- From: Kazuyuki Ashimura <ashimura@w3.org>
- Date: Mon, 30 Apr 2018 23:28:32 +0900
- To: Public Web of Things IG <public-wot-ig@w3.org>, public-wot-wg@w3.org
available at:
https://www.w3.org/2018/04/23-wot-sec-minutes.html
also as text below.
Thanks,
Kazuyuki
---
[1]W3C
[1] http://www.w3.org/
- DRAFT -
WoT Security
23 Apr 2018
[2]Agenda
[2] https://www.w3.org/WoT/IG/wiki/IG_Security_WebConf#Agenda
Attendees
Present
Kaz_Ashimura, Michael_McCool, Elena_Reshetova,
Michael_Koster, Barry_Leiba, Michael_Lagally
Regrets
Kazuaki_Nimura
Chair
McCool
Scribe
kaz
Contents
* [3]Topics
1. [4]prev minutes
2. [5]PR 89
3. [6]PR 88
4. [7]next
* [8]Summary of Action Items
* [9]Summary of Resolutions
__________________________________________________________
[10]scripting issue 111
[10] https://github.com/w3c/wot-scripting-api/issues/111
[11]prev minutes
[11] https://www.w3.org/2018/04/16-wot-sec-minutes.html
prev minutes
McCool: should add action items
... issue 69 for elena and issue 68 as well
... issue 70 for mccool
... terminology for elena/koster
... old action for mccool to talk about testing validation also
... other than those actions, would accept the minutes
(no objections)
PR 89
[12]pullrequest 89
[12] https://github.com/w3c/wot-security/pull/89
Elena: better to see the rendered version?
[13]Rawgit version
[13] https://rawgit.com/ereshetova/wot-security/8cda09d2367e657ecf0f4b3993b1396592dd78e7/index.html
Elena: section 6.3
... wanted to updated based on the discussion during f2f
... didn't remove the figures
... added a new section here
... proxy case
... we can discuss the terminology
... describing the scenario with client via local/remote
gateways
... currently using "remote proxy servient" and "local proxy
servient" as the terms
McCool: interesting
... non-WoT connection?
... reverse proxy and forward proxy
... very similar to AWS with device shadows
... slightly different
... forwarding messages not creating shadow
... similar but different
... would call this "split proxy"
Kaz: sounds reasonable but we should ask Fujitsu/Panasonic for
opinions
McCool: right
... note that quite similar to AWS's shadow proxy
... similar pattern
... the difference is that the state is maintained by the local
proxy
Elena: should we remove "servient" from "remote/local proxy
servents"?
McCool: either of them could be a servient or a client
... different from HTTP proxy
... which is one-directional
... this is not wrong
... need to clarify entire patterns
... tunnel pattern, HTTP proxy pattern, etc.
Elena: the diagrams look pretty much similar
McCool: shadow pattern
... Koster, do you agree?
Koster: not sure if that requires local/remote proxies
McCool: the local proxy here is optional
Kaz: would agree
... the pair of "remote proxy" and "local proxy" is a mechanism
for tunneling/firewalling
McCool: we have this pair to hide the information
... pretty hard to handle NAT traversal itself
Elena: only difference would tunneling is...
McCool: tunneling doesn't know anything about WoT
Elena: direct communication
McCool: correct
... so local devices are unaware of the Internet side
... but it works fine
... if you intercept all the possible interaction using proxy
... there are pros/cons with proxy approach and tunnel approach
... we should create another PR for tunneling
Elena: yes
McCool: highly recommended not to use powerpoint for the
diagram
... SVG tool would be better
... could reopen issues/pullrequests for the WoT Architecture
as well
Elena: and then 6.4 Single-Tenant
... interaction ladder diagram and corresponding TD
... do we have definition?
... how the syntax looks like?
