-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create Security and Privacy Questionnaire Answers for Ver 1.1 CR Process #1382
Conversation
Initial checkin. This is just a copy of what we submitted last time, and still needs to be updated. Here is the original: https://github.com/w3c/wot-architecture/blob/main/proposals/security_and_privacy.md Note that it was in architecture but was written to relate to both (we should update to just relate to the TD).
Not sure about point three "Does this specification introduce new state for an origin that persists across browsing sessions?" |
To point 11 "Does this specification allow an origin some measure of control over a user agent’s native UI?" |
Regarding 2.11: |
There are 18 questions but the last is a catch-all. Note the branch for this PR is IN this repo so it should be possible for you to edit it directly, or make PRs against it. I would suggest that we all answer or propose answers for the questions in which we feel we have expertise, but please note when you are working on a question here so we don't step on each other TOO much. We should ideally finish this questionnaire by next week. |
For example: I am now working on question 18. (I am; it's a catch-all, though, so I am going to make a bulleted list, feel free to suggest items) |
It says "new state". We can probably answer "no" to this one since we don't introduce "new" state, although we could mention that existing mechanisms we depend on (like OAuth) might manage state. Although... well, Discovery IS all about maintaining a database that definitely persists, so perhaps the answer is "yes" for Discovery (specifically directories) and "no" for TDs (except for things like OAuth). For Architecture it would be "yes", but only for Discovery. The answer SHOULD be "no" for Profiles (I hope). |
I added this consideration to my latest PR against the TD Security and Privacy Considerations: PR #1402 Anyway, I think we should answer "no" to this question, but point out that strings provided might get included into HTML via templates but should be sanitized first (like any other external string; standard web security practice, I even have some links in my PR on how to do it). |
2.1
I'm thinking we can leave Architecture out of the responses and just include answers for each other deliverable. Note that some questions, like this one, are not yes/no. |
2.2
|
2.3 |
2.4 |
So, it seems we have answers for: 1, 2, 3, 4, 5 (was "three", @Citrullin was looking at the old questionnaire), 11 |
2.6 |
OK, I have filled in answers to 2.1-2.11. In some cases I had to go beyond what we discussed above so please review. In many cases the definitions of "origin" and "platform" were very confusing (or just inappropriate, even if it would have been convenient in some cases to consider them naively) so I had to reword the question to get at the "intent" given that client/server roles can be reversed in WoT easily. I am going to try to hammer down today and at least get drafts in for 2.12-2.17. |
Some thoughts on the rest of the questions: |
After this commit, can be considered a first draft.
I've completed a first draft of answers to all the questions. Please review. Note that at this point we will probably use one set of answers for all deliverables (the answers point at particular deliverables when appropriate). At some point I will remove the old answers, or archive them in a different file. |
Deleting copies of old questions and answers (they were only to be used as source material for the new answers).
updated intro and background. Hopefully addressed feedback by @mlagally in those sections, but also allows checking off that point in the PR/issue description.
Address remainder of @mlagally feedback
@mlagally I made a bunch of changes which I hope addressed many (but not all) of your review points. Can you review and mark as resolved the ones where your concerns were addressed? I marked as resolved the ones that were obvious (e.g. typo fixes). |
use credentials to access other devices. However, these are generally | ||
to secure M2M communication and are not (or should not be) tied directly to | ||
user credentials used for other services. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This statement might be wrong. Why it should be different? A WoT Thing needs both require credentials no matter which/whom the Thing communicate.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
security TF: would be better to be more specific and talk about tokens and OAuth specifically, as opposed to "credentials", which is confusing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Modified text as follows:
A WoT Thing may have credentials to establish its identity (authentication) and allow for the creation of trusted secure communication channels with other trusted and authenticated entities. Additional authorization information may be used in addition to manage access rights to specific entities.
Authorizations for secure M2M communication may also reveal the identity
of the accessor but this may not be desired when the accessing entity is a
person or a device that can be associated with a person. In this case, mechanisms such as tokens and OAuth2 can be used, as with other web services, to avoid directly revealing user identities or requiring devices to associate authorizations directly with users.
Security TF:
|
added definition of "insecure interface", did a bit of cleanup (segmented network -> segmented secure network)
clean up authentication/authorization discussion
|
a "user interface" it will be more varied than that of the browser, | ||
may involve physical buttons and actuators not under the control of the usual | ||
HTML-based Web platform or programming model, | ||
and this UI will be under control of the device manufacturer, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We discussed auto-generating UIs on the consumer side, so this text is a bit too narrow.
Perhaps just "under control of the manufacturers"
Closing without merging, however, not discarding, will put in wot-architecture repo instead. |
from today's TD call:
|
Answers to current security and privacy questionnaire for TD 1.1 CR Process.
Questionnaire source:
Status:
To do: