Meeting record: WSC WG weekly 2008-04-02

Minutes from our meeting on 2008-04-02 were approved and are
available online here:

   http://www.w3.org/2008/04/02-wsc-minutes.html

A text version is included below the .signature.

-- 
Thomas Roessler, W3C  <tlr@w3.org>







Web Security Context Working Group Teleconference
02 Apr 2008

   See also: [2]IRC log

Attendees

   Present

   Regrets

   Luis, B

   Chair

   Mary Ellen Zurko

   Scribe

   hal

Contents

   · [3]Topics

   1.      [4]approving minutes

   2.      [5]put out heartbeat of xit

   3.      [6]5.1.5 Self-signed Certificates and Untrusted Root
   Certificates

   4.      [7]5.4.1 TLS errors

   · [8]Summary of Action Items
   _______________________________________________________________________



   <trackbot-ng> Date: 02 April 2008

   <tlr> ScribeNick: hal


   approving minutes

   <Mez> [9]http://www.w3.org/2008/03/26-wsc-minutes.html

   resolution: minutes from March 26 approved

   put out heartbeat of xit

   <Mez>
   [10]http://lists.w3.org/Archives/Public/public-wsc-wg/2008Mar/0193.html

   <stephenF> go for it

   <tlr> RESOLUTION: to publish current state of wsc-xit as a working
   draft

   resolution: publish current draft of xit as a working draft to meet
   heartbeat requirement

   tlr: should be ready by next week


   5.1.5 Self-signed Certificates and Untrusted Root Certificates

   <Mez>
   [11]http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#selfsignedcerts

   mez: any comments?
   ... <reads text>

   <stephenF> maybe s/UAs may offer pinning/UAs may support pinning/

   tlr: real behavior defined elsewhere in document

   stephenF: petnames are not mandatory, text should be consistent with
   that

   <stephenF> tlr: where?

   <johnath> ifette:
   [12]http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#selfsignedcerts

   <ifette> +1 to johnath

   <tlr> stephen_F,
   [13]http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#sec-tlserrors

   tyler: time of pinning cert is also a good time to assign petname, text
   should say so
   ... why does it say only one site for pinned cert

   tlr: it means that certs are pinned for one site at a time

   <tlr> improved language welcome

   <johnath> stephenF: would text like "A pinned self-signed certificate
   SHOULD be considered sufficient identification to allow user agents to
   associate a Petname with the site, if supported."

   <stephenF> works for me

   <ifette> works for me

   <Zakim> stephenF, you wanted to suggest that we think about some text
   restricting SSC content a bit e.g. not for CN=www.*.com ?

   jonathan: site mismatch comes under SSL errors
   ... perhaps we need wording about wildcards

   tlr: in error part it covers primarily validated certs
   ... text about self signed does not deal with URL mismatch

   stephenF: will take action to determine wording

   mez: better to settle it on this call

   <Mez> "A pinned self-signed certificate SHOULD be considered sufficient
   identification to allow user agents to associate a Petname with the
   site, if supported."

   mez: that replaces current last line

   <ifette> im fine with it

   resolution: accept text with modification


   5.4.1 TLS errors

   <Mez>
   [14]http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#sec-tlserrors

   <johnath> ACTION: asaldahan to update section 5.1.5. Replace last
   sentence with: "A pinned self-signed certificate SHOULD be considered
   sufficient identification to allow user agents to associate a Petname
   with the site, if supported." [recorded in
   [15]http://www.w3.org/2008/04/02-wsc-minutes.html#action01]

   <trackbot-ng> Sorry, couldn't find user - asaldahan

   <johnath> tlr: should that be "anil"?

   <tlr> yes

   <Zakim> stephenF, you wanted to ask why "SHOULD" there?

   <johnath> ACTION: anil to update section 5.1.5. Replace last sentence
   with: "A pinned self-signed certificate SHOULD be considered sufficient
   identification to allow user agents to associate a Petname with the
   site, if supported." [recorded in
   [16]http://www.w3.org/2008/04/02-wsc-minutes.html#action02]

   <trackbot-ng> Created ACTION-410 - Update section 5.1.5. Replace last
   sentence with: \"A pinned self-signed certificate SHOULD be considered
   sufficient identification to allow user agents to associate a Petname
   with the site, if supported.\" [on Anil Saldhana - due 2008-04-09].

   ifette: may get multiple errors in sequence
   ... perhaps that is why it is SHOULD
   ... API may not make multiple errors visible

   <stephenF> suggestion is: s/the most severe signalling level SHOULD be
   used/the most severe signalling level currently known MUST be used/

   <tlr> +1 to stephen's suggestion

   yngve: clarify "most severe level"
   ... what if a page includes content from different servers with
   different errors?
   ... what is behavior?

