> * Review actions and issues<http://www.w3.org/2013/07/16-html-media-minutes.html#item03> * EME status & bugs<http://www.w3.org/2013/07/16-html-media-minutes.html#item04> * outstanding bugs<http://www.w3.org/2013/07/16-html-media-minutes.html#item05> * Bug 21855 - Avoid network traffic and duplicate sessions for the same key(s)<http://www.w3.org/2013/07/16-html-media-minutes.html#item06> * Bug 21854 - Define MediaKeySession life cycle states and/or events<http://www.w3.org/2013/07/16-html-media-minutes.html#item07> * ACTION-24: Resolve 17203 independent from 17199 (Adrian)<http://www.w3.org/2013/07/16-html-media-minutes.html#item09> * ACTION-25: And John S to work on corner cases for bug 17673 (David)<http://www.w3.org/2013/07/16-html-media-minutes.html#item10> * ACTION-26: Implement bug 19096 in the editor's draft (Adrian)<http://www.w3.org/2013/07/16-html-media-minutes.html#item11> * ACTION-27: Add comments to bug 17750 summarising the recent discussion of close (Adrian)<http://www.w3.org/2013/07/16-html-media-minutes.html#item12> * Bug 18515 - Provide more details on behavior of the media element when the key for an encrypted block is not available<http://www.w3.org/2013/07/16-html-media-minutes.html#item13> * Bug 21869 - Need clarity on stored keys for CDMs<http://www.w3.org/2013/07/16-html-media-minutes.html#item14> * Summary of Action Items<http://www.w3.org/2013/07/16-html-media-minutes.html#ActionSummary> ________________________________ <trackbot> Date: 16 July 2013 <paulc> zakim., what is the code? 63342 <scribe> Scribe: joesteele <paulc> Agenda: http://lists.w3.org/Archives/Public/public-html-media/2013Jul/0010.html Role Call Previous Minutes <paulc> http://www.w3.org/2013/07/02-html-media-minutes.html Review actions and issues <paulc> ISSUE-1? <trackbot> ISSUE-1 -- Consider moving the Clear Key definition into a separate specification -- raised <trackbot> http://www.w3.org/html/wg/media/track/issues/1 paulc: tracking for now EME status & bugs paulc: looked last night and saw updated on July 2nd <paulc> Editor's draft: http://dvcs.w3.org/hg/html-media/raw-file/tip/encrypted-media/encrypted-media.html paulc: any changes since then? adrianba: changed this morning as usual outstanding bugs paulc: only 15 this morning <paulc> http://tinyurl.com/7tfambo Bug 21855 - Avoid network traffic and duplicate sessions for the same key(s) https://www.w3.org/Bugs/Public/show_bug.cgi?id=21855#c5 paulc: wanted people to look at comment #5 ... did not see any updates as of last night ... was a long weekend maybe no body got to it adrianba: this is dependent on the next one 21854 ... we are also waiting for feedback on this one ... couple of meetings since the proposal -- hoping to close this soon ... assigned to me but can't do any action on it yet Bug 21854 - Define MediaKeySession life cycle states and/or events https://www.w3.org/Bugs/Public/show_bug.cgi?id=21854#c9 paulc: we asked David to look, minutes say he volunteered markw: still waiting for internal feedback ddorwin: should be a transition from READY to ERROR -- question to the group ... not ready for feedback yet ... will update next time paulc: at next mtg will reverse the order adrianba: comment on Davids questions ... not sure what situation would cause this to happen ... no objection to happening ... would most likely signal an error against the element, if you are in READY should be no activity that would lead to an ERROR markw: could imagine output protection could fail <adrianba> Mark's comment -> https://www.w3.org/Bugs/Public/show_bug.cgi?id=21854#c10 markw: we should have a CLOSED state for the key release messsages adrianba: lump that comment in with the general design need for secure key release <ddorwin> +1 adrianba: haven't resolved how we manage the exchange during the winddown of the browser joesteele: could see a transition from READY to ERROR from output protection as David said or because of an invalid key encountered during key rotation markw: I think the status on the secure key release is that it is not required to be mandatory that the browser or window is closing ... discussion is about the mechanism to store the reporting of these messages ... will update the bug with relevant details ddorwin: saving the data can be just as complicated as sending the actual key release message ... wanted to make sure I understand the event usage so all on the same page ... <will paste this in a second> <ddorwin> • Event usage: <ddorwin> ◦ It seems that an application would wait for a keymessage and keyready event. <ddorwin> ◦ If keymessage is received, do a normal license exchange. <ddorwin> ◦ If keyready is received, there is nothing more to do. <ddorwin> ◦ If a normal license exchange occurred, the subsequent keyready could be ignored (similar to keyadded today). adrianba: it depends on if the application wants to use keyready to do something ... e.g. present a message to the user ... another is the solution for 21875 - if you have 2 separate sessions where initdata is mapped to the same key - could use that ... to move on paulc: outstanding on David -- more data for you -- will