public-webauthn@w3.org from August 2018 by subject

08/01/2018 W3C Web Authentication WG Meeting Agenda

08/08/2018 W3C Web Authentication WG Meeting Agenda

08/15/2018 W3C Web Authentication WG Meeting Agenda

08/22/2018 W3C Web Authentication WG Meeting Agenda

08/29/2018 W3C Web Authentication WG Meeting Agenda

[w3c/webauthn]

[w3c/webauthn] 035ea7: Add privacy considerations about UV, PII and User ...

[w3c/webauthn] 0957b1: Built by Travis-CI: 83dc21c8d4510d1dc9c7806c43ec5e...

[w3c/webauthn] 0cbff5: change JeffH's affilitation (#1047)

[w3c/webauthn] 0d515a: Cut some unnecessary text from the new first parag...

[w3c/webauthn] 10d754: Built by Travis-CI: bd9bc3ee399eab740563bebfe7927d...

[w3c/webauthn] 1d635f: Add bikeshed update to bikeshed Dockerfile

[w3c/webauthn] 1fe735: Address @equalsJeffH's review comments

[w3c/webauthn] 24aed4: fix #1015 FAR should be FRR (#1016)

[w3c/webauthn] 2747c8: Built by Travis-CI: bdc64c4dc0c7891c28e00974edc439...

[w3c/webauthn] 2d1bdc: fix grammar

[w3c/webauthn] 2d80fd: Built by Travis-CI: ee3cf178256559fddb3b0d5880f6bd...

[w3c/webauthn] 2f6812: Add some links to [=managing authenticator=]

[w3c/webauthn] 31433d: Built by Travis-CI: a057572c2ca6211ec5b9d62a73df0e...

[w3c/webauthn] 3357f0: Address @selfissued's review comments

[w3c/webauthn] 393469: fix #1012 determine attsCredData length

[w3c/webauthn] 3b5be3: Built by Travis-CI: ee3cf178256559fddb3b0d5880f6bd...

[w3c/webauthn] 3b7d65: Built by Travis-CI: 653203d077584e5def14a367da5538...

[w3c/webauthn] 45cfa9: Define "bound" for credentials

[w3c/webauthn] 488ff0: add link to 2nd CR version

[w3c/webauthn] 494d57: Define "bound" for credentials and use the term "s...

[w3c/webauthn] 5680e5: Built by Travis-CI: d74f56be8e38abdda425dfc586979f...

[w3c/webauthn] 58b28f: Built by Travis-CI: bdc64c4dc0c7891c28e00974edc439...

[w3c/webauthn] 5c33b6: Add Username Enumeration section to privacy consid...

[w3c/webauthn] 63ccd4: Address @equalsJeffH's review comments

[w3c/webauthn] 653203: Clarify that SafetyNet response uses base64url (#1...

[w3c/webauthn] 66327d: [Spelling] Added "be"

[w3c/webauthn] 6ce182: Built by Travis-CI: 24aed4e42440f0954491a374d7d82e...

[w3c/webauthn] 6f2f11: Renamed timeoutSeconds to timeoutMilliseconds as s...

[w3c/webauthn] 71b587: Add <dfn> to Bound Credential title

[w3c/webauthn] 7204fb: Built by Travis-CI: bd9bc3ee399eab740563bebfe7927d...

[w3c/webauthn] 85ddcb: Built by Travis-CI: 494d577efc4a6915df29ce4584d92f...

[w3c/webauthn] 8ef8a7: Expand and link RP to Relying Party

[w3c/webauthn] 91c306: Use final name for "serialize JSON to bytes" (#102...

[w3c/webauthn] 929ca4: Built by Travis-CI: d74f56be8e38abdda425dfc586979f...

[w3c/webauthn] 953050: change JeffH's affilitation

[w3c/webauthn] 964aa6: fix #1012 determine Attested Credential Data lengt...

[w3c/webauthn] 9a99d4: Fix typo

[w3c/webauthn] 9f24e3: Built by Travis-CI: 0e4ed089d190ff192af46962408514...

[w3c/webauthn] a37f05: Built by Travis-CI: 91c30688fba36b57fea7db9cde9bf6...

[w3c/webauthn] a58294: Built by Travis-CI: 494d577efc4a6915df29ce4584d92f...

[w3c/webauthn] a7276f: fix BS's bs objections to my source formatting...

[w3c/webauthn] acb0f6: fix #712 JSON-serialized client data is wrong

[w3c/webauthn] b6a48d: Note that the `appid` extension changes RP ID hash

[w3c/webauthn] b91fdf: Built by Travis-CI: 035ea799bf682a29ccba0f7f0d4b89...

[w3c/webauthn] bd9bc3: Add note about actual implementations of appid. (#...

[w3c/webauthn] bdddc1: Built by Travis-CI: 964aa6c1eceaf922816573a639dec6...

[w3c/webauthn] bee5bc: Built by Travis-CI: 0e4ed089d190ff192af46962408514...

[w3c/webauthn] c8f516: removed duplicate

[w3c/webauthn] cd95d5: fix typo, thx apowers313 :)

[w3c/webauthn] d85bfb: Make <dfn>Bound Credential</dfn> the primary defin...

[w3c/webauthn] da463e: Add a missing "be"

[w3c/webauthn] dbdf61: Address more review comments

[w3c/webauthn] ddd641: Built by Travis-CI: 24aed4e42440f0954491a374d7d82e...

[w3c/webauthn] e00504: Built by Travis-CI: a057572c2ca6211ec5b9d62a73df0e...

[w3c/webauthn] e3bb12: Built by Travis-CI: 964aa6c1eceaf922816573a639dec6...

[w3c/webauthn] eb27b2: Built by Travis-CI: 83dc21c8d4510d1dc9c7806c43ec5e...

[w3c/webauthn] eb3990: Built by Travis-CI: 91c30688fba36b57fea7db9cde9bf6...

[w3c/webauthn] efc000: Add privacy considerations about UV, PII and User ...

[w3c/webauthn] f1f41a: Link [RPS]

[w3c/webauthn] f2c67a: Built by Travis-CI: 653203d077584e5def14a367da5538...

[w3c/webauthn] f75884: Built by Travis-CI: 035ea799bf682a29ccba0f7f0d4b89...

[w3c/webauthn] fb12e8: Built by Travis-CI: 0cbff5300493714a35cd9b90516338...

[webauthn] [Spelling] Added missing "be"

[webauthn] `authData` in attestation vs `authenticatorData` in assertion naming?

[webauthn] `publicKey` member name in `CredentialCreationRequestOptions` should be `"public-key"`, or vice-versa?

[webauthn] add 'spec roadmap' section

[webauthn] Add bikeshed update to bikeshed Dockerfile

[webauthn] Add note about actual implementations of appid.

[webauthn] Add privacy considerations about UV, PII and User Handle

[webauthn] Add Username Enumeration section to privacy considerations

[webauthn] address needs of various webauthn spec audiences

[webauthn] Adopt consistent case for section headings

[webauthn] Ambiguous instructions in Android Key Attestation Statement Format verification procedure

[webauthn] Ambiguous/wrong instructions in Android Key Attestation Statement Format verification procedure

[webauthn] Android-key attestation format should include guidance on checks for timestampMs in the jws payload

[webauthn] appid extension output is inaccurate in some corner cases

[webauthn] AppID extension: protocol version number?

[webauthn] Authenticator selection extension needs to define snapshotting behavior

[webauthn] Bad instructions in Android SafetyNet attestation validation steps

[webauthn] bikeshed now catching existing lint in master->index.bs

[webauthn] choose consistent section id prefix

[webauthn] Clarification of valid rpIdHash value requested in section 7 when using AppID extension

[webauthn] Clarify that SafetyNet response uses base64url

[webauthn] Closed Pull Request: Include an AuthenticatorTransport when creating a new credential.

[webauthn] cognitive-accessibility consideration

[webauthn] Credential counter must initialise as 1

[webauthn] Define "bound" for credentials and use the term "scoped" where appropriate

[webauthn] Determining length of `attestedCredentialData` when authenticator extensions present.

[webauthn] Divide Security/Privacy Considerations into subsections by audience?

[webauthn] Either UV or UP should be enough

[webauthn] Eliminate duplicate terminology

[webauthn] Ensure hard-coded step references in RP ops are correct

[webauthn] export definitions?

[webauthn] FIDO U2F supports Attestation CA (AttCA)?

[webauthn] fix #1012 determine Attested Credential Data length

[webauthn] fix #24: add reg & authn flow diagrams

[webauthn] fix #712 JSON-serialized client data is wrong

[webauthn] Fix some minor editorial issues

[webauthn] Fix typo

[webauthn] Include an AuthenticatorTransport when creating a new credential.

[webauthn] Indicate resident key credential "preferred" during registration and find out what the authenticator offered

[webauthn] Merged Pull Request: [Spelling] Added missing "be"

[webauthn] Merged Pull Request: Add bikeshed update to bikeshed Dockerfile

[webauthn] Merged Pull Request: add link to 2nd CR version

[webauthn] Merged Pull Request: Add note about actual implementations of appid.

