-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify requirements #4
Comments
Okay. I'll try to make a draft proposal until this weekend. Please wait for a while. |
Just ping @dajiaji |
... pong @tomoyukilabs time= 2 months Very sorry for the late response. It's June already... As a starting point, I'd like to categorize requirements derived from use cases roughly as follows:
What do you think about it ? If you can agree with the outline, I'll upload a draft proposal for requirements (it'll include just a table of contents).
Thank you for providing the items. But it is a little bit difficult for me to extract requirements by categorizing the use cases based on the items.
I think all of the use cases basically have the same network environment (the secure context is loaded from the internet and the target device and the UA are connected to the local network).
I think that it is too early to discuss the type of CA that depends on a solution for HTTPS/WSS in local network.
Sorry. I can't understand this item. Does the 'privacy' mean the disclosure scope of domain names ? If it is true, I think that it depends on a solution as is the case with the CA above. |
Many thanks, @dajiaji! Please submit your proposal draft as a PR, and then I'll review and approve it.
Okay. Initially, we will only assume mixed environment of secure context and local network for now. We can add another environment at any time, of course.
Oops. I didn't take care about it so much. It was just an idea.
What I have meant by this sentence is just to clarify who would trust devices or users, for example:
|
Thanks for your quick reply.
I've submitted a draft as a PR. I'd appreciate it if you check and review it.
Okay. I finally understood what you meant. Such privacy analysis is important to extract requirements from the use cases. I added a Use Case Analysis section to the draft so I'd appreciate it if you modify it. |
I have some comments on the requirements on Device Discovery. REQ-01: Device Discovery
The "securely discover" should be clarified. I think of it as follows. I do not have any issues on (2) and (3), but (1). Is it done by public authorities, private authority, or a user? Does UA should be authenticated as well as devices?
It is unclear to me if UA needs to know target device capabilities. If such information is just presented to a user, any arbitrary description about device may be sufficient.
I agree on this.
I suggest to remove "if there are multiple devices in local network" or change to "when ...".
I suggest to rephrase as follows.
|
I have a comment on REQ-2 authentication. Assuming UA supports Mixed Content and CORS(w/ credientials), The following two requirements of REQ-02 can be supported if UA can authenticate device as secure content. I suggest the change as follows. (Original)
The outstanding open issue is what such local networked device can support https or wss. The derived requirement may be as follows, but it should be discussed in REQ-3.
|
@igarashi50 My comments are inline below.
I agree with this comment, but
I suppose that these properties could be applied to connection establishment rather than the device discovery phase, since neither mDNS nor SSDP provides them, for example. What we should explore here is how to mitigate privacy leakage and possibilities of device scanning as much as possible, right?
I agree with this. IMO, device capability discovery itself seems out of scope. |
@igarashi50 several comments below:
I agree with this change. We can drop "secure context" here.
it is quite obvious that the UA should be compliant with the specs of Secure Contexts, Mixed Content, and CORS. I suppose that to explore how to connect the UA to the device under this restriction, we are going to discuss its solution in REC-03. What we should talk about in REQ-02 looks like how the UA could specify the target device correctly and prevent other devices from eavesdropping and impersonating the device. This requirement could be similar to privacy and security requirements of Open Screen Protocol. Note that we should rather say, "restrict mixed content". (Please refer to Mixed Content spec) |
As a next step, I would like to start analyzing requirements. While the following items could be examples, I would like to ask you to add or modify them. Since these would be dependent on use cases, these items should be clarified per each use case.
@dajiaji Could you add an initial proposal, base on use cases indicated by you?
The text was updated successfully, but these errors were encountered: