Minutes: WSC WG weekly 2006-12-12

The minutes from last week's call were approved yesterday.  A text
version is attached; a hypertext version is online here:

  http://www.w3.org/2006/12/12-wsc-minutes

Regards and happy holidays,
-- 
Thomas Roessler, W3C  <tlr@w3.org>






   [1]W3C 

                                 WSC WG Weekly
                                  12 Dec 2006

   See also: [2]IRC log

   [3]Agenda

Attendees

   Present
          Thomas Roessler
          Mike Beltzner
          Mary Ellen Zurko
          Tyler Close
          Praveen Alavilli
          Stephen Farrell
          Bill Doyle
          Hal Lockhart
          Paul Hill
          Tim Hahn
          Michael Smith
          Phillip Hallam-Baker
          Rishikesh A Pande
          Mike McCormick
          Tony Nadalin
          Maritza Johnson

   Guests
          Rob Franco

   Chair
          Mez

   Scribe
          Praveen, tlr

Contents

     * [4]Topics
         1. [5]pick scribe -- proposed: Praveen
         2. [6]approve      minutes      from      last     meeting     -
            http://www.w3.org/2006/12/05-wsc-minutes
         3. [7]scope discussion - http://www.w3.org/2006/WSC/wiki/NoteInScope /
            http://www.w3.org/2006/WSC/wiki/NoteOutOfScope
     * [8]Summary of Action Items
     _________________________________________________________________

pick scribe -- proposed: Praveen

   <tlr> ScribeNick: Praveen

   <tlr> RESOLVED: Praveen to scribe

   Welcome to Praveen, AOL.

approve minutes from last meeting - [9]http://www.w3.org/2006/12/05-wsc-minutes

   RESOLVED: minutes are approved

   <tlr> ScribeNick: tlr

   <tlr> whoops, looks like Praveen has connection issues

scope discussion - [10]http://www.w3.org/2006/WSC/wiki/NoteInScope /
[11]http://www.w3.org/2006/WSC/wiki/NoteOutOfScope

   mez: would like to get through discussing scope today. Possibly defer goals.
   ... had some discussion ...
   ... out of scope, in scope, f2f and/or e-mail ...

   <Mez> [12]http://www.w3.org/2006/WSC/wiki/NoteInScope

   mez: encourage people to edit things directly
   ... scope partially based on discussion with Hal ...
   ... outer boundaries ...
   ... set outer edges of what's in scope or not ...
   ... what we're going to do ...
   ... tyler, different spin on that?

   tyler: trying to remember what hal said ...
   ... had discussion during one of the conference calls ...
   ... goals are the things group is trying to achieve, non-goals are things
   that might be achieved, but aren't targets by itself ...
   ... scope/out-of-scope setting boundaries ...
   ... obviously more discussion ...

   mez: anything in particular missing in "in scope" ...

   hal: what about things that ride on top of HTTP, but aren't HTML / XHTML
   ....
   ... SOAP ...

   hal: web protocols ...
   ... obvious case, SOAP or HTTP ...
   ... leave it to others to justify things they deem in scope

   stephenF: worth mentioning smaller devices ...
   ... be explicit that non-desktop is in scope ...

   <malware> malware: along with phone, we have portable gaming devices such as
   Nintendo DS

   <scribe> ACTION: stephenF to add mobile device text to scope text in wiki
   [recorded in [13]http://www.w3.org/2006/12/12-wsc-minutes.html#action01]

   <trackbot> Created ACTION-50 - Add mobile device text to scope text in wiki
   [on Stephen Farrell - due 2006-12-20].

   <Zakim> malware, you wanted to contribute my 2 cents to "phones in scope"
   discussion  (and  suggest,  among  other  things, that generalizing to
   "constrained devices" instead of "phone"...)

   <beltzner> +1 to stephenF's idea; small devices are becoming more common,
   have different design implications

   malware: mobile handsets is more accurate description ...
   ... class of devices: *constrained* devices ...
   ... non-desktop-pc-browsers ...
   ... "constrained devices" catches the idea pretty well ...

   stephenF: not too keen on "constrained" ...
   ... "mobile" ...

   michael: not talking about devices that are mobile ...

   malware: "mobile" ignores use cases, such as airline seat-backs ...
   ... we might explicitly rule constrained devices out-of-scope ...
   ... focus on desktop first, defer constrained ...
   ... "not focus on something" -- tacit acknowledgement that something is less
   important ...

   mez: not tacit, but explicit

   malware: if we're going to do this work and get more people involved that
   are more familiar with mobile web browsing use cases ...
   ... then might be worthwhile not to make them take second place ...
   ... by just saying display of security information across range of devices
   ...

   <Tyler> Are we talking about constrained display devices instead of mobile
   devices

   <Zakim> PHB, you wanted to talk abut drawing line at VOIP phishing

   phb: draw bright line between our work and VOIP phishing
   ... problem on the context side ...
   ... have been getting calls to own house that are phishing attempts ...
   ... don't get into stuff that relates to how switches operate ...
   ... rule this out of scope ...

   mez: wish brad was here

   <stephenF> mobile devices that run http etc is a good scope

   beltzner: what would a voice phishing attack look like?

   <beltzner> tlr: beltzner asked

   phb: (explains example)
   ... e-mail spam and telephone ...
   ... people don't realize that sth is phone's telephone number ...
   ...  banks  have  trained  people to enter phone number into telephone
   attendance system without listening for person ...
   ... can of worms ...

   <beltzner> ok, thanks - noisy here, so I'll stay muted

   <scribe> ACTION: Hallam-Baker to send proposed language on phones to mailing
   lists [recorded in
   [14]http://www.w3.org/2006/12/12-wsc-minutes.html#action03]

   <trackbot> Created ACTION-40 - Send proposed alnguage on phones to mailing
   lists [on Phillip Hallam-Baker - due 2006-12-19].

   billd: gets back to previous discussion about constrained devices ...
   ... capabilities, phone browsers, embedded browsers ...

   <stephenF> what that action on me or phb?

   billd: more devices to come out, more on scope ...

   tlr: 1. make sure you send mail when you make substantive edits to the wiki
   ...  2. what I hear is PROPOSED: (a) constrained devices in scope, (b)
   telephone/voice interactions out of scope; maps to voice browsers

   hal: let's be very clear where we draw this line

   mez: haven't made decision, yet
   ... see potential for brad having opposing view to phil ...

   phb: dns vs ss7 based approaches

   <stephenF> just added "Mobile phones and other constrained devices that can
   run a generic web browser are expicitly in scope under this heading as well
   as standard desktop browsers." to the wiki - hack away at that!

   <Praveen> phb: example of skype using DNS instead of tradinitional phone
   line

   tlr: voice browser is the thing on the other side of the phone line; it can
   go out to the web

   hal: careful about distinctions that might be indistinguishable

   mez: agree

   tlr: +1

   hal: constrained devices ...
   ... uncomfortable with the term ...
   ... because it evolves ...
   ... choice is about how to deal with functional limits in interface ...
   ... "here's how you use things with that kind of functional limitation" ...
   ... or do "here's for desktop, here's for mobile" ...

   <malware> some general characteristics of "constrained devices" that aren't
   likely to change is that they have smaller screens than desktop/laptop PCs,
   no keyboards, but touch screens or number pads

   tlr: "constrained devices" is an argument in favor of the first choice of
   argument -- be clear about constraints and how they affect recommendations

   <stephenF> q to ask about 3rd parties

   mez:     let's    have    a    look    at    "in    scope"    section,
   [15]http://www.w3.org/2006/WSC/wiki/NoteInScope, anything contentious there?
   ... replace "display" by "communicate" ...

   mez walking through list

   beltzner: would like to see recommendation on communication behavior ...
   ... in order to avoid phishing attacks ...
   ... how to begin secure communication ...

   <PHB> (The groups mentioned are the FSTC and APWG)

   <scribe> ACTION: beltzner to propose draft language to capture "how to begin
   secure communication" [recorded in
   [16]http://www.w3.org/2006/12/12-wsc-minutes.html#action05]

   <trackbot> Created ACTION-42 - Propose draft language to capture \"how to
   begin secure communication\" [on Mike Beltzner - due 2006-12-19].

   tyler: SOAP?

   mez: use case from tim hahn[17]
   http://www.w3.org/2006/WSC/wiki/DesktopDecoration

   <beltzner>[18]http://diveintomark.org/archives/2006/12/07/rest-for-toddlers
   (better HTTP error codes)

   <Zakim> stephenF, you wanted to ask about 3rd parties

   <scribe>  ACTION:  tyler  to  review  DesktopDecoration  [recorded  in
   [19]http://www.w3.org/2006/12/12-wsc-minutes.html#action07]

   <trackbot> Created ACTION-44 - Review DesktopDecoration [on Tyler Close -
   due 2006-12-19].

   StephenF: last one "in scope" -- reputation services, third party sources in
   scope?
   ... currently it's protocol-centric ...

   mez: not suggesting that third party services be out of scope

   stephenF: There might be proprietary services there

   mez: don't spend a lot of time on proprietary services

   stephenF: As long as it's not just intended to be PKI

   mez: PKI in final bullet is example, not meant to scope entire bullet point

   <stephenF> change I made is s/PKI/e.g. PKI, generic reptutation services/

   tlr:  pki  in  scope  as concrete example; there might also be generic
   recommendations

   chair diagnoses violent agreement between tlr and stephenF

   mez: .. more about general categories in scope ...
   ... presume that what's there is pretty good ..
   ... large categories missing ...

   tlr: authoring / deployment guidelines should be in scope

   mez: thought that was part of ACTION-42

   <scribe> ACTION: roessler to work with beltzner on ACTION-42 to possibly
   broaden it [recorded in
   [20]http://www.w3.org/2006/12/12-wsc-minutes.html#action08]

   <trackbot> Created ACTION-45 - Work with beltzner on ACTION-42 to possibly
   broaden it [on Thomas Roessler - due 2006-12-19].

   (some discussion about restating charter)

   tlr: use cases, and how they're mapped to scope sections

   mez: hope we'll get there soon
   ... any other things that should be in scope and aren't called out?
   ... going to out of scope

   <Mez> [21]http://www.w3.org/2006/WSC/wiki/NoteOutOfScope

   hal: hesitant; think the second bullet is a null category
   ... don't think there's a thing that's not potentially dangerous

   mez: trying to draw a boundary. "It's null" or "it's in scope" is different
   statements.

   hal: Agree that something that's not dangerous is out of scope, but disagree
   on def of "dangerous"

   mez: worried about slippery slope of trying to get across security context
   information for "4 o'clock"

   hal: if the clock happens to use ssl ...

   mez: potentially taking up valuable screen real estate
   ... turning security context information into noise ...

   tlr: suggest we rule *in* *scope* the discussion of when security context
   information is to be communicated, and when it might be detrimental
   ... note use the scope discussion as a proxy for this ...

   mez: ok

   hal: ok, but was thinking about having some stuff always on the screen

   mez: well, this is going to basic design principles discussion ...
   ... tradeoffs are a different area ...

   hal:  historically,  people  have found very imaginative attacks; "not
   dangerous" is fargile statement ...

   <scribe>  ACTION:  roessler  to  add  in-scope  for appropriateness of
   communication    of   security   conext   information   [recorded   in
   [22]http://www.w3.org/2006/12/12-wsc-minutes.html#action09]

   <trackbot>  Created  ACTION-46  -  Add in-scope for appropriateness of
   communication of security context information [on Thomas Roessler - due
   2006-12-19].

