[Bug 27366] New: Define how shadow DOM should be handled when host is adopted to a new document

2014-11-19 Thread bugzilla
https://www.w3.org/Bugs/Public/show_bug.cgi?id=27366 Bug ID: 27366 Summary: Define how shadow DOM should be handled when host is adopted to a new document Product: WebAppsWG Version: unspecified Hardware: PC

Re: What I am missing

2014-11-19 Thread Michaela Merz
Thank you Jonas. I was actually thinking about the security model of FirefoxOS or Android apps. We write powerful webapps nowadays. And with webapps I mean regular web pages with a lot of script/html5 functionality. The browsers are fast enough to do a variety of things: from running a linux

Re: CfC: publish WG Note of UI Events; deadline November 14

2014-11-19 Thread Arthur Barstow
On 11/7/14 10:28 AM, Arthur Barstow wrote: During WebApps' October 27 meeting, the participants agreed to stop work on the UI Events spec and to publish it as a WG Note (see [Mins]). As such, this is a formal Call for Consensus (CfC) to: a) Stop work on this spec b) Publish a gutted WG Note

Re: CfC: publish WG Note of UI Events; deadline November 14

2014-11-19 Thread Anne van Kesteren
On Wed, Nov 19, 2014 at 3:20 PM, Arthur Barstow art.bars...@gmail.com wrote: Although there appears to be agreement that work on the [uievents] spec should stop, the various replies raise sufficient questions that I consider this CfC (as written) as failed. Travis, Gary - would you please

Re: CfC: publish WG Note of UI Events; deadline November 14

2014-11-19 Thread Arthur Barstow
On 11/19/14 9:35 AM, Anne van Kesteren wrote: On Wed, Nov 19, 2014 at 3:20 PM, Arthur Barstow art.bars...@gmail.com wrote: Although there appears to be agreement that work on the [uievents] spec should stop, the various replies raise sufficient questions that I consider this CfC (as written) as

Re: What I am missing

2014-11-19 Thread Pradeep Kumar
How the browsers can be code servers? Could you please explain a little more... On 19-Nov-2014 7:51 pm, Michaela Merz michaela.m...@hermetos.com wrote: Thank you Jonas. I was actually thinking about the security model of FirefoxOS or Android apps. We write powerful webapps nowadays. And with

Re: CfC: publish WG Note of UI Events; deadline November 14

2014-11-19 Thread Pradeep Kumar
+1 On 19-Nov-2014 8:07 pm, Anne van Kesteren ann...@annevk.nl wrote: On Wed, Nov 19, 2014 at 3:20 PM, Arthur Barstow art.bars...@gmail.com wrote: Although there appears to be agreement that work on the [uievents] spec should stop, the various replies raise sufficient questions that I

Re: What I am missing

2014-11-19 Thread Michaela Merz
Perfect is the enemy of good. I understand the principles and problems of cryptography. And in the same way we rely on TLS and its security model today we would be able to put some trust into the same architecture for signing script. FYI: Here's how signing works for java applets: You need to

Re: What I am missing

2014-11-19 Thread Michaela Merz
I am not sure if I understand your question. Browsers can't be code servers at least not today. Michaela On 11/19/2014 08:43 AM, Pradeep Kumar wrote: How the browsers can be code servers? Could you please explain a little more... On 19-Nov-2014 7:51 pm, Michaela Merz

Re: What I am missing

2014-11-19 Thread Michaela Merz
That is relevant and also not so. Because Java applets silently grant access to a out of sandbox functionality if signed. This is not what I am proposing. I am suggesting a model in which the sandbox model remains intact and users need to explicitly agree to access that would otherwise be

Re: What I am missing

2014-11-19 Thread Pradeep Kumar
Even today, browsers ask for permission for geolocation, local storage, camera etc... How it is different from current scenario? On 19-Nov-2014 8:35 pm, Michaela Merz michaela.m...@hermetos.com wrote: That is relevant and also not so. Because Java applets silently grant access to a out of

Re: What I am missing

2014-11-19 Thread Anne van Kesteren
On Wed, Nov 19, 2014 at 4:27 PM, Michaela Merz michaela.m...@hermetos.com wrote: I don't disagree. But what is wrong with the notion of introducing an _additional_ layer of certification? Adding an additional layer of centralization. -- https://annevankesteren.nl/

Re: What I am missing

2014-11-19 Thread Michaela Merz
First: You don't have to sign your code. Second: We rely on centralization for TLS as well. Third: Third-party verification can be done within the community itself (https://www.eff.org/deeplinks/2014/11/certificate-authority-encrypt-entire-web) . Michaela On 11/19/2014 09:41 AM, Anne van

Re: What I am missing

2014-11-19 Thread ☻Mike Samuel
Browser signature checking gives you nothing that CSP doesn't as far as the security of pages composed from a mixture of content from different providers. As Florian points out, signing only establishes provenance, not any interesting security properties. I can always write a page that runs an

Re: What I am missing

2014-11-19 Thread Marc Fawzi
So there is no way for an unsigned script to exploit security holes in a signed script? Of course there's a way. But by the same token, there's a way a signed script can exploit security holes in another signed script. Signing itself doesn't establish any trust, or security. Yup, that's

Re: What I am missing

2014-11-19 Thread Michaela Merz
How would an unsigned script be able to exploit functionality from a signed script if it's an either/or case - you have either all scripts signed or no extended features? and: Think about this: a website can be totally safe today and deliver exploits tomorrow without the user even noticing. It

Re: What I am missing

2014-11-19 Thread Michaela Merz
Yes - it establishes provenance and protects against unauthorized manipulation. CSP is only as good as the content it protects. If the content has been manipulated server side - e.g. by unauthorized access - CSP is worthless. Michaela On 11/19/2014 10:03 AM, ☻Mike Samuel wrote: Browser