Re: [XHR] anonymous flag

2013-06-02 Thread Hallvord Reiar Michaelsen Steen
Den 1. juni 2013 kl. 10:14 skrev Anne van Kesteren : > On Thu, May 30, 2013 at 1:30 PM, Hallvord Reiar Michaelsen Steen > wrote: >> So creating a new tri-state property in the XHR spec should also simplify >> integration with the Fetch spec. > > Agreed. The question is, if we take it as a given

Re: Re: Re: [XHR] anonymous flag

2013-06-01 Thread Anne van Kesteren
On Thu, May 30, 2013 at 1:30 PM, Hallvord Reiar Michaelsen Steen wrote: > So creating a new tri-state property in the XHR spec should also simplify > integration with the Fetch spec. Agreed. The question is, if we take it as a given that we're going to get a new API (that uses futures, deals wit

Re: Re: Re: [XHR] anonymous flag

2013-05-30 Thread Hallvord Reiar Michaelsen Steen
> > OK then - Anne and others, what do you think about creating a new tri-state > > xhr.credentialsPolicy property and discouraging usage of > > xhr.withCredentials ? > > I think I'd prefer removing the constructor flag and leaving new > features to the API for Fetch. Sorry, I don't understan

Re: Re: [XHR] anonymous flag

2013-05-30 Thread Anne van Kesteren
On Thu, May 30, 2013 at 12:16 PM, Hallvord Reiar Michaelsen Steen wrote: > OK then - Anne and others, what do you think about creating a new tri-state > xhr.credentialsPolicy property and discouraging usage of xhr.withCredentials ? I think I'd prefer removing the constructor flag and leaving new

Re: Re: [XHR] anonymous flag

2013-05-30 Thread Hallvord Reiar Michaelsen Steen
> > Now, if you are still not convinced this is a good change my plan B is to > > suggest a "credentialsPolicy" property so we'll find an agreement anyway. > > :-) But maybe explaining that no quirky getter magic is required helps you > > see the proposal in a new light? > > Whatever we're doi

Re: [XHR] anonymous flag

2013-05-29 Thread Jonas Sicking
On Wed, May 29, 2013 at 1:19 PM, Hallvord Reiar Michaelsen Steen wrote: > I proposed that we >>> modify withCredentials to take three values: "samedomain" (default), >>> "always" and "never". For backwards compatibility with earlier versions of >>> the spec, setting withCredentials=true maps to

Re: [XHR] anonymous flag

2013-05-29 Thread Hallvord Reiar Michaelsen Steen
I proposed that we >> modify withCredentials to take three values: "samedomain" (default), >> "always" and "never". For backwards compatibility with earlier versions of >> the spec, setting withCredentials=true maps to "always" and >> withCredentials=false maps to "samedomain". But Jonas repli

Re: Re: Re: Re: Re: [XHR] anonymous flag

2013-05-28 Thread Jonas Sicking
On Tue, May 28, 2013 at 7:07 AM, Hallvord Reiar Michaelsen Steen wrote: > I wrote: > >> I would like to see some real code evidence that omitting Origin: >> and Referer: is necessary too. In theory sites might use them as >> "credentials" as you say, but in practise I don't see how that can >> wor

Re: Re: Re: Re: Re: [XHR] anonymous flag

2013-05-28 Thread Hallvord Reiar Michaelsen Steen
I wrote:  > I would like to see some real code evidence that omitting Origin: > and Referer: is necessary too. In theory sites might use them as > "credentials" as you say, but in practise I don't see how that can > work and be safe on the web. >   > If we ship XHR with an "anonymous" flag removi

Re: Re: Re: Re: [XHR] anonymous flag

2013-05-23 Thread Hallvord Reiar Michaelsen Steen
On Thu, May 23, 2013 at 1:55 AM, Hallvord Reiar Michaelsen Steen  < hallv...@opera.com> wrote: > Given that many services do (mistakenly or not) use Origin and/or Referer to > make > security choices, all these headers along with the cookie header ought to be > considered "credentials". Can

Re: Re: Re: [XHR] anonymous flag

2013-05-23 Thread ๏̯͡๏ Jasvir Nagra
On Thu, May 23, 2013 at 1:55 AM, Hallvord Reiar Michaelsen Steen < hallv...@opera.com> wrote: > > [Minor edit: fixed your true/false typo] > > > * If we had a better way of controlling the option to deny sending > credentials > > in a way that kept compatibility with legacy webpages (eg. a tristat

Re: Re: Re: [XHR] anonymous flag

2013-05-23 Thread Hallvord Reiar Michaelsen Steen
[Minor edit: fixed your true/false typo]   > * If we had a better way of controlling the option to deny sending credentials > in a way that kept compatibility with legacy webpages (eg. a tristate flag > like > you suggest in [6]), I agree it would be better than to have two different > flags > w

Re: Re: [XHR] anonymous flag

2013-05-22 Thread ๏̯͡๏ Jasvir Nagra
features of CORS. >> Is that true? If not, I'd like to see how close to that we can come. >> >> >> -- Forwarded message -- >> From: Hallvord Reiar Michaelsen Steen >> Date: Tue, May 21, 2013 at 1:41 PM >> Subject: Re: Re: [XHR] anonymous flag >>

Re: Re: [XHR] anonymous flag

2013-05-22 Thread ๏̯͡๏ Jasvir Nagra
d to use the UMP-enabling features of CORS. > Is that true? If not, I'd like to see how close to that we can come. > > > -- Forwarded message -- > From: Hallvord Reiar Michaelsen Steen > Date: Tue, May 21, 2013 at 1:41 PM > Subject: Re: Re: [XHR] anonymous

Re: Re: [XHR] anonymous flag

2013-05-21 Thread Hallvord Reiar Michaelsen Steen
Anne wrote: > I don't really feel it's responsible to remove this feature at this > point without anyone involved in the original discussion speaking up. Hi all, you were involved in a discussion [1] regarding UMP and CORS back in 2010. I know, it's a while ago, and apparently you had already be

Re: Re: Re: [XHR] anonymous flag

2013-05-18 Thread Hallvord Reiar Michaelsen Steen
> >> Making a boolean a tri-state with a > >> default depending on an external variable is also super confusing. > > > > To whom? > It seems confusing to anyone who reads the value. Good point. > What would it return > in the various situations? I.e. before and after .open() has been > call

Re: Re: [XHR] anonymous flag

2013-05-18 Thread Jonas Sicking
On Sat, May 18, 2013 at 1:43 PM, Hallvord Reiar Michaelsen Steen wrote: > >> > BTW - have you considered allowing setting withCredentials to "false" for >> > same-origin resources? >> > >> I suspect that would break sites. > > > Possibly, but I find it unlikely - if it's set, it's most likely usu

Re: Re: [XHR] anonymous flag

2013-05-18 Thread Hallvord Reiar Michaelsen Steen
> > BTW - have you considered allowing setting withCredentials to "false" for > > same-origin resources? > > I suspect that would break sites. Possibly, but I find it unlikely - if it's set, it's most likely usually set to "true", not "false", and it's also most likely rarely set for same-or

Re: [XHR] anonymous flag

2013-05-18 Thread Anne van Kesteren
On Sat, May 18, 2013 at 8:41 AM, Hallvord Reiar Michaelsen Steen wrote: > BTW - have you considered allowing setting withCredentials to "false" for > same-origin resources? I suspect that would break sites. Making a boolean a tri-state with a default depending on an external variable is also sup

Re: [XHR] anonymous flag

2013-05-18 Thread Hallvord Reiar Michaelsen Steen
BTW - have you considered allowing setting withCredentials to "false" for same-origin resources? As-is, the author may not expect what happens if she sets withCredentials to false, makes a cross-origin request, and the remote server redirects to a same-origin URL. Now cookies will be sent to th

Re: [XHR] anonymous flag

2013-05-17 Thread Hallvord Reiar Michaelsen Steen
Den 17. mai 2013 kl. 11:53 skrev Anne van Kesteren : > On Thu, May 16, 2013 at 10:35 PM, Hallvord Reiar Michaelsen Steen > wrote: >> Anonymous mode still seems like useless complexity to me, so I'm still in >> favour of dropping it. > > Right. I don't really get the feeling you're considering t

Re: [XHR] anonymous flag

2013-05-17 Thread Anne van Kesteren
On Fri, May 17, 2013 at 11:24 AM, Charles McCathie Nevile wrote: > With respect to your use case for keeping anonymous I agree with Hallvord. I > cannot think of a real use case for a browser-like thing that accepts > arbitrary URLs. Could you please provide some more explanation of the real > sce

Re: [XHR] anonymous flag

2013-05-17 Thread Charles McCathie Nevile
Hi Anne, Please stick to the technical discussion without making assertions about people's motives or actions for which you don't have concrete evidence. On Fri, 17 May 2013 13:53:08 +0400, Anne van Kesteren wrote: On Thu, May 16, 2013 at 10:35 PM, Hallvord Reiar Michaelsen Steen wro

Re: [XHR] anonymous flag

2013-05-17 Thread Anne van Kesteren
On Thu, May 16, 2013 at 10:35 PM, Hallvord Reiar Michaelsen Steen wrote: > Anonymous mode still seems like useless complexity to me, so I'm still in > favour of dropping it. Right. I don't really get the feeling you're considering the arguments carefully and since nobody else seems to be partici

Re: [XHR] anonymous flag

2013-05-16 Thread Hallvord Reiar Michaelsen Steen
Den 16. mai 2013 kl. 18:45 skrev Anne van Kesteren : > On Tue, May 14, 2013 at 11:46 AM, Hallvord Reiar Michaelsen Steen > wrote: >> Say, for example, OpenID is a setup where the user might provide an >> "untrusted" URL to a third-party web site ("Here's the service that can >> authenticate me"

Re: Re: [XHR] anonymous flag

2013-05-16 Thread Anne van Kesteren
On Tue, May 14, 2013 at 11:46 AM, Hallvord Reiar Michaelsen Steen wrote: > Say, for example, OpenID is a setup where the user might provide an > "untrusted" URL to a third-party web site ("Here's the service that can > authenticate me"), and XHR might be involved - but the Open ID *provider* >

Re: Re: [XHR] anonymous flag

2013-05-14 Thread Hallvord Reiar Michaelsen Steen
>>> Does anyone have real, non-contrived use cases for the anonymous flag? >> The basic idea was preventing confused deputy attacks by not exposing >> any information that could be used as such. So no credentials and no >> data about where the request originated from, forcing the architecture >

Re: [XHR] anonymous flag

2013-05-13 Thread Jonas Sicking
On Mon, May 13, 2013 at 2:28 PM, Anne van Kesteren wrote: > On Mon, May 13, 2013 at 10:57 AM, Hallvord Reiar Michaelsen Steen > wrote: >> Does anyone have real, non-contrived use cases for the anonymous flag? > > The basic idea was preventing confused deputy attacks by not exposing > any informat

Re: [XHR] anonymous flag

2013-05-13 Thread Anne van Kesteren
On Mon, May 13, 2013 at 10:57 AM, Hallvord Reiar Michaelsen Steen wrote: > Does anyone have real, non-contrived use cases for the anonymous flag? The basic idea was preventing confused deputy attacks by not exposing any information that could be used as such. So no credentials and no data about w

Re: [XHR] anonymous flag

2013-05-13 Thread Hallvord Reiar Michaelsen Steen
>>> Yes. It was added to address: http://www.w3.org/TR/UMP/ > We could revisit > http://lists.w3.org/Archives/Public/public-webapps/2010AprJun/thread.html#msg171 > I suppose. Apparently at least Jonas changed his mind since then. I didn't know the UMP spec. Reading it, it seems to me that the fund

Re: [XHR] anonymous flag

2013-05-08 Thread Anne van Kesteren
On Wed, May 8, 2013 at 1:07 PM, Hallvord Reiar Michaelsen Steen wrote: > Den 8. mai 2013 kl. 17:17 skrev Anne van Kesteren : >> Yes. It was added to address: http://www.w3.org/TR/UMP/ > > I'm not sure what use cases having this feature in XHR solves.. So I would > support removing it, unless we c

Re: [XHR] anonymous flag

2013-05-08 Thread Hallvord Reiar Michaelsen Steen
Den 8. mai 2013 kl. 17:17 skrev Anne van Kesteren : > On Wed, May 8, 2013 at 5:07 AM, Hallvord Reiar Michaelsen Steen > wrote: >> If create an anonymous XHR request, rig it to GET a same-origin resource and >> set a custom header, it will trigger a preflight and the same-origin >> resource will

Re: [XHR] anonymous flag

2013-05-08 Thread Anne van Kesteren
On Wed, May 8, 2013 at 5:07 AM, Hallvord Reiar Michaelsen Steen wrote: > If create an anonymous XHR request, rig it to GET a same-origin resource and > set a custom header, it will trigger a preflight and the same-origin resource > will have to opt in to receiving that custom header? Expected?

[XHR] anonymous flag

2013-05-08 Thread Hallvord Reiar Michaelsen Steen
If create an anonymous XHR request, rig it to GET a same-origin resource and set a custom header, it will trigger a preflight and the same-origin resource will have to opt in to receiving that custom header? Expected? var xhr=new XMLHttpRequest({anonymous:true}) xhr.open('GET', '/') xhr.setReq