McCool: what you have is consistent with my syntax
... main outcome so far
... this is kind of lazy authentication
... there is an issue with Scripting API's exposing
... reasonable to have something for security configuration
... maybe assignment to a number of scripts
... have to look into the details of the script
Elena: you don't know the detail
... what syntax is right
... what kind of keywords to have
McCool: this (TD vs sequence) itself is not incorrect
Elena: would see actual syntax
McCool: have to review the syntax
... your security potion is consistent with my proposal
... I'll do one more review
Elena: would be great if you could a figure for tunneling
McCool: ok
... let's move one
PR 88
[14]pullrequest 88
[14] https://github.com/w3c/wot-security/pull/88
McCool: security metadata
... previous proposal presented to the TD TF last Friday
... read through authentication schemes
[15]rendered version
[15] https://github.com/mmccool/wot-security/blob/c4167cea9a5d21f14e96be7da6a2877ac34ce079/wot-security-metadata.md
McCool: goes through the TD Example
... this example has many definitions
... did some substitution
... had security for map
... changed to this
... no security definition
... just have [[ security: "basicConfig",]]
... equivalent with what we currently have
... that is my modified proposal
... you can have name definition, etc.
... pretty big changes from syntax viewpoint
... the other thing
... added digest
... under "Detailed Specifications of Configurations"
... "Digest Authentication" added
... under Algorithm
... MD5 hashing is not good but used for digest
... Obsolete and insecure ciphersuites are be supported for
compatibility with older services but SHOULD be flagged with
warnings by a validation system.
... also the case
... a couple of things about validation
... added "digest" to "Protocol-Specific Notes" as well
... also updated the References
... e.g.,
[16]https://www.iana.org/assignments/http-authschemes/http-auth
schemes.xhtml
... questions?
... alternate syntax?
... need further explanation?
... can merge this PR so that people can see it
[16] https://www.iana.org/assignments/http-authschemes/http-authschemes.xhtml
Elena: this one should be merged
... hard to track the changes...
McCool: time to merge this
... don't be impacted by the change with JSON-LD 1.1
... you could leave out the global defaults
... a couple of features with pre-processing
... but can leave them out
... Koster, attended the TD call on Friday?
Koster: yes
[17]TD minutes - April 20
[17] https://www.w3.org/2018/04/20-wot-td-minutes.html
Koster: security notation separate from JSON-LD
... not built-in
... but would see examples
McCool: shows "SecurityDefinitions"
"securityDefinitions": {
"basicConfig": {
"scheme": "basic"
},
"ocfConfig": {
"scheme": "ocf"
},
"apikeyConfig": {
"scheme": "apikey",
"in": "header"
}
},
]]
McCool: these modeling to be substituted in
... if we don't mention security at all, security would appear
by default
... or empty array
... 2 level of substitution
... macro level
... or single substitution
... let me clean up the proposal and check in
... maybe could do some prototyping
... the other question
... need to write done some requirement
... to make the definition not redundant
... having a global default would be nice
... the only question might be whether it would be complicated
or not
Koster: interrupt interaction
... API keys as part of the form
McCool: another good question
... what is the purpose of the metadata
... how that would help the user
... in the case of an IoT device, there might not be a user
... you have to provide information beforehand
... the other general question
... issue tracker
... what is the purpose of metadata
... instance vs type information
... security information is provided as instance information
... kind of redundant
... what we hav here is
... what would be protocol-independent information?
... particularly, TD guys would nail done the security
definition
... in particular, for digest
... there is encoding for digesting
... boils down to what kind of metadata is needed
... might forgot something but should be able to get 90% of
what to do
... need to think about all the different parameters and what
is needed
... this would be a good start
... so OK with merging this PR for security metadata proposal.
right?
(no objections)
next
McCool: we should be able to close some of the existing issues
[18]security issues
[18] https://github.com/w3c/wot-security/issues
[adjourned]
Summary of Action Items
ACTION: [ONGOING] elena to work on issue 68 (Thing Provider
Data Specification) and issue 69 (Passive Observers Risk)
ACTION: [ONGOING] mccool to work on issue 70 (Require Not
Exposing Immutable Hardware Identifiers?)
ACTION: [ONGOING] elena/koster to work on terminology
ACTION: [ONGOING] mccool to talk with security guys about
testing/validation timeline
Summary of Resolutions
[End of minutes]
__________________________________________________________
Minutes formatted by David Booth's [19]scribe.perl version
1.152 ([20]CVS log)
$Date: 2018/04/30 14:24:19 $
[19] http://dev.w3.org/cvsweb/~checkout~/2002/scribe/scribedoc.htm
[20] http://dev.w3.org/cvsweb/2002/scribe/
Received on Monday, 30 April 2018 14:29:45 UTC