Re: WebCrypto for http:// origins

2014-09-11 Thread helpcrypto helpcrypto
On Thu, Sep 11, 2014 at 6:58 PM, Adam Roach wrote: > When you force people into an "all or nothing" situation regarding > security, > Nature finds his own way: As nothing was invented for doing Javscript Cryptography, someone started using Java Applets. Java applets are much more insecure than t

Re: WebCrypto for http:// origins

2014-09-11 Thread Henri Sivonen
On Thu, Sep 11, 2014 at 6:56 PM, Richard Barnes wrote: > No, WebCrypto on an http:// origin is not a replacement for TLS. Addressing confusion on this point seems to be the main driver of Chrome's restriction of Web Crypto to authenticated origins. Is there any way to quantify in advance how dama

http-schemed URLs and HTTP/2 over unauthenticated TLS (was: Re: WebCrypto for http:// origins)

2014-09-11 Thread Henri Sivonen
On Thu, Sep 11, 2014 at 9:00 PM, Richard Barnes wrote: > > On Sep 11, 2014, at 9:08 AM, Anne van Kesteren wrote: > >> On Thu, Sep 11, 2014 at 5:56 PM, Richard Barnes wrote: >>> Most notably, even over non-secure origins, application-layer encryption >>> can provide resistance to passive adversa

Re: WebCrypto for http:// origins

2014-09-11 Thread Robert O'Callahan
Is the argument still valid that active attacks are detectable while passive attacks are not, making the costs/risks to an active attacker significantly higher? Rob -- oIo otoeololo oyooouo otohoaoto oaonoyooonoeo owohooo oioso oaonogoroyo owoiotoho oao oboroootohoeoro oooro osoiosotoeoro owoiolo

Re: Intent to implement: Touchpad event

2014-09-11 Thread Jonas Sicking
On Thu, Sep 11, 2014 at 3:21 PM, Ehsan Akhgari wrote: > On 2014-09-11, 5:54 PM, smaug wrote: >> If we just needs new coordinates, couldn't we extend the existing event >> interfaces with some new properties? > > Yeah, this seems like the way to go to me as well. Do we currently dispatch pointer

Re: Intent to implement: Touchpad event

2014-09-11 Thread Ehsan Akhgari
On 2014-09-11, 5:54 PM, smaug wrote: > If we just needs new coordinates, couldn't we extend the existing event > interfaces with some new properties? Yeah, this seems like the way to go to me as well. > On 09/12/2014 12:52 AM, smaug wrote: >> What would be the event types for touchpad events? >>

Re: Intent to implement: Touchpad event

2014-09-11 Thread smaug
On 09/11/2014 08:26 PM, Chris Peterson wrote: On 9/11/14 3:49 AM, Mounir Lamouri wrote: On Thu, 11 Sep 2014, at 18:26, Ms2ger wrote: First of all, you neglected to explain the standardization situation here. Is this feature being standardized? If not, why not? How do other browser vendors feel

Re: Intent to implement: Touchpad event

2014-09-11 Thread smaug
If we just needs new coordinates, couldn't we extend the existing event interfaces with some new properties? -Olli On 09/12/2014 12:52 AM, smaug wrote: > What would be the event types for touchpad events? > We must not add yet another types of events to handle pointer type of events. > > > A

Re: Intent to implement: Touchpad event

2014-09-11 Thread smaug
What would be the event types for touchpad events? We must not add yet another types of events to handle pointer type of events. And besides, touch event model is rather horrible, so if we for some strange reason need totally new events, I'd prefer using something closer to pointer events. -Ol

Re: WebCrypto for http:// origins

2014-09-11 Thread Richard Barnes
On Sep 11, 2014, at 9:08 AM, Anne van Kesteren wrote: > On Thu, Sep 11, 2014 at 5:56 PM, Richard Barnes wrote: >> Most notably, even over non-secure origins, application-layer encryption can >> provide resistance to passive adversaries. > > See https://twitter.com/sleevi_/status/5097237753491

Re: Intent to implement: Touchpad event

2014-09-11 Thread Chris Peterson
On 9/11/14 3:49 AM, Mounir Lamouri wrote: On Thu, 11 Sep 2014, at 18:26, Ms2ger wrote: First of all, you neglected to explain the standardization situation here. Is this feature being standardized? If not, why not? How do other browser vendors feel about it? Where does this stand in the curren

Re: Intent to implement: Touchpad event

2014-09-11 Thread Jonas Sicking
Hi Kershaw, Has there been any discussions with other browser vendors about this API? Or is there an official standard somewhere for them? If not, I don't think that we'll want to expose this to the web at large. It would still be fine to expose to certified apps, or even to expose to privileged

Re: Restricting gUM to authenticated origins only

2014-09-11 Thread Martin Thomson
On 2014-09-11, at 10:04, Anne van Kesteren wrote: > Well, if there's https://maps.example/ that I share my location with, > we could make it so that it if https://maps.example/ is embedded from > https://mercent.example/, it no longer has the permission. That's what > I meant with partitioning b

