Re: [access-control] Rename spec?

2009-01-14 Thread Paul Libbrecht


Being external to it all, i.e. just reading the mailing-list with the  
spec-title mentioned just about everytime, it clearly seems like a  
good move to me: that specs starts to taste interesting whereas,  
before, it seemed to be unrelated to my tasks!


;-)

paul


Le 13-janv.-09 à 17:50, Anne van Kesteren a écrit :
I know some people (e.g. Ian) don't like the idea, but it seems the  
name Access Control for Cross-Site Requests confuses people,  
especially the Access Control part:


http://www.w3.org/2001/tag/2008/12/10-minutes#item03

'TBL: Calling it Access Control is misleading. It's about privacy.'

Henri Sivonen suggested Cross-Origin Data Sharing on IRC the other  
day:


http://krijnhoetmer.nl/irc-logs/whatwg/20090112#l-139

Since it can be about more than just data, e.g. images, Cross- 
Origin Resource Sharing might be more appropriate. Keeping the  
header names the same seems fine, they're just opague strings, but  
at least making it more clear what the specification is about might  
help people.




smime.p7s
Description: S/MIME cryptographic signature


Re: [access-control] Header definitions

2009-01-14 Thread Anne van Kesteren


On Mon, 20 Oct 2008 17:32:03 +0200, Nikunj Mehta nikunj.me...@oracle.com  
wrote:
The headers defined in this specification must be registered with IANA.  
See permanent [1] managed by IETF under RFC 3864 [2]. Ideally, this  
specification would have gone to IETF, but it looks like this WG has  
defined that there is no problem in going ahead with the work in W3C.


The headers are provisionally registered. They will be in the permanent  
registry when the specification reaches a more stable state. Could you  
elaborate on why you think this specification should be done by the IETF?


The reason for doing this work at the W3C is that it has close ties with  
other specifications developed here and the specifications it is intended  
for, e.g. XMLHttpRequest, CSS, and HTML5, are all also at the W3C.




[1] http://www.iana.org/assignments/message-headers/perm-headers.html
[2] http://www.rfc-editor.org/rfc/rfc3864.txt




--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



Re: [access-control] Rename spec?

2009-01-14 Thread Arthur Barstow


Hi,

On Jan 13, 2009, at 11:50 AM, ext Anne van Kesteren wrote:



I know some people (e.g. Ian) don't like the idea, but it seems the  
name Access Control for Cross-Site Requests confuses people,  
especially the Access Control part:


  http://www.w3.org/2001/tag/2008/12/10-minutes#item03

  'TBL: Calling it Access Control is misleading. It's about privacy.'

Henri Sivonen suggested Cross-Origin Data Sharing on IRC the  
other day:


  http://krijnhoetmer.nl/irc-logs/whatwg/20090112#l-139

Since it can be about more than just data, e.g. images, Cross- 
Origin Resource Sharing might be more appropriate. Keeping the  
header names the same seems fine, they're just opague strings, but  
at least making it more clear what the specification is about might  
help people.


It's been over a year since we last changed the name of this spec so  
I guess it's about time we renamed it again :-):


[[
Authorizing Read Access to XML Content Using the ?access-control?  
Processing Instruction 1.0


Enabling Read Access for Web Resources

Access Control for Cross-site Requests
]]

I do agree the title is important and support either of the proposed  
new titles (preference goes with Resource). One question I have  
here is whether Domain would be more accurate than Origin.


The only concern I have is whether a name change would be problematic  
to anyone that may have implemented the latest Draft. OTOH, a WD is  
always at risk of being substantially changed.


-Regards, Art Barstow





Re: [access-control] Rename spec?

2009-01-14 Thread Anne van Kesteren


On Wed, 14 Jan 2009 14:28:49 +0100, Arthur Barstow art.bars...@nokia.com  
wrote:
It's been over a year since we last changed the name of this spec so I  
guess it's about time we renamed it again :-):


[[
Authorizing Read Access to XML Content Using the ?access-control?  
Processing Instruction 1.0


Enabling Read Access for Web Resources

Access Control for Cross-site Requests
]]


Yeah... :-)


I do agree the title is important and support either of the proposed new  
titles (preference goes with Resource). One question I have here is  
whether Domain would be more accurate than Origin.


Domain does not capture significance of the scheme and port, while Origin  
does. I'm updating the draft to use terminology a bit more consistent now  
so it should become less confusing. (E.g. I'm removing cross-site in favor  
of cross-origin as the latter has a clearly defined meaning and the former  
is just used on blogs.)