   <Mez> If multiple error conditions apply, the most severe signalling
   level currently known MUST be used, as defined in 6.4 Error handling
   and signalling.

   <Zakim> ifette, you wanted to answer yngve

   ifette: if there is an untrustworthy cert don't want to prompt twice
   ... if they agree once that should be sufficient

   jonathan: seems like implementation detail

   <stephenF> +1 to that change

   resolution: apply proposed change

   <tlr> ACTION: anil to apply change about multiple error conditions
   [recorded in
   [17]http://www.w3.org/2008/04/02-wsc-minutes.html#action03]

   <trackbot-ng> Created ACTION-411 - Apply change about multiple error
   conditions [on Anil Saldhana - due 2008-04-09].

   <Mez> The requirements in this section do not require user agents to
   store information about past interactions longer than they otherwise
   would. Historical TLS information stored for the purposes of evaluating
   security relevant changes of behavior MAY be expunged from the user
   agent on the same schedule as other browsing history information.
   Historical TLS information MUST NOT be expunged prior to other browsing
   history information. For purposes of this requirement, browsi

   ifette: have problem with storing history of info from every SSL host

   mez: addresses your issue
   ... text later in section addresses your concern

   ifette: may require you to fire off a lot of queries

   tlr: question is whether it hurts perf more than regular SSL processing

   <Zakim> stephenF, you wanted to ask where's the bit about pinning only
   after a "while" or is that gone?

   yngve: database of that type could take a lot of space

   stephenF: if I pin self signed cert, does that mean somebody can easily
   get me to pin a new cert
   ... for the same site

   <stephenF> editorial suggestion: maybe switch the order of 1st two
   bullets

   <tlr> +1

   <stephenF> yep, the more like pseudo code the better

   <bill-d> + 1

   <tlr> -1 to "the more like pseudo code the better"

   <ifette> +1 to pseudocode good

   also number the bullets

   <ifette> pseudocode less ambiguous, and easier to test

   <Zakim> stephenF, you wanted to ask a thing

   resolution: make indicated changes

   <tlr> ACTION: anil to number bulleted list in 5.4.1, and while doing
   so, swap first two bullets. [recorded in
   [18]http://www.w3.org/2008/04/02-wsc-minutes.html#action04]

   <trackbot-ng> Created ACTION-412 - Number bulleted list in 5.4.1, and
   while doing so, swap first two bullets. [on Anil Saldhana - due
   2008-04-09].

   stephenF: add warning that this could allow spoofing

   <stephenF> maybe add this: "Note that this newly pinned certificate
   could be the basis for a spoofing attack, or it could represent a
   refresh of an SSC"

   stephenF: insert after new second bullet

   <tlr> I'd actually like to see this one in the security considerations

   <stephenF> agree

   <stephenF> agree (re-iterating)

   tlr: put it in both places

   <tlr> ACTION: anil to add stephenF's note re newly pinned certs to
   5.4.1 and re-iterate it in security considerations section [recorded in
   [19]http://www.w3.org/2008/04/02-wsc-minutes.html#action05]

   <trackbot-ng> Created ACTION-413 - Add stephenF's note re newly pinned
   certs to 5.4.1 and re-iterate it in security considerations section [on
   Anil Saldhana - due 2008-04-09].

   <Zakim> stephenF, you wanted to ask if "presented as trustworthy" is
   well-defined?

   <Mez> When certificate information is presented in these interactions,
   human-readable information derived from the certificates (e.g., Common
   Name or Organization attributes) in question MUST NOT be presented as
   trustworthy.

   <stephenF> how about "MUST NOT be presented in the same way as identity
   information from an AAC"?

   <Mez> or not the same as identity information in general, as cited in
   the spec

   <stephenF> how about "MUST be presented as rubbish"?

   <Mez> hahahahaha

   tlr: don't want to present stuff that is unverified at all

   <Zakim> ifette, you wanted to offer suggestion

   ifette: why not say don't present the info?

   tlr: what about diagnostic purposes?

   <tlr> fine with me

   <stephenF> I like what Ian said

   <stephenF> "Don't display ASN.1"

   <tlr> you never want to do that. ;

   what about the pinning case?

   tlr: yes, nothing in the cert is verified if you don't trust the root
   ... you really want to know the site you are going to

   <tlr> FWIW, RFC 2818 is waffling around about URL checks. MUST check,
   but MAY not check.