   <scribe> ACTION: zurko to yank "not dangerous" from out-of-scope [recorded
   in [23]http://www.w3.org/2006/12/12-wsc-minutes.html#action10]

   <trackbot> Created ACTION-47 - Yank \"not dangerous\" from out-of-scope [on
   Mary Ellen Zurko - due 2006-12-19].

   <Zakim> stephenF, you wanted to qualify the non-web protocols bullet

   stephenF: there's a multi-protocol point to be taken into account

   <scribe> ACTION: farrell to propose revised "non-web protocols" text for
   NoteOutOfScope [recorded in
   [24]http://www.w3.org/2006/12/12-wsc-minutes.html#action12]

   <trackbot> Created ACTION-48 - Propose revised \"non-web protocols\" text
   for NoteOutOfScope [on Stephen Farrell - due 2006-12-19].

   billd: ??

   <scribe> bill, please scribe what you said

   <stephenF>  I  just  changed the "non-web" bullet to: "Uses of non-web
   protocols (such as ftp, smtp, pop3) that cannot affect the web security
   context."

   tyler: "calculation ..." -- is that ruling spam detection like techniques
   out of scope?

   mez: trying to rule that level of functionality out of scope

   tyler: want to clarify that, would like to add text on it

   phb: it's the main approach, but entirely tactical; always reacting to
   latest attack of bad guys
   ... as soon as they come up with proposal, it's too late ...

   rob:  good point, if we're going to have these different anti-phishing
   technologies, way to present to user needs to be consistent, ...
   ... with regard to the experience, that's something that we're saying is in
   scope ...
   ... but actual heuristics that power engines are out of scope ...
   ... would also agree on that ...

   mez: did want to rule out of scope visualization of this stuff

   <stephenF> if that last was correct then I'm confused about it

   <billd> take off-line and determine if it is possible to clarify the need to
   keep certain parts of a session private or secure and in-scope protected by
   security context an not worry about other components of a user session.

   <PHB> This is the same approach we have for PKI, the results are in scope,
   the way the results are arrived at is out of scope

   <stephenF> for PKI the algs. are defined

   <malware> Tyler, if you can, maybe type in your point in IRS

   <malware> IRC

   PHB:  techniques to detect attack are out of scope, but way to present
   results to user is in scope

   stephenF: confused by that
   ... if there's some kind of heuristic behind it, how do you communicate that
   it's out of scope?

   <Zakim> malware, you wanted to suggest that we make sure we capture Tyler's
   original point in the minutes

   malware: thinks this is important, make sure it gets into minutes -- Tyler,
   please type in more complete description of this point

   tlr: +1 to rob; would like to see advanced heuristics out of scope, but
   petnames-like approaches ("is the same") in scope

   <stephenF> its ok that I'm confused btw :-)

   <Tyler> I wanted to find out if the current "Out of scope" text puts spam
   like detection, heuriistic techniques out of scope.

   tlr: also, abstractions in scope ...

   hal: "risky site" -- notion could change in future

   rob: In IE, "suspicious" warning, "positively bad" warning
   ... likely to remain that way in IE ...
   ... want to talk about these two levels of warning ...
   ... understand which part of experience is effective ...
   ... which parts to merge and melt with ...
   ... bring things together to be more consistent, more effective ...

   mez: action to amend in-scope to reflect this?

   <scribe> ACTION: beltzner to amend in-scope to reflect consistency of user
   experiences,      warning      levels,      etc      [recorded      in
   [25]http://www.w3.org/2006/12/12-wsc-minutes.html#action13]

   <trackbot> Created ACTION-49 - Amend in-scope to reflect consistency of user
   experiences, warning levels, etc [on Mike Beltzner - due 2006-12-19].

   tyler: results about heuristics to add to bookmark page?

   tyler: success measurements from browser vendors?

   malware: can't speak for other browser vendors, but not willing to publish
   outside marketing literature

   mez: back to out of scope at next meeting; next meeting next week
   ... more on the e-mail list and next week ...

