Jonas, Anne - thanks for taking the lead on this.
WG Members - please submit your comments on the AC-related Open and
Raised Issues by January 22 at the latest. As we have been doing, we
will assume silence means you are OK with the Editor's position:
<http://www.w3.org/2005/06/tracker/waf/issues/open>
<http://www.w3.org/2005/06/tracker/waf/issues/raised>
Regards, Art Barstow
---
Begin forwarded message:
Resent-From: [email protected]
From: "ext Jonas Sicking" <[EMAIL PROTECTED]>
Date: January 17, 2008 2:32:18 PM EST
To: Anne van Kesteren <[EMAIL PROTECTED]>
Cc: "WAF WG (public)" <[email protected]>
Subject: Re: Access Control open/raised issues
Archived-At: <http://www.w3.org/mid/[EMAIL PROTECTED]>
Anne van Kesteren wrote:
I was surprised that a large number of issues is still open. An
attempt to get some closed.
ISSUE-4 http://www.w3.org/2005/06/tracker/waf/issues/4
I don't think we need this distinction and I already replied to
the relevant comment. The specification is clear enough on this
point.
Agreed.
ISSUE-5 http://www.w3.org/2005/06/tracker/waf/issues/5
We have both black- and whitelisting for the following reaons: In
case the server and documents hosted on the server are in control
by different people it is necessary that the server people are
able to override the document people (if the document wants to
share access) and vice versa (if the server wants to share access).
I suggest we close this issue because there's a good reason to
have the deny rule.
Black lists are required to satisfy point 7 from [1]
ISSUE-11 http://www.w3.org/2005/06/tracker/waf/issues/11
The specification states: "User agents may optimize any algorithm
given in this specification, so long as the end result is
indistinguishable from the result that would be obtained by the
specification's algorithms." This seems clear enough to me. I
suggest we close this issue.
Agreed.
ISSUE-16 http://www.w3.org/2005/06/tracker/waf/issues/16
I have added more information to the introduction. Together with
the use cases and requirements document/appendix I think we'll
cover this adequately. I suggest we close this issue.
Yep, the requirements doc satisfies this I think.
ISSUE-20 http://www.w3.org/2005/06/tracker/waf/issues/20
I think the current model is adequate and leaves the server in
control at all times. It has been explained on the mailing list
why we have this model by Brad and Ian mostly so I think we can
close this issue.
This is required by point 3 in [1]. Also, the client already is a
PEP on he web today, as well as in all other proposals I've seen
(such as JSONRequest)
I'm not sure what to do with ISSUE-21. It's not concrete enough to
do anything with and as far as detailing what needs to be done for
security I think that's already covered. I suggest we close this
one. ISSUE-19 will be dealt with when we publish the requirements
document/appendix.
I think [2] describes the threat model. If it's unclear we can
expand it.
[1]
http://lists.w3.org/Archives/Public/public-appformats/2008Jan/
0193.html
[2]
http://lists.w3.org/Archives/Public/public-appformats/2008Jan/
0195.html