Re: Restricting gUM to authenticated origins only

2014-09-11 Thread Anne van Kesteren
On Thu, Sep 11, 2014 at 6:58 PM, Martin Thomson wrote: > On 2014-09-11, at 00:56, Anne van Kesteren wrote: >> Are we actually partitioning permissions per top-level browsing >> context or could they already accomplish this through an ? > > As far as I understand it, permissions are based on domai

Re: WebCrypto for http:// origins

2014-09-11 Thread Adam Roach
On 9/11/14 11:08, Anne van Kesteren wrote: On Thu, Sep 11, 2014 at 5:56 PM, Richard Barnes wrote: Most notably, even over non-secure origins, application-layer encryption can provide resistance to passive adversaries. See https://twitter.com/sleevi_/status/509723775349182464 for a long thread

Re: Restricting gUM to authenticated origins only

2014-09-11 Thread Martin Thomson
On 2014-09-11, at 00:56, Anne van Kesteren wrote: > Are we actually partitioning permissions per top-level browsing > context or could they already accomplish this through an ? As far as I understand it, permissions are based on domain name only, they don’t include scheme or port from the origi

Re: WebCrypto for http:// origins

2014-09-11 Thread Anne van Kesteren
On Thu, Sep 11, 2014 at 5:56 PM, Richard Barnes wrote: > Most notably, even over non-secure origins, application-layer encryption can > provide resistance to passive adversaries. See https://twitter.com/sleevi_/status/509723775349182464 for a long thread on Google's security people not being par

WebCrypto for http:// origins

2014-09-11 Thread Richard Barnes
Hey all, Sorry for being late to the party here. I now subscribe to dev.platform :) On the issue of whether WebCrypto should be restricted to secure origins: In discussions I've had with folks around Mozilla, we have not seen sufficient security risks to motivate cutting off the potential bene

Re: Running mozharness locally and be able to reach private files

2014-09-11 Thread Armen Zambrano G.
On 14-09-11 09:03 AM, Joshua Cranmer 🐧 wrote: > On 9/11/2014 7:58 AM, Armen Zambrano G. wrote: >> What would people want to see in the long term to make mozharness easier >> for you? > > A Dockerfile (or a container image) that produces a Ubuntu64 test slave. > Hi Joshua, that would be ideal, how

Re: Continued support for ESR

2014-09-11 Thread Mike Hoye
On 2014-09-10 10:32 PM, Philip Chee wrote: “New personal versions of Firefox are released roughly every six weeks,” writes Oracle's Steven Chan. “It is impractical for us to certify these new personal versions of Firefox with the Oracle E-Business Suite because a given Firefox release is general

Re: Intent to implement: Touchpad event

2014-09-11 Thread Kershaw Chang
Hi Mounir, The finger activity on touchpad can be still translated to touch event and mouse event as usual. But for the application that wants to know the absolute finger position on touchpad, we will need this new touchpad event. So, this proposal is about creating new standard rather than re-usi

Re: Intent to implement: Touchpad event

2014-09-11 Thread Kershaw Chang
Hi Ms2ger, Please see my response below. Thanks and regards, Kershaw 於 2014/9/11 下午4:26,"Ms2ger" 寫道: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >On 09/11/2014 08:18 AM, Kershaw Chang wrote: > >First of all, you neglected to explain the standardization situation >here. Is this feature be

Re: Running mozharness locally and be able to reach private files

2014-09-11 Thread Joshua Cranmer 🐧
On 9/11/2014 7:58 AM, Armen Zambrano G. wrote: What would people want to see in the long term to make mozharness easier for you? A Dockerfile (or a container image) that produces a Ubuntu64 test slave. -- Joshua Cranmer Thunderbird and DXR developer Source code archæologist __

Running mozharness locally and be able to reach private files

2014-09-11 Thread Armen Zambrano G.
Hello all, It is now less hard to run mozharness locally by appending --cfg developer_config.py to production commands. Appending the config will activate a developer mode which does the following: * Remove hard coded paths for binaries * Substitute internal URLs to point to externally reachable U

Re: Intent to implement: Touchpad event

2014-09-11 Thread Mounir Lamouri
On Thu, 11 Sep 2014, at 18:26, Ms2ger wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 09/11/2014 08:18 AM, Kershaw Chang wrote: > > First of all, you neglected to explain the standardization situation > here. Is this feature being standardized? If not, why not? How do > other brow

Re: Intent to implement: Touchpad event

2014-09-11 Thread Ms2ger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 09/11/2014 08:18 AM, Kershaw Chang wrote: First of all, you neglected to explain the standardization situation here. Is this feature being standardized? If not, why not? How do other browser vendors feel about it? > +interface TouchPadEvent : UIEv

Re: Restricting gUM to authenticated origins only

2014-09-11 Thread Anne van Kesteren
On Thu, Sep 11, 2014 at 1:50 AM, Martin Thomson wrote: > That is devious. I suspect that there is a banal reason relating to the use > of the Google Front End that motivates the change, but the side effect of > having all Google properties have access to user permissions from all other > prope