The only concern I have is whether a name change would be problematic to  
anyone that may have implemented the latest Draft. OTOH, a WD is always  
at risk of being substantially changed.


The change will only affect the name of the specification. Header names  
will most definitely not change and I wasn't planning on changing the  
names of definitions either, to be honest.



--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



[widgets] Agenda for 15 January 2009 Voice Conference

2009-01-14 Thread Arthur Barstow


Below is the draft agenda for the January 15 Widgets Voice Conference  
(VC).


Inputs and discussion on the agenda topics before the meeting is  
encouraged.


Logistics:

 Time: 24:00 Tokyo; 17:00 Helsinki; 16:00 Paris; 15:00 London; 10:00  
Boston; 07:00 Seattle

 Duration = 60 minutes
 Zakim Bridge +1.617.761.6200, conference 9231 (WAF1)
 IRC channel = #wam; irc.w3.org:6665
 Confidentiality of minutes = Public

Agenda:

1. Review and tweak agenda

2. Announcements

3. PC Last Call WD (published 22 Dec 2008):

a. Discuss any new contentious comments (if any):

 http://www.w3.org/TR/2008/WD-widgets-20081222/

b. Comments from Boris:

 http://lists.w3.org/Archives/Public/public-webapps/2009JanMar/ 
0046.html


4. Widget Testing: update/status on Widget testing assuming Kai, Dom  
or someone from MWTS WG can join:


 http://dev.w3.org/cvsweb/2006/waf/widgets/tests/

5. API and Events spec: agetting to FPWD:

 http://dev.w3.org/2006/waf/widgets-api/

6. AOB





[widgets] PC 1.0 Last Call WD: localization comments

2009-01-14 Thread Jere Kapyaho

Hi Marcos,

I have (still) a couple of concerns about the localization section of
Widgets Packaging  Configuration Last Call WD of 20081222.

/1/ Is the following statement in [1] as it should be?

Author requirements: Localized folders must be at the root of the widget (a
localized folder not at the root of the widget will be treated as an
arbitrary folder).

I think it should now read:

Localized folders must be placed inside the container for localized content
(...).

/2/ I was looking at the localized widget example in the same section (it's
non-normative, but important nonetheless), and it seems that the left and
right sides of the example don't agree. The paths on the right are absolute
from the root, not the container.

The right side shows en-au, but that is not found on the left side. The
first bullet of the example mentions Korean, but that does not seem to be
present. Should it be Spanish instead?

Finally, it's not obvious which of the files shown (if any) is the start
file, because the content of config.xml is not shown.

/3/ This is a potentially confusing statement:

At runtime, the widget user agent will set the (HTML or XML) base of the
start file to the localized folder (even if the start file does not reside
inside the localized folder).

I assume in this case the localized folder means the one determined in
Step 6, right? This might not be obvious from the context, it requires a
trip to the text of Step 6.

/4/ Since BCP47 tags are case-insensitive, it might be good to normalise all
their occurrences to lowercase, to avoid any confusion.

/5/ Is there value in being able to have multiple config.xml documents,
instead of just one, and tagging the relevant elements with a BCP47 tag? The
example mentions different author and license, which could be expressed in
one file. If you have a pointer to some earlier discussion that resolves
this, it's fine. Or do you think it would make the config.xml document too
bulky?

--Jere

[1] http://www.w3.org/TR/2008/WD-widgets-20081222/#content-localization




http://dev.w3.org/2006/waf/widgets/#the-widget-element height and width default values

2009-01-14 Thread Kai Hendry

Suggestion for http://dev.w3.org/2006/waf/widgets/#the-widget-element
When the value is missing or invalid, the widget user agent will
assume the value 300.
And perhaps reference
http://dev.w3.org/2006/waf/widgets/#step-3-set-the-configuration-defaults



Was wondering how you came up with 150x300 as the default size for a widget.

How does that work for scalability and what not?

Perhaps pixel definitions are scalable in reality nowadays by UAs and
that's just an indicator of dimensions, 1:2?

This might be addressed in R16
http://www.w3.org/TR/widgets-reqs/#visual but I don't quite understand
it. Is there an example?




Thanks guys,



[access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Adrian Bateman

I wanted to let the WG members know that we have completed our support for 
Access-Control in IE8 for the Simple Cross-Site Access Request. We support the 
Access-Control-Allow-Origin: * wildcard as we did in Beta 2 but in the next 
public release of IE8, our Release Candidate, we have also added support for 
the string comparison to the ascii-origin. I want to thank the members of this 
group who gave us feedback about making this change.

Making changes to our implementation now will be costly and I'd prefer if this 
part of the draft didn't have to change significantly. On the subject of 
renaming the Origin header, we'd prefer the option to keep it as is and have 
the name for CSRF changed in HTML 5 as Ian raised [1] if possible.

Cheers,

Adrian.

[1] http://lists.w3.org/Archives/Public/public-webapps/2009JanMar/0060.html

-- 
Adrian Bateman
Program Manager - Internet Explorer - Microsoft Corporation
Phone: +1 (425) 538 5111
E-mail: mailto:adria...@microsoft.com




Re: [access-control] Rename spec?

2009-01-14 Thread Alex Russell


I do agree the title is important and support either of the  
proposed new titles (preference goes with Resource). One question  
I have here is whether Domain would be more accurate than Origin.


Domain does not capture significance of the scheme and port, while  
Origin does. I'm updating the draft to use terminology a bit more  
consistent now so it should become less confusing. (E.g. I'm  
removing cross-site in favor of cross-origin as the latter has a  
clearly defined meaning and the former is just used on blogs.)


This seems both condescending and useless. Nearly everyone knows what  
cross domain and same domain policy mean, whereas cross origin  
is just what language lawyers say to make regular web developers feel  
bad (AFICT).


Please end the madness.

Regards



Re: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Anne van Kesteren


On Wed, 14 Jan 2009 19:53:42 +0100, Jonas Sicking jo...@sicking.cc wrote:

What do other people think?


If we really think they should be different (and at least Adam Barth  
suggests that might not be needed) I would really like to rename this  
header to make it consistent with the rest of the API. (Of course, the  
semantics would be identical to what they are now.)



--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



Re: [access-control] Rename spec?

2009-01-14 Thread Anne van Kesteren


On Wed, 14 Jan 2009 17:52:50 +0100, Alex Russell a...@dojotoolkit.org  
wrote:
I do agree the title is important and support either of the proposed  
new titles (preference goes with Resource). One question I have here  
is whether Domain would be more accurate than Origin.


Domain does not capture significance of the scheme and port, while  
Origin does. I'm updating the draft to use terminology a bit more  
consistent now so it should become less confusing. (E.g. I'm removing  
cross-site in favor of cross-origin as the latter has a clearly defined  
meaning and the former is just used on blogs.)


This seems both condescending and useless. Nearly everyone knows what  
cross domain and same domain policy mean, whereas cross origin is  
just what language lawyers say to make regular web developers feel bad  
(AFICT).


Please end the madness.


Well, both are important (and different, origin is a superset), no? E.g.  
document.domain clearly represents a domain, where as the MessageEvent  
interface has an origin attribute that gives back an origin. This very  
draft defines two headers with the name origin in them. It seems to me  
that developers will quickly pick up the difference.



--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



Re: Do we need to rename the Origin header?

2009-01-14 Thread Bil Corry

Thomas Roessler wrote on 1/12/2009 8:02 PM: 
 Having the CSRF-Origin defined in an RFC or another separate spec is a
 good idea independently of whether or not it ends up being the same
 header that's used for cross-site XHR.

If someone wants to form an Origin BOF at the next IETF meeting in March 
(with the idea of creating a RFC), I'll attend.  I'm already planning to be 
there for the Cookie BOF.


- Bil




Re: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Anne van Kesteren


On Wed, 14 Jan 2009 20:36:12 +0100, Bil Corry b...@corry.biz wrote:

Jonas Sicking wrote on 1/14/2009 12:53 PM:

The problem I think is that the current name, 'Origin',  is extremely
generic and so it's likely to cause confusion once we get other
headers containing origins.

That said, I do understand that this is a very late change for you
guys. Developers will code to what works, so as long as things work
the same across browsers, with regards to this and the CSRF protection
header, things should be mostly ok.

What do other people think?


I liked your suggestion that would marry the two:

Jonas Sicking wrote on 1/12/2009 7:22 PM:
 That said, here is a solution that might work for both Access-Control
 and CSRF protection:

 Site A makes a request to site B,
   the UA adds the header Origin: A
 Site B redirects the request to site C,
   the UA adds the header Origin: A, B


This would mean significant changes to the draft which would not work well  
for Microsoft. Renaming I would like to consider, changing the semantics  
drastically seems out of order at this point.