[webauthn] Merged Pull Request: Add privacy considerations about UV, PII and User Handle

[webauthn] Merged Pull Request: change JeffH's affilitation

[webauthn] Merged Pull Request: Clarify that SafetyNet response uses base64url

[webauthn] Merged Pull Request: Define "bound" for credentials and use the term "scoped" where appropriate

[webauthn] Merged Pull Request: fix #1012 determine Attested Credential Data length

[webauthn] Merged Pull Request: fix #1015 FAR should be FRR

[webauthn] Merged Pull Request: fix #712 JSON-serialized client data is wrong

[webauthn] Merged Pull Request: Fix some minor editorial issues

[webauthn] Merged Pull Request: Note that the appid extension changes RP ID hash

[webauthn] Merged Pull Request: PR 1031: Bound Credential <dfn>

[webauthn] Merged Pull Request: Use final name for "serialize JSON to bytes"

[webauthn] Mobile support

[webauthn] new commits pushed by agl

[webauthn] new commits pushed by akshayku

[webauthn] new commits pushed by emlun

[webauthn] new commits pushed by equalsJeffH

[webauthn] new commits pushed by samuelweiler

[webauthn] new commits pushed by selfissued

[webauthn] new commits pushed by WebAuthnBot

[webauthn] None hardware option - as for ssl client certificates

[webauthn] None hardware/device option - as for ssl client certificates

[webauthn] Note that the appid extension changes RP ID hash

[webauthn] NULL or DOMException

[webauthn] Partial dictionaries for extension outputs may be incorrect use of WebIDL

[webauthn] PR 1031: Bound Credential <dfn>

[webauthn] Propose SafetyNet as an extension

[webauthn] Provide transport information during registration.

[webauthn] providing info about authenticator availability / attachments

[webauthn] Public key rules for "packed" attestation type

[webauthn] Pull Request: [Spelling] Added missing "be"

[webauthn] Pull Request: Add bikeshed update to bikeshed Dockerfile

[webauthn] Pull Request: add link to 2nd CR version

[webauthn] Pull Request: Add note about actual implementations of appid.

[webauthn] Pull Request: Add privacy considerations about UV, PII and User Handle

[webauthn] Pull Request: Add Username Enumeration section to privacy considerations

[webauthn] Pull Request: change JeffH's affilitation

[webauthn] Pull Request: Clarify that SafetyNet response uses base64url

[webauthn] Pull Request: Define "bound" for credentials and use the term "scoped" where appropriate

[webauthn] Pull Request: fix #1012 determine Attested Credential Data length

[webauthn] Pull Request: Fix typo

[webauthn] Pull Request: Note that the appid extension changes RP ID hash

[webauthn] Pull Request: PR 1031: Bound Credential <dfn>

[webauthn] Pull Request: Provide transport information during registration.

[webauthn] Pull Request: Use final name for "serialize JSON to bytes"

[webauthn] SafetyNet response as an extension

[webauthn] Second CR not referenced from https://w3c.github.io/webauthn/

[webauthn] Security threat: Username enumeration

[webauthn] Tighten security scope by port

[webauthn] undefined terms and terms we really ought to define

[webauthn] Unspecified CBOR encoding of integer numbers above a threshold

[webauthn] Use final name for "serialize JSON to bytes"

[webauthn] User agent / key management [authenticator] interoperability requirements?

[webauthn] Using a smart phone as an authenticator with WebAuthn

Article: Security Concerns Surrounding WebAuthn

Call for Exclusions: Web Authentication: An API for accessing Public Key Credentials Level 1

Closed: [webauthn] `authData` in attestation vs `authenticatorData` in assertion naming?

Closed: [webauthn] Android-key attestation format should include guidance on checks for timestampMs in the jws payload

Closed: [webauthn] AppID extension: protocol version number?

Closed: [webauthn] Bad instructions in Android SafetyNet attestation validation steps

Closed: [webauthn] bikeshed now catching existing lint in master->index.bs

Closed: [webauthn] Clarification of valid rpIdHash value requested in section 7 when using AppID extension

Closed: [webauthn] Credential counter must initialise as 1

Closed: [webauthn] Determining length of `attestedCredentialData` when authenticator extensions present.

Closed: [webauthn] Either UV or UP should be enough

Closed: [webauthn] JSON-serialized client data is wrong

Closed: [webauthn] Minor typo - FAR should be FRR

Closed: [webauthn] Minor typo in Android Key Attestation Format

Closed: [webauthn] None hardware/device option - as for ssl client certificates

Closed: [webauthn] Partial dictionaries for extension outputs may be incorrect use of WebIDL

Closed: [webauthn] Privacy Considerations should describe risks of storing userID/displayName in "second-factor" authenticators

Closed: [webauthn] providing info about authenticator availability / attachments

Closed: [webauthn] Public key rules for "packed" attestation type

Closed: [webauthn] Second CR not referenced from https://w3c.github.io/webauthn/

Closed: [webauthn] Tighten security scope by port

Closed: [webauthn] Using a smart phone as an authenticator with WebAuthn

Summit on Recovering from Device Loss in WebAuthn

Timeline bounds for PR/Rec

webauthn forces people to buy hardware

Last message date: Thursday, 30 August 2018 22:56:43 UTC