Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Byron Jones
Lawrence Mandel wrote: +1 to Milan's suggestion. These fields are used somewhat consistently on stability and graphics bugs, which release management pays attention to. If we are going to continue with the fields, I like the idea of "Not specified" as that makes it clear that no value was set

Re: Runnables and thread-unsafe members

2015-04-14 Thread Jan-Ivar Bruaroey
On 4/14/15 5:39 PM, Randell Jesup wrote: I wonder if we could move to requiring already_AddRefed for DispatchToMainThread (and Dispatch?), and thus block all attempts to do DispatchToMainThread(new FooRunnable), etc. :-) Yes! +1. I like the .forget() semantics, but just to have options, here'

Intent to ship: Enabling TSF mode in release builds (Vista or later)

2015-04-14 Thread Masayuki Nakano
TSF (Text Services Framework) is new API for IME on Windows. And also it supports not only CJK-IME, e.g., speech input system, handwriting system. https://msdn.microsoft.com/en-us/library/windows/desktop/ms629032%28v=vs.85%29.aspx This will be enabled only on Vista or later since TSF on WinXP (a

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Karl Dubost
Henri, great points, about… Le 14 avr. 2015 à 19:29, Henri Sivonen a écrit : > Currently, the UI designation for http is neutral while the UI > designation for mixed content is undesirable. I think we should make > the UI designation of plain http undesirable once x% the sites that > users encoun

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Cameron Kaiser
On 4/14/15 3:47 PM, commodorej...@gmail.com wrote: On Tuesday, April 14, 2015 at 2:51:32 PM UTC-7, Cameron Kaiser wrote: Candidly, and not because I still run such a site, I've always found Gopher to be a better fit for resource-constrained computing. The Commodore 128 sitting next to me does ve

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Lawrence Mandel
+1 to Milan's suggestion. These fields are used somewhat consistently on stability and graphics bugs, which release management pays attention to. If we are going to continue with the fields, I like the idea of "Not specified" as that makes it clear that no value was set whereas "All" is currently u

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Eric Rescorla
+1 On Tue, Apr 14, 2015 at 3:59 PM, Justin Dolske wrote: > On 4/14/15 8:40 AM, Dave Townsend wrote: > >> I've gotten used to just >> ignoring these fields and reading the bugs instead. I wouldn't feel any >> loss if they were just removed from display entirely. >> > > +1. The fields are broadly

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Justin Dolske
On 4/14/15 8:40 AM, Dave Townsend wrote: I've gotten used to just ignoring these fields and reading the bugs instead. I wouldn't feel any loss if they were just removed from display entirely. +1. The fields are broadly unreliable, and we should just remove them. I think I've seen the whiteboar

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread commodorejohn
On Tuesday, April 14, 2015 at 2:51:32 PM UTC-7, Cameron Kaiser wrote: > Candidly, and not because I still run such a site, I've always found > Gopher to be a better fit for resource-constrained computing. The > Commodore 128 sitting next to me does very well for that because the > protocol and m

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Joshua Cranmer 🐧
On 4/14/2015 4:59 PM, northrupthebandg...@gmail.com wrote: The article assumes that when folks connect to something via SSH and > something changes - causing MITM-attack warnings and a refusal to > connect - folks default to just removing the existing entry in > ~/.ssh/known_hosts without actua

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Tue, Apr 14, 2015 at 5:59 PM, wrote: > On Tuesday, April 14, 2015 at 5:39:24 AM UTC-7, Gervase Markham wrote: > > On 14/04/15 01:57, northrupt...@gmail.com wrote: > > > * Less scary warnings about self-signed certificates (i.e. treat > > > HTTPS+selfsigned like we do with HTTP now, and treat H

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread northrupthebandgeek
On Tuesday, April 14, 2015 at 5:39:24 AM UTC-7, Gervase Markham wrote: > On 14/04/15 01:57, northrupt...@gmail.com wrote: > > * Less scary warnings about self-signed certificates (i.e. treat > > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do > > with HTTPS+selfsigned now); the

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Adam Roach
On 4/14/15 16:32, northrupthebandg...@gmail.com wrote: *By logical measure*, the [connection] that is encrypted but unauthenticated is more secure than the one that is neither encrypted nor authenticated, and the fact that virtually every HTTPS-supporting browser assumes the precise opposite i

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Cameron Kaiser
On 4/14/15 10:38 AM, Eric Shepherd wrote: Richard Barnes wrote: As the owner of a Mac SE/30 with an 100MB Ethernet card, I sympathize. However, consider it part of the challenge! :) There are definitely TLS stacks that work on some pretty small devices. That's a lot faster machine than the o

Re: Runnables and thread-unsafe members

2015-04-14 Thread Bobby Holley
+1. On Tue, Apr 14, 2015 at 2:42 PM, Kyle Huey wrote: > On Tue, Apr 14, 2015 at 2:39 PM, Randell Jesup > wrote: > > (was: Re: Proposal to ban the usage of refcounted objects inside C++ > > lambdas in Gecko) > > > > tl;dr: We should make DispatchToMainThread take already_AddRefed and > > move aw

Re: Runnables and thread-unsafe members

2015-04-14 Thread Kyle Huey
On Tue, Apr 14, 2015 at 2:39 PM, Randell Jesup wrote: > (was: Re: Proposal to ban the usage of refcounted objects inside C++ > lambdas in Gecko) > > tl;dr: We should make DispatchToMainThread take already_AddRefed and > move away from raw ptrs for Dispatches in general. Agreed. - Kyle __

Runnables and thread-unsafe members

2015-04-14 Thread Randell Jesup
(was: Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko) tl;dr: We should make DispatchToMainThread take already_AddRefed and move away from raw ptrs for Dispatches in general. So: What I want to avoid is this pattern for runnables that hold thread-restricted pointe

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Chris Peterson
On 4/14/15 3:29 AM, Henri Sivonen wrote: Specifically, on point #2, I think we should start by, by default, forgetting all cookies that don't have the "secure" flag set at the end of the Firefox session. Persistent cookies have two main use cases: * On login-requiring sites, not requiring the u

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread northrupthebandgeek
On Monday, April 13, 2015 at 8:26:59 PM UTC-7, ipar...@gmail.com wrote: > > * Less scary warnings about self-signed certificates (i.e. treat > > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do with > > HTTPS+selfsigned now); the fact that self-signed HTTPS is treated as less

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Adam Roach
On 4/14/15 15:35, emmanueldeloge...@gmail.com wrote: Will Mozilla start to offer certificates to every single domain name owner ? Yes [1]. https://letsencrypt.org/ [1] I'll note that Mozilla is only one of several organizations involved in making this effort happen. -- Adam Roach Pri

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread emmanueldeloget53
Hello, On Monday, April 13, 2015 at 4:57:58 PM UTC+2, Richard Barnes wrote: > In order to encourage web developers to move from HTTP to HTTPS, I would > like to propose establishing a deprecation plan for HTTP without security. > > > > Thanks, > --Richard While I fully understand what's at sta

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread connor . behan
HTTPS has its moments, but the majority of the web does not need it. I certainly wouldn't appreciate the encryption overhead just for visiting David's lolcats website. As one of the most important organizations related to free software, it's sad to see Mozilla developers join the war on plaintex

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Ehsan Akhgari
On 2015-04-14 12:41 PM, Jan-Ivar Bruaroey wrote: 2. lambda capture use safer copy construction by default (hence the standout [&] above for reviewers). There is nothing safe about copying raw pointers to refcounted objects. There's nothing safe about copying raw pointers to heap object

MemShrink Meeting - Today, 14 Apr 2015 at 1:00pm PDT

2015-04-14 Thread Jet Villegas
The next MemShrink meeting is brought to you by delayed Desktop Reader parsing: https://bugzilla.mozilla.org/show_bug.cgi?id=1142183 The wiki page for this meeting is at: https://wiki.mozilla.org/Performance/MemShrink Agenda: * Prioritize unprioritized MemShrink bugs. * Discuss how we measure

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Eric Shepherd
Richard Barnes wrote: As the owner of a Mac SE/30 with an 100MB Ethernet card, I sympathize. However, consider it part of the challenge! :) There are definitely TLS stacks that work on some pretty small devices. That's a lot faster machine than the ones I play with. My fastest retro machine

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Martin Thomson
On Tue, Apr 14, 2015 at 3:29 AM, Henri Sivonen wrote: > Specifically, on point #2, I think we should start by, by default, > forgetting all cookies that don't have the "secure" flag set at the > end of the Firefox session. Persistent cookies have two main use > cases: > * On login-requiring sites

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread mh . in . england
> We believe that security includes confidentiality, which that would approach > would lack. Hey Joel, SSL already leaks which domain name you are visiting anyway, so the most confidentiality this can bring you is hiding the specific URL involved in a cache miss. That's a fairly narrow upgrade

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread jww
Hi Mozilla friends. Glad to see this proposal! As Richard mentions, we over on Chromium are working on a similar plan, albeit limited to "powerful features." I just wanted to mention that regarding subresource integrity (https://w3c.github.io/webappsec/specs/subresourceintegrity/), the general

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Jan-Ivar Bruaroey
On 4/14/15 10:06 AM, Ehsan Akhgari wrote: On 2015-04-13 1:36 PM, Jan-Ivar Bruaroey wrote: The above is a raw pointer bug, not a lambda bug. Yes, I'm aware. Please see bug 1114683. Thanks, I was not aware of this larger effort. This somewhat addresses my concern that we seem overly focused

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Andrew McCreight
On Tue, Apr 14, 2015 at 8:40 AM, Dave Townsend wrote: > Are the platform fields actually useful? Most bugs apply to all platforms > and in the cases that don't it is normally clear from the bug conversation > that it is platform specific. It seems like we rarely go an update the > platform fields

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Milan Sreckovic
Having that field be wrong is worse than not having it, no doubt about that, but if we had a way of making sure that field actually contains correct information, it would be extremely useful to the graphics team. I don’t have the numbers, but it certainly feels like a large majority of the bugs

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Benjamin Smedberg
On 4/14/2015 11:40 AM, Dave Townsend wrote: Are the platform fields actually useful? Most bugs apply to all platforms and in the cases that don't it is normally clear from the bug conversation that it is platform specific. It seems like we rarely go an update the platform fields to match the ac

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Boris Zbarsky
On 4/14/15 11:53 AM, justin.kru...@gmail.com wrote: Dynamic DNS might be difficult to run on HTTPS as the IP address needs to change when say your cable modem IP updates. Justin, I'm not sure I follow the problem here. If I understand correctly, you're talking about a domain name, say "foo.b

Re: Intent to deprecate: doppler computation in the PannerNode/AudioListener

2015-04-14 Thread Ehsan Akhgari
On 2015-04-14 9:07 AM, Paul Adenot wrote: Additionally, if someone has an idea on what to link to/what to say in the actual deprecation notice, I'm all ears, the current message is more or less a placeholder. Perhaps we can document this in more detail on MDN and link to the docs page? _

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Adam Roach
On 4/14/15 10:53, justin.kru...@gmail.com wrote: Dynamic DNS might be difficult to run on HTTPS as the IP address needs to change when say your cable modem IP updates. HTTPS only would make running personal sites more difficult for individuals, and would make the internet slightly less democr

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread justin . kruger
Dynamic DNS might be difficult to run on HTTPS as the IP address needs to change when say your cable modem IP updates. HTTPS only would make running personal sites more difficult for individuals, and would make the internet slightly less democratic. On Monday, April 13, 2015 at 7:57:58 AM UTC-

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread david . a . p . lloyd
> There are already multiple sources of free publicly-trusted certificates, > with more on the way. > https://www.startssl.com/ > https://buy.wosign.com/free/ > https://blog.cloudflare.com/introducing-universal-ssl/ > https://letsencrypt.org/ > I think that you should avoid making this an exerci

Re: changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Dave Townsend
Are the platform fields actually useful? Most bugs apply to all platforms and in the cases that don't it is normally clear from the bug conversation that it is platform specific. It seems like we rarely go an update the platform fields to match the actual state of the bug. And then there is the pro

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 7:13 PM, Karl Dubost wrote: > Richard, > > Le 13 avr. 2015 à 23:57, Richard Barnes a écrit : > > There's pretty broad agreement that HTTPS is the way forward for the web. > > Yes, but that doesn't make deprecation of HTTP a consensus. > > > In order to encourage web devel

changing the default platform and operating-system on bugzilla.mozilla.org to all / all

2015-04-14 Thread Byron Jones
bugzilla has a set of fields, "hardware" and "operating system", that i'll collectively call "platform" in this post. their default values are detected from the reporter's user-agent string when a bug is created. unfortunately on bmo, the platform fields have two distinctly different meanings

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Tue, Apr 14, 2015 at 9:57 AM, wrote: > I'm curious as to what would happen with things that cannot have TLS > certificates: routers and similar web-configurable-only devices (like small > PBX-like devices, etc). > > They don't have a proper domain, and may grab an IP via radvd (or dhcp on > IP

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Tue, Apr 14, 2015 at 8:32 AM, Eric Shepherd wrote: > Joshua Cranmer [image: 🐧] wrote: > >> If you actually go to read the details of the proposal rather than >> relying only on the headline, you'd find that there is an intent to >> actually let you continue to use http for, e.g., localhost. Th

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Tue, Apr 14, 2015 at 3:55 AM, Yoav Weiss wrote: > On Tue, Apr 14, 2015 at 8:22 AM, Anne van Kesteren > wrote: > > > On Tue, Apr 14, 2015 at 7:52 AM, Yoav Weiss wrote: > > > Limiting new features does absolutely nothing in that aspect. > > > > Hyperbole much? CTO of the New York Times cited H

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 10:10 PM, Karl Dubost wrote: > > Le 14 avr. 2015 à 10:43, imfasterthanneutr...@gmail.com a écrit : > > I don't think the current CA system is broken. > > The current CA system creates issues for certain categories of population. > It is broken in some ways. > > > The domai

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 11:26 PM, wrote: > > * Less scary warnings about self-signed certificates (i.e. treat > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do with > HTTPS+selfsigned now); the fact that self-signed HTTPS is treated as less > secure than HTTP is - to put this

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 9:43 PM, wrote: > On Monday, April 13, 2015 at 8:57:41 PM UTC-4, northrupt...@gmail.com > wrote: > > > > * Less scary warnings about self-signed certificates (i.e. treat > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do with > HTTPS+selfsigned now); th

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Eric Rescorla
On Tue, Apr 14, 2015 at 7:01 AM, Aryeh Gregor wrote: > On Tue, Apr 14, 2015 at 3:36 PM, Gervase Markham wrote: > > Yep. That's the system working. CA does something they shouldn't, we > > find out, CA is no longer trusted (perhaps for a time). > > > > Or do you have an alternative system design

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 7:03 PM, Martin Thomson wrote: > On Mon, Apr 13, 2015 at 3:53 PM, Eugene > wrote: > > In addition to APIs, I'd like to propose prohibiting caching any > resources loaded over insecure HTTP, regardless of Cache-Control header, in > Phase 2.N. > > This has some negative con

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Richard Barnes
On Mon, Apr 13, 2015 at 5:11 PM, wrote: > One limiting factor is that Firefox doesn't treat form data the same on > HTTPS sites. > > Examples: > > > http://stackoverflow.com/questions/14420624/how-to-keep-changed-form-content-when-leaving-and-going-back-to-https-page-wor > > > http://stackoverflo

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Ehsan Akhgari
On 2015-04-13 1:36 PM, Jan-Ivar Bruaroey wrote: On 4/10/15 2:09 PM, Seth Fowler wrote: On Apr 10, 2015, at 8:46 AM, Ehsan Akhgari wrote: I would like to propose that we should ban the usage of refcounted objects inside lambdas in Gecko. Here is the reason: Consider the following code: nsINo

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Aryeh Gregor
On Tue, Apr 14, 2015 at 3:36 PM, Gervase Markham wrote: > Yep. That's the system working. CA does something they shouldn't, we > find out, CA is no longer trusted (perhaps for a time). > > Or do you have an alternative system design where no-one ever makes a > mistake and all the actors are trustw

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread hugoosvaldobarrera
I'm curious as to what would happen with things that cannot have TLS certificates: routers and similar web-configurable-only devices (like small PBX-like devices, etc). They don't have a proper domain, and may grab an IP via radvd (or dhcp on IPv4), so there's no certificate to be had. They'd

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Ehsan Akhgari
On 2015-04-10 9:43 PM, Gregory Szorc wrote: On Fri, Apr 10, 2015 at 11:46 AM, Ehsan Akhgari mailto:ehsan.akhg...@gmail.com>> wrote: I would like to propose that we should ban the usage of refcounted objects inside lambdas in Gecko. Here is the reason: Consider the following cod

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Ehsan Akhgari
On 2015-04-13 1:55 PM, Trevor Saunders wrote: On Mon, Apr 13, 2015 at 01:28:05PM -0400, Ehsan Akhgari wrote: On 2015-04-13 5:26 AM, Nicolas B. Pierron wrote: On 04/10/2015 07:47 PM, Ehsan Akhgari wrote: On 2015-04-10 1:41 PM, Nicolas B. Pierron wrote: Also, what is the alternative? Acquiring

Re: Proposal to ban the usage of refcounted objects inside C++ lambdas in Gecko

2015-04-14 Thread Ehsan Akhgari
On 2015-04-10 9:43 PM, Gregory Szorc wrote: On Fri, Apr 10, 2015 at 11:46 AM, Ehsan Akhgari mailto:ehsan.akhg...@gmail.com>> wrote: I would like to propose that we should ban the usage of refcounted objects inside lambdas in Gecko. Here is the reason: Consider the following cod

Intent to deprecate: doppler computation in the PannerNode/AudioListener

2015-04-14 Thread Paul Adenot
Continuing on the path to a less broken panning model on the Web Audio API, this is a followup to [0] The Web Audio API has a number of API that allow setting the velocity of a "listener" and a "panner", along with the speed of sound, and a "doppler factor", to be able to automatically pitch up or

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread david . a . p . lloyd
> Yep. That's the system working. CA does something they shouldn't, we > find out, CA is no longer trusted (perhaps for a time). > > Or do you have an alternative system design where no-one ever makes a > mistake and all the actors are trustworthy? > > Gerv Yes - as I said previously. Do the ex

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Gervase Markham
On 14/04/15 08:51, lorenzo.kel...@gmail.com wrote: > 1) Caching proxies: resources obtained over HTTPS cannot be cached by > a proxy that doesn't use MITM certificates. If all users must move to > HTTPS there will be no way to re-use content downloaded for one user > to accelerate another user. Thi

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread enaeher
On Tuesday, April 14, 2015 at 3:05:09 AM UTC-5, Anne van Kesteren wrote: > This definitely needs more research > but shouldn't preclude rolling out HTTPS on public resources. The proposal as presented is not limited to public resources. The W3C Privileged Context draft which it references exempt

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Gervase Markham
On 14/04/15 08:47, david.a.p.ll...@gmail.com wrote: >> realistic idea. Meanwhile, HTTPS exists, is widely deployed, works, >> and is the focus of this thread. > > http://www.zdnet.com/article/google-banishes-chinas-main-digital-certificate-authority-cnnic/ > > > Sure it works :) Yep. That's t

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Gervase Markham
On 14/04/15 01:57, northrupthebandg...@gmail.com wrote: > * Less scary warnings about self-signed certificates (i.e. treat > HTTPS+selfsigned like we do with HTTP now, and treat HTTP like we do > with HTTPS+selfsigned now); the fact that self-signed HTTPS is > treated as less secure than HTTP is -

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Eric Shepherd
Joshua Cranmer 🐧 wrote: If you actually go to read the details of the proposal rather than relying only on the headline, you'd find that there is an intent to actually let you continue to use http for, e.g., localhost. The exact boundary between "secure" HTTP and "insecure" HTTP is being active

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread david . a . p . lloyd
> Something entirely off-topic: I'd like to inform people that your replies to > popular threads like this unsigned, with only a notion of identity in an > obscure email address, makes me - and I'm sure others too - skip your message > or worse; not take it seriously. Not everyone has the lux

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Boris Zbarsky
On 4/14/15 3:28 AM, Anne van Kesteren wrote: On Tue, Apr 14, 2015 at 4:10 AM, Karl Dubost wrote: 1. You do not need to register a domain name to have a Web site (IP address) Name one site you visit regularly that doesn't have a domain name. My router's configuration UI. Here "regularly" is

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Henri Sivonen
On Mon, Apr 13, 2015 at 5:57 PM, Richard Barnes wrote: > There's pretty broad agreement that HTTPS is the way forward for the web. > In recent months, there have been statements from IETF [1], IAB [2], W3C > [3], and even the US Government [4] calling for universal use of > encryption, which in th

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Mike de Boer
> On 14 Apr 2015, at 11:42, intellectu...@gmail.com wrote: > Something entirely off-topic: I’d like to inform people that your replies to popular threads like this unsigned, with only a notion of identity in an obscure email address, makes me - and I’m sure others too - skip your message or w

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread intellectueel
Op maandag 13 april 2015 16:57:58 UTC+2 schreef Richard Barnes: > There's pretty broad agreement that HTTPS is the way forward for the web. > In recent months, there have been statements from IETF [1], IAB [2], W3C > [3], and even the US Government [4] calling for universal use of > encryption, whi

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Yoav Weiss
On Tue, Apr 14, 2015 at 10:43 AM, Anne van Kesteren wrote: > On Tue, Apr 14, 2015 at 10:39 AM, Yoav Weiss wrote: > > Deprecating HTTP is totally justified. Enabling some features on HTTP but > > not others is not, unless there's a real technical reason why these new > > features shouldn't be ena

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Alex C
On Tuesday, April 14, 2015 at 8:44:25 PM UTC+12, Anne van Kesteren wrote: > I don't follow. If HTTP is no longer a first-class citizen, why do we > need to treat it as such? When it takes *more* effort to disable certain features on HTTP, than to let them work. ___

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Alex C
On Tuesday, April 14, 2015 at 8:44:25 PM UTC+12, Anne van Kesteren wrote: > I don't follow. If HTTP is no longer a first-class citizen, why do we > need to treat it as such? When it would take more effort to disable a feature on HTTP than to let it work, and yet the feature is disabled anyway, th

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Anne van Kesteren
On Tue, Apr 14, 2015 at 10:39 AM, Yoav Weiss wrote: > Deprecating HTTP is totally justified. Enabling some features on HTTP but > not others is not, unless there's a real technical reason why these new > features shouldn't be enabled. I don't follow. If HTTP is no longer a first-class citizen, wh

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Yoav Weiss
On Tue, Apr 14, 2015 at 10:07 AM, Anne van Kesteren wrote: > On Tue, Apr 14, 2015 at 9:55 AM, Yoav Weiss wrote: > > You're inflicting developer pain without any real justification. A sort > of > > collective punishment, if you will. > > Why is that you think there is no justification in deprecat

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Anne van Kesteren
On Tue, Apr 14, 2015 at 9:55 AM, Yoav Weiss wrote: > You're inflicting developer pain without any real justification. A sort of > collective punishment, if you will. Why is that you think there is no justification in deprecating HTTP? >> (And anecdotally, I find it easier to convince developers

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Anne van Kesteren
On Tue, Apr 14, 2015 at 9:51 AM, wrote: > 1) Caching proxies: resources obtained over HTTPS cannot be cached by a proxy > that doesn't use MITM certificates. If all users must move to HTTPS there > will be no way to re-use content downloaded for one user to accelerate > another user. This is a

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread immibis
Another note: Nobody, to within experimental error, uses IP addresses to access public websites. But plenty of people use them for test servers, temporary servers, and embedded devices. (My home router is http://192.168.1.254/, do they need to get a certificate for 192.168.1.254? Or do home ro

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Yoav Weiss
On Tue, Apr 14, 2015 at 8:22 AM, Anne van Kesteren wrote: > On Tue, Apr 14, 2015 at 7:52 AM, Yoav Weiss wrote: > > Limiting new features does absolutely nothing in that aspect. > > Hyperbole much? CTO of the New York Times cited HTTP/2 and Service > Workers as a reason to start deploying HTTPS:

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread lorenzo . keller
> The goal of this thread is to determine whether there is support in the > Mozilla community for a plan of this general form. Developing a precise > plan will require coordination with the broader web community (other > browsers, web sites, etc.), and will probably happen in the W3C. > >From th

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread david . a . p . lloyd
> realistic idea. Meanwhile, HTTPS exists, is widely deployed, works, > and is the focus of this thread. http://www.zdnet.com/article/google-banishes-chinas-main-digital-certificate-authority-cnnic/ Sure it works :) ___ dev-platform mailing list dev-

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread immibis
> Secondly the proposal to restrain unrelated new features like CSS attributes > to HTTPS sites only is simply a form of strong-arming. Favoring HTTPS is fine > but authoritarianism is not. Please consider that everyone is capable of > making their own decisions. One might note that this has a

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Anne van Kesteren
On Tue, Apr 14, 2015 at 9:29 AM, wrote: > The trouble is: Just because something isn't perfect, doesn't make it a bad > idea. I think it's a pretty great idea and it's one people immediately think of. However, as those articles explain in detail, it's also a far from realistic idea. Meanwhile,

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread david . a . p . lloyd
> http://sockpuppet.org/blog/2015/01/15/against-dnssec/ > http://sockpuppet.org/stuff/dnssec-qa.html > https://www.imperialviolet.org/2015/01/17/notdane.html Yawn - those were all terrible articles. To summarise their points: "NSA is bad, some DNS servers are out of date, DNSSEC may be sti

Re: Intent to deprecate: Insecure HTTP

2015-04-14 Thread Anne van Kesteren
On Tue, Apr 14, 2015 at 4:10 AM, Karl Dubost wrote: > 1. You do not need to register a domain name to have a Web site (IP address) Name one site you visit regularly that doesn't have a domain name. And even then, you can get certificates for public IP addresses. > 2. You do not need to register