--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



Re: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Jonas Sicking

On Wed, Jan 14, 2009 at 11:45 AM, Anne van Kesteren ann...@opera.com wrote:
 On Wed, 14 Jan 2009 20:36:12 +0100, Bil Corry b...@corry.biz wrote:

 Jonas Sicking wrote on 1/14/2009 12:53 PM:

 The problem I think is that the current name, 'Origin',  is extremely
 generic and so it's likely to cause confusion once we get other
 headers containing origins.

 That said, I do understand that this is a very late change for you
 guys. Developers will code to what works, so as long as things work
 the same across browsers, with regards to this and the CSRF protection
 header, things should be mostly ok.

 What do other people think?

 I liked your suggestion that would marry the two:

Jonas Sicking wrote on 1/12/2009 7:22 PM:
 That said, here is a solution that might work for both
 Access-Control
 and CSRF protection:

 Site A makes a request to site B,
   the UA adds the header Origin: A
 Site B redirects the request to site C,
   the UA adds the header Origin: A, B

 This would mean significant changes to the draft which would not work well
 for Microsoft. Renaming I would like to consider, changing the semantics
 drastically seems out of order at this point.

Yup, I agree.

/ Jonas



RE: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Adrian Bateman
On January 14, 2009 11:45 AM, Anne van Kesteren [mailto:ann...@opera.com] wrote:
 On Wed, 14 Jan 2009 20:36:12 +0100, Bil Corry b...@corry.biz wrote:
  Jonas Sicking wrote on 1/14/2009 12:53 PM:
  The problem I think is that the current name, 'Origin',  is extremely
  generic and so it's likely to cause confusion once we get other
  headers containing origins.

  What do other people think?
 
  I liked your suggestion that would marry the two:
 
  Jonas Sicking wrote on 1/12/2009 7:22 PM:
   That said, here is a solution that might work for both Access-
 Control
   and CSRF protection:
  
   Site A makes a request to site B,
 the UA adds the header Origin: A
   Site B redirects the request to site C,
 the UA adds the header Origin: A, B
 
 This would mean significant changes to the draft which would not work
 well for Microsoft. Renaming I would like to consider, changing the
 semantics drastically seems out of order at this point.

Changing the semantics would unfortunately likely mean that IE8 would ship
with behaviour that would be different to the spec. We probably won't be able
to make that kind of change.

I actually don't think that the generic name is a problem as long as the
CSRF solution uses a different name for a different meaning. The value really
is an Origin and could potentially be used for more than just participation
in the Access Control negotiation. It could still be meaningful in other
scenarios in future which would otherwise now have to define a new header with
the same meaning.

If the header name does change then we will cost out the work to make this
change to see if we can do it. Clearly changing the strings used in the
browser is a relatively constrained change but I'm concerned about the
amount of churn in our test automation infrastructure that would be required
and the risks involved.

Cheers,

Adrian.


Re: Do we need to rename the Origin header?

2009-01-14 Thread Ian Hickson

On Tue, 13 Jan 2009, Jonas Sicking wrote:
 On Tue, Jan 13, 2009 at 5:09 PM, Ian Hickson i...@hixie.ch wrote:
  On Tue, 13 Jan 2009, Jonas Sicking wrote:
 
  It's not just POST that we need to worry about, ideally we should 
  cover the GET case as well. Or at least it's quite likely that we 
  will want to.
 
  My understanding was that we didn't want to include Origin in GET 
  requests. In fact HTML5 right now goes out of its way to avoid 
  including it in GET requests.
 
 We've been debating this both ways at mozilla, no decision has been made 
 yet regarding what we'll recommend.

I've renamed it to XXX-Origin in HTML5. I haven't changed its behavior 
(it is still only sent for non-GET).

I'm trying to bring HTML5 to last call by October. Who owns this issue? 
Do we have an ETA on resolving it?

-- 
Ian Hickson   U+1047E)\._.,--,'``.fL
http://ln.hixie.ch/   U+263A/,   _.. \   _\  ;`._ ,.
Things that are impossible just take longer.   `._.-(,_..'--(,_..'`-.;.'



Re: [access-control] Rename spec?

2009-01-14 Thread Alex Russell


Feels like URL vs. URI to me, which for the 80% case is simply bike- 
shedding. I appreciate that there is a question of specificity and  
that your clarification is more correct...but is that a good enough  
reason to do it?