   <stephenF> and 2818 has wildcard ambiguities I think

   ifettte: non match between URL and cert is a distinct error

   <ifette> Web user agents MUST NOT display information from a self
   signed or untrusted certificate in a warning or error message. Web user
   agents MAY display this information in a dialog or other secondary
   chrome reachable through the warning or error message or dialog.

   <tlr> +1

   <stephenF> maybe s/information/identity information/ (to allow e.g.
   saying "1024 rsa" or something)

   <stephenF> otherwise +1, and I could live without my suggested change

   <Mez> When certificate information is presented in these interactions,
   web user agents MUST NOT display information from a self signed or
   untrusted certificate in a warning or error message. Web user agents
   MAY display this information in a dialog or other secondary chrome
   reachable through the warning or error message or dialog.

   <johnath> heh - what tlr said

   <stephenF> +1 to q-

   <ifette> so in that case I still like my text as written, with
   stephen's modification

   <ifette> Web user agents MUST NOT display identity information from a
   self signed or untrusted certificate in a warning or error message. Web
   user agents MAY display this information in a dialog or other secondary
   chrome reachable through the warning or error message or dialog.

   <Mez> 04 01When certificate information is presented in these
   interactions, web user agents MUST NOT display identity information
   from a self signed or untrusted certificate in a warning or error
   message. Web user agents MAY display this information in a dialog or
   other secondary chrome reachable through the warning or error message
   or dialog.

   <stephenF> I think I like that paragraph with global scope

   <stephenF> fingerprint is derived-from, not part-of the cert

   <tlr> I think I'm leaning toward the global scope, moving it to the end
   of 5.4.1.

   <Zakim> ifette, you wanted to say i like it being more broad

   <stephenF> there's a use-case where the DNS changed but the SSC wasn't
   renewed, corner-case though I guess

   ifette: UA is not precluded from reporting other errors, i.e. cn/url
   mismatch

   johathan: trying to say you can skip full processing and pin cert
   ... prevented from dealing with minor errors

   <Mez> nowhere do we claim "cn" is identity

   <stephenF> x.509 does

   cn is found in Subject

   or ALt subject

   <ifette> i think the issue of offering to pin when the CN= doesn't
   match, I don't know if that's the same issue or a separate issue

   <Mez> When certificate information is presented in these interactions,
   web user agents MUST NOT display identity information from a self
   signed or untrusted certificate in a warning or error message. Web user
   agents MAY display this information in a dialog or other secondary
   chrome reachable through the warning or error message or dialog.

   <ifette> had fun at 24c3? :-)

   <johnath> yeah, I think I'm good with Mez's text too, the more I think
   about it

   <ifette> +1 to mez's text

   <tlr> that was at hack.lu

   <stephenF> +1 as well

   <tlr>
   [20]http://log.does-not-exist.org/archives/2007/10/20/2144_hacklu_mitmi
   ng_a_room_full_of_security_people.html

   <stephenF> you could click through to get that info with the above text

   <stephenF> abend ?

   <stephenF> FWIW I think this is good and important text, so maybe we
   should revisit it next time to get it right if necessary

   <Mez> I agree

   <Mez> and we will, it won't be dropped

   <Mez> one way or the other

   <johnath> gotta go!

   <Mez> ta

   <stephenF> +1 to PHB's point, let's be nice to cheapskates/the
   cash-challenged

   <stephenF> I'm sure I'll forget but I wanted to talk about "If
   certificate status checks are performed by a user agent, and a
   certificate is found to be outside its validity period, then the
   certificate MUST be considered revoked." next time

   <tlr> stephenF, please send mail about that

   <stephenF> bye so

Summary of Action Items

   [NEW] ACTION: anil to add stephenF's note re newly pinned certs to
   5.4.1 and re-iterate it in security considerations section [recorded in
   [21]http://www.w3.org/2008/04/02-wsc-minutes.html#action05]
   [NEW] ACTION: anil to apply change about multiple error conditions
   [recorded in
   [22]http://www.w3.org/2008/04/02-wsc-minutes.html#action03]
   [NEW] ACTION: anil to number bulleted list in 5.4.1, and while doing
   so, swap first two bullets. [recorded in
   [23]http://www.w3.org/2008/04/02-wsc-minutes.html#action04]
   [NEW] ACTION: anil to update section 5.1.5. Replace last sentence with:
   "A pinned self-signed certificate SHOULD be considered sufficient
   identification to allow user agents to associate a Petname with the
   site, if supported." [recorded in
   [24]http://www.w3.org/2008/04/02-wsc-minutes.html#action02]
   [NEW] ACTION: asaldahan to update section 5.1.5. Replace last sentence
   with: "A pinned self-signed certificate SHOULD be considered sufficient
   identification to allow user agents to associate a Petname with the
   site, if supported." [recorded in
   [25]http://www.w3.org/2008/04/02-wsc-minutes.html#action01]

   [End of minutes]
   _______________________________________________________________________


    Minutes formatted by David Booth's [26]scribe.perl version 1.133
    ([27]CVS log)
    $Date: 2008/04/17 09:43:52 $
   _______________________________________________________________________

Scribe.perl diagnostic output

   [Delete this section before finalizing the minutes.]
This is scribe.perl Revision: 1.133�  of Date: 2008/01/18 18:48:51�

Check for newer version at [28]http://dev.w3.org/cvsweb/~checkout~/2002/scribe/



Guessing input format: RRSAgent_Text_Format (score 1.00)



Succeeded: s/manditory/mandatory/

Succeeded: s/error/level/

Found ScribeNick: hal

Inferring Scribes: hal



WARNING: No "Present: ... " found!

Possibly Present: Bill_Doyle HP Hal_Lockhart IPcaller Maritza_Johnson MaryEllen_
Zurko Mozilla P21 PHB ScribeNick Thomas aaaa aacc aadd aaee asaldahan asaldhan b
eltzner bill-d dans hal ifette ifettte johathan johnath joined jonathan jvkrey m
aritzaj mez stephenF tlr trackbot-ng tyler wsc yngve

You can indicate people for the Present list like this:

� �  � � � � � <dbooth> Present: dbooth jonathan mary

� � � � � � �  <dbooth> Present+ amy



Regrets: Luis B



WARNING: No meeting chair found!

You should specify the meeting chair like this:

<dbooth> Chair: dbooth



Found Date: 02 Apr 2008

Guessing minutes URL: [29]http://www.w3.org/2008/04/02-wsc-minutes.html

People with action items: anil asaldahan



   [End of [30]scribe.perl diagnostic output]

References

   1. http://www.w3.org/
   2. http://www.w3.org/2008/04/02-wsc-irc
   3. http://www.w3.org/2008/04/02-wsc-minutes.html#agenda
   4. http://www.w3.org/2008/04/02-wsc-minutes.html#item01
   5. http://www.w3.org/2008/04/02-wsc-minutes.html#item02
   6. http://www.w3.org/2008/04/02-wsc-minutes.html#item03
   7. http://www.w3.org/2008/04/02-wsc-minutes.html#item04
   8. http://www.w3.org/2008/04/02-wsc-minutes.html#ActionSummary
   9. http://www.w3.org/2008/03/26-wsc-minutes.html
  10. http://lists.w3.org/Archives/Public/public-wsc-wg/2008Mar/0193.html
  11. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#selfsignedcerts
  12. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#selfsignedcerts
  13. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#sec-tlserrors
  14. http://www.w3.org/2006/WSC/drafts/rec/rewrite.html#sec-tlserrors
  15. http://www.w3.org/2008/04/02-wsc-minutes.html#action01
  16. http://www.w3.org/2008/04/02-wsc-minutes.html#action02
  17. http://www.w3.org/2008/04/02-wsc-minutes.html#action03
  18. http://www.w3.org/2008/04/02-wsc-minutes.html#action04
  19. http://www.w3.org/2008/04/02-wsc-minutes.html#action05
  20. http://log.does-not-exist.org/archives/2007/10/20/2144_hacklu_mitming_a_room_full_of_security_people.html
  21. http://www.w3.org/2008/04/02-wsc-minutes.html#action05
  22. http://www.w3.org/2008/04/02-wsc-minutes.html#action03
  23. http://www.w3.org/2008/04/02-wsc-minutes.html#action04
  24. http://www.w3.org/2008/04/02-wsc-minutes.html#action02
  25. http://www.w3.org/2008/04/02-wsc-minutes.html#action01
  26. http://dev.w3.org/cvsweb/%7Echeckout%7E/2002/scribe/scribedoc.htm
  27. http://dev.w3.org/cvsweb/2002/scribe/
  28. http://dev.w3.org/cvsweb/%7Echeckout%7E/2002/scribe/
  29. http://www.w3.org/2008/04/02-wsc-minutes.html
  30. http://dev.w3.org/cvsweb/%7Echeckout%7E/2002/scribe/scribedoc.htm

Received on Thursday, 17 April 2008 09:46:05 UTC