be at the top of the next agenda ... any further discussion? ACTION-24: Resolve 17203 independent from 17199 (Adrian) ACTION-24? <trackbot> ACTION-24 -- Adrian Bateman to resolve 17203 independent from 17199 -- due 2013-07-09 -- PENDINGREVIEW <trackbot> http://www.w3.org/html/wg/media/track/actions/24 adrianba: change I made was that in the introductions <finding link now> ... which was to the section 1.2.3 ... on sessionID <adrianba> https://dvcs.w3.org/hg/html-media/raw-file/tip/encrypted-media/encrypted-media.html#session-id adrianba: change I made was remove the language about sessionID being optional ... and removed old language from previous non-object oriented design ... request for others to review for old language <ddorwin> Changes look good. (I didn't look for other references to optional.) paulc: so this is closed? <adrianba> close ACTION-24 <trackbot> Closed ACTION-24 Resolve 17203 independent from 17199. adrianba: pending review paulc: reopen this bug if you have concerns ACTION-25: And John S to work on corner cases for bug 17673 (David) ACTION-25? <trackbot> ACTION-25 -- David Dorwin to and John S to work on corner cases for bug 17673 -- due 2013-07-09 -- OPEN <trackbot> http://www.w3.org/html/wg/media/track/actions/25 ddorwin: did not get a chance to summarize my notes or revisit prior bug, should have notes this week <paulc> ACTION-25 due July 19 <trackbot> Set ACTION-25 And John S to work on corner cases for bug 17673 due date to 2013-07-19. ACTION-26: Implement bug 19096 in the editor's draft (Adrian) ACTION-26? <trackbot> ACTION-26 -- Adrian Bateman to implement bug 19096 in the editor's draft -- due 2013-07-09 -- PENDINGREVIEW <trackbot> http://www.w3.org/html/wg/media/track/actions/26 adrianba: this was straightforward request to add the new type attributes to the media keyneeded event <adrianba> https://dvcs.w3.org/hg/html-media/raw-file/tip/encrypted-media/encrypted-media.html#events adrianba: added the type attribute and then noted that the format of the initdata would depend on that type ... should be self-explanatory but let me know if you want changes <ddorwin> Changes look good. <adrianba> close ACTION-26 <trackbot> Closed ACTION-26 Implement bug 19096 in the editor's draft. ACTION-27: Add comments to bug 17750 summarising the recent discussion of close (Adrian) ACTION-27? <trackbot> ACTION-27 -- Adrian Bateman to add comments to bug 17750 summarising the recent discussion of close -- due 2013-07-09 -- PENDINGREVIEW <trackbot> http://www.w3.org/html/wg/media/track/actions/27 <adrianba> My comments -> https://www.w3.org/Bugs/Public/show_bug.cgi?id=17750#c5 adrianba: added the comments paulc: should we look now? adrianba: summarized the comments I made around close in previous meetings ... essentially said there is two parts to close ... one is key release ... second is effect on a session ... don't think we need close, UNLESS application has a better idea of key life cycle than the CDM ... no specific guarantees markw: haven't reviewed but would like to do so ... think there are cases where the app knows better what the lifecycle is -- need to check with security folks joesteele: so only need close if the application can know better than the CDM what the life cycle is? adrianba: yes -- not sure this is the case ... only needed if the JS app could provide additional context for the CDM -- the app can provide the hint ... if the CDM is fully capable of managing the keys, then don't need this joesteele: need some more time to think about this as well markw: agree with Adrians rationale, we need a clear example of when the JS app would know better so we have a common understanding ... would expect that if the media element is destroyed, that could cause the removal of all keys ... might depend on the type of the CDM specific key ... but need to check into the this case ddorwin: reading the bug again, most of the discussion is on the close method ... but also the issue of clearing the keys attribute ... need to figure out what the corner cases or end-of-lifes cases for media sourcesgoing away ... maybe src changes should just clear the media keys paulc: so several people are going to review and add comments, we will pick up at next mtg <adrianba> close ACTION-27 <trackbot> Closed ACTION-27 Add comments to bug 17750 summarising the recent discussion of close. Bug 18515 - Provide more details on behavior of the media element when the key for an encrypted block is not available https://www.w3.org/Bugs/Public/show_bug.cgi?id=18515 paulc: was there an attempt to have an action here? was discussed at previous mtg ... adrian any progress on this? adrianba: this was the group -- not me paulc: should we spend time on this now? adrianba: not sure paulc: move on then Bug 21869 - Need clarity on stored keys for CDMs https://www.w3.org/Bugs/Public/show_bug.cgi?id=21869#c8 paulc: only bug updated without an existing ACTION <adrianba> joesteele: we had a bunch of discussion on this - when we discussed whether CDM should have storage there was a difference of opinion <adrianba> ... seemed like david took the position that the JS application