   <stephenF> bye then

   adjourned

   <billd> bye

   <malware> I didn't mean to say not willing, just possibly not willing to
   share data about success of propriety features

   <malware>  And data about on this coming from vendors is likely to not
   exactly be unbiased

Summary of Action Items

   ACTION-50 - Add mobile device text to scope text in wiki [on Stephen Farrell
   - due 2006-12-20].

   ACTION-40 - Send proposed alnguage on phones to mailing lists [on Phillip
   Hallam-Baker - due 2006-12-19].

   ACTION-42  -  Propose  draft  language to capture "how to begin secure
   communication" [on Mike Beltzner - due 2006-12-19].

   ACTION-44 - Review DesktopDecoration [on Tyler Close - due 2006-12-19].

   ACTION-45 - Work with beltzner on ACTION-42 to possibly broaden it [on
   Thomas Roessler - due 2006-12-19].

   ACTION-46 - Add in-scope for appropriateness of communication of security
   context information [on Thomas Roessler - due 2006-12-19].

   ACTION-47 - Yank "not dangerous" from out-of-scope [on Mary Ellen Zurko -
   due 2006-12-19].

   ACTION-48 - Propose revised "non-web protocols" text for NoteOutOfScope [on
   Stephen Farrell - due 2006-12-19].

   ACTION-49 - Amend in-scope to reflect consistency of user experiences,
   warning levels, etc [on Mike Beltzner - due 2006-12-19].


   [End of minutes]
     _________________________________________________________________


    Minutes formatted by David Booth's [26]scribe.perl version 1.127 ([27]CVS
    log)
    $Date: 2006/12/19 22:29:47 $

References

   1. http://www.w3.org/
   2. http://www.w3.org/2006/12/12-wsc-irc
   3. http://lists.w3.org/Archives/Public/public-wsc-wg/2006Dec/0069.html
   4. file://localhost/home/roessler/W3C/WWW/2006/12/12-wsc-minutes.html#agenda
   5. file://localhost/home/roessler/W3C/WWW/2006/12/12-wsc-minutes.html#item01
   6. file://localhost/home/roessler/W3C/WWW/2006/12/12-wsc-minutes.html#item02
   7. file://localhost/home/roessler/W3C/WWW/2006/12/12-wsc-minutes.html#item03
   8. file://localhost/home/roessler/W3C/WWW/2006/12/12-wsc-minutes.html#ActionSummary
   9. http://www.w3.org/2006/12/05-wsc-minutes
  10. http://www.w3.org/2006/WSC/wiki/NoteInScope
  11. http://www.w3.org/2006/WSC/wiki/NoteOutOfScope
  12. http://www.w3.org/2006/WSC/wiki/NoteInScope
  13. http://www.w3.org/2006/12/12-wsc-minutes.html#action01
  14. http://www.w3.org/2006/12/12-wsc-minutes.html#action03
  15. http://www.w3.org/2006/WSC/wiki/NoteInScope
  16. http://www.w3.org/2006/12/12-wsc-minutes.html#action05
  17. http://www.w3.org/2006/WSC/wiki/DesktopDecoration
  18. http://diveintomark.org/archives/2006/12/07/rest-for-toddlers
  19. http://www.w3.org/2006/12/12-wsc-minutes.html#action07
  20. http://www.w3.org/2006/12/12-wsc-minutes.html#action08
  21. http://www.w3.org/2006/WSC/wiki/NoteOutOfScope
  22. http://www.w3.org/2006/12/12-wsc-minutes.html#action09
  23. http://www.w3.org/2006/12/12-wsc-minutes.html#action10
  24. http://www.w3.org/2006/12/12-wsc-minutes.html#action12
  25. http://www.w3.org/2006/12/12-wsc-minutes.html#action13
  26. http://dev.w3.org/cvsweb/~checkout~/2002/scribe/scribedoc.htm
  27. http://dev.w3.org/cvsweb/2002/scribe/

Received on Wednesday, 20 December 2006 08:55:06 UTC