should be involved in any storage <adrianba> ... sounded like the proposal was that this was an active thing - no storage without the JS being involved <adrianba> ... i'm arguing for the opposite <adrianba> ... data should be treated like cookie data <adrianba> ... app can deny storage of data but if it doesn't intervene the data will be stored <adrianba> ... will put CDMs on the same footing as servers <johnsim> +q <adrianba> ... would that be acceptable - proposed an API in the bug johnsim: have a concern about this ... up till now the CDM behavior has been isolated from the application ... typical for key stored or not stored depending on the license server being talked to ... we seem to be violating the distinction between what the app is doing and what the CDM is doing ... would need a detailed review of this with security team ... should be between the CDM and the licens eserver adrianba: would like to push a little harder on what John just said ... not obvious what we mean by storage here ... should be no barrier to what CDM should do ... is storage in memory storage? on disk storage? always on makes a difference? ... not sure what we mean by storage here <ddorwin> The CDM does decryption, etc. It is not intended to be like a local server. There are numerous storage APIs with permission handlers, and we should not add another. If an application wants to persist data to disk, it probably already has a lot of key system knowledge. adrianba: don't think there should be constraints here ddorwin: CDM has specifically a narrow purpose ... should reuse existing services if this is needed ... main point seems to be to avoid key system specific information, but that will exist any way adrianba: only point that I disagree is that the spec does not need to handle this, not trying to define a generic storage mechanism ... purely for the CDM to decide markw: what kinds of requirements that folks have that could not be met by storing the key message and response <Zakim> ddorwin, you wanted to ask What's not normal for CDMs? markw: could have reusable licenses if you want to ddorwin: joe said something that was not normal for CDMs? can restate? <adrianba> markw: the response might be encoded with a time senstive key johnsim: what is the requirement that is not being met? <adrianba> joesteele: to david's question - there are a bunch of CDMs that require storage (some named examples ???) <adrianba> ... that's what i meant by normal as part of their usual operation <adrianba> paulc: even if they require storage, given that the CDM is opaque do we have to say anything <adrianba> joesteele: i could agree that this might be something that doesn't need to be described <adrianba> ... but after discussing with some browser vendors <adrianba> ... if there is not a specific requirement in the spec to allow storage of data, it will not be allowed <adrianba> johnsim: so you mean the CDM is enclosed in the browser and doesn't have access to anything unless the browser allows it <adrianba> joesteele: yes, and in this model we would be blocked <adrianba> ... given the discussion about CDM having unfettered access to the system <adrianba> ... one answer is to restrict what CDMs can do <adrianba> ... I don't mind sandboxes but a number of CDMs cannot function without storage markw: do think that CDMs will need to have access to storage - could be limited and browser mediated ... particularly for key release storage ... question was really what they need to store <adrianba> joesteele: for our DRM we have a unique key to be downloaded to be functional at all <adrianba> ... it is possible to function if you download every time <adrianba> ... but that would be a multi-second delay for every attempt to play <adrianba> ... because of not storing this key <adrianba> ... for secure key release we also need to store this information <adrianba> ... as state information and not input/output data <adrianba> ... the secondary problem of storing license could potentially be stored as key request/key response <adrianba> ... but this is a roundabout way of storing the data paulc: think this has been useful -- better understanding of the use case Joe is talking about <paulc> https://www.w3.org/Bugs/Public/show_bug.cgi?id=21869#c8 thanks for scribing Adrian! paulc: not time for another bug ... if we come to the next mtg with these actions and bugs done, would be helpful to have editors nominate some additional bugs ... next meeting is July 30th ... if someone could start the discussion on some set of bugs for the next meeting, that would be good as well ... given lots of outstanding actions, can't set the bar that high ... but would like a set of bugs for the next meeting ... thanks to the scribes ... bye all s/coul dhave/could have/ Summary of Action Items [End of minutes] ________________________________ Minutes formatted by David Booth's scribe.perl<http://dev.w3.org/cvsweb/~checkout~/2002/scribe/scribedoc.htm> version 1.138 (CVS log<http://dev.w3.org/cvsweb/2002/scribe/>) $Date: 2013-07-16 16:10:17 $ ________________________________
Received on Tuesday, 16 July 2013 16:14:16 UTC