Regards

On Jan 14, 2009, at 11:14 AM, Anne van Kesteren wrote:

On Wed, 14 Jan 2009 17:52:50 +0100, Alex Russell  
a...@dojotoolkit.org wrote:
I do agree the title is important and support either of the  
proposed new titles (preference goes with Resource). One  
question I have here is whether Domain would be more accurate  
than Origin.


Domain does not capture significance of the scheme and port, while  
Origin does. I'm updating the draft to use terminology a bit more  
consistent now so it should become less confusing. (E.g. I'm  
removing cross-site in favor of cross-origin as the latter has a  
clearly defined meaning and the former is just used on blogs.)


This seems both condescending and useless. Nearly everyone knows  
what cross domain and same domain policy mean, whereas cross  
origin is just what language lawyers say to make regular web  
developers feel bad (AFICT).


Please end the madness.


Well, both are important (and different, origin is a superset), no?  
E.g. document.domain clearly represents a domain, where as the  
MessageEvent interface has an origin attribute that gives back an  
origin. This very draft defines two headers with the name origin in  
them. It seems to me that developers will quickly pick up the  
difference.





Re: [access-control] Rename spec?

2009-01-14 Thread Anne van Kesteren


On Wed, 14 Jan 2009 23:25:43 +0100, Alex Russell a...@dojotoolkit.org  
wrote:
Feels like URL vs. URI to me, which for the 80% case is simply bike- 
shedding.


To be honest, I never quite understood the difference between those two.  
The difference between a domain and an origin however, is very clear:


  domain
dojotoolkit.org
  origin
https://dojotoolkit.org:9000


I appreciate that there is a question of specificity and that your  
clarification is more correct...but is that a good enough reason to do  
it?


I would say yes, especially given that since it is a superset, things like

  https://google.com and http://google.com

are same domain, but definitely not same origin. The distinction is pretty  
important.



--
Anne van Kesteren
http://annevankesteren.nl/
http://www.opera.com/



Re: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Maciej Stachowiak



On Jan 14, 2009, at 3:45 PM, Bil Corry wrote:



Adrian Bateman wrote on 1/14/2009 3:18 PM:
I actually don't think that the generic name is a problem as long  
as the
CSRF solution uses a different name for a different meaning. The  
value really
is an Origin and could potentially be used for more than just  
participation
in the Access Control negotiation. It could still be meaningful in  
other
scenarios in future which would otherwise now have to define a new  
header with

the same meaning.


I'm thinking out loud here, making sure I have the distinction  
between the two correct:


	With Access Control, Origin represents the initial request, which  
survives through a redirect.  So as Adrian points out, it really is  
an Origin.


	With CSRF mitigation, Origin represents the immediately-preceding  
request, which for obvious reasons does not survive through a  
redirect.



That's why I liked the idea of just including the chain of requests  
within Origin, you can then easily find the one you want.  But since  
that isn't on the table, I'm attracted to renaming the CSRF Origin  
to something like Request-Origin.  Whatever name is chosen, it  
then has to be added to the XHR spec as a header that can not  
modified/created via XHR.


Given this behavior, it sounds to me like the Access Control related  
header is more deserving of the term Origin, since it represents the  
true origin of the request. I am not sure what the other header could  
be called to make the difference clear. Perhaps Redirect-Origin? Why  
does the CSRF defense header need to change on redirect?


Regards,
Maciej




Re: Copyright license for ElementTraversal Java interface

2009-01-14 Thread Cameron McCormack

Cameron McCormack:
 The question then is whether we want to include it.  I don’t see how it
 would be beneficial for anyone to redistribute one of the interface
 files if it has been changed incompatibly, so I guess I don’t see the
 need for it.

Some further off-list discussion regarding general policy for this
issue:

  http://lists.w3.org/Archives/Public/www-archive/2009Jan/0003.html

-- 
Cameron McCormack ≝ http://mcc.id.au/



Re: [access-control] Access-Control-Allow-Origin: * and ascii-origin in IE8

2009-01-14 Thread Maciej Stachowiak



On Jan 14, 2009, at 5:32 PM, Bil Corry wrote:



Maciej Stachowiak wrote on 1/14/2009 6:14 PM:

Why does the CSRF defense header need to change on redirect?


Because to the site on the far end, it would appear the request came  
from somewhere it didn't, effectively hiding the real source of the  
request.  This probably explains it better:


-
When an honest site initiates a request to a dishonest site (for  
example because the user followed a hyperlink), the dishonest site  
can redirect the request back to the honest site. If the redirected  
request carries the same Origin header as the original request, the  
request will implicate the honest site as generating the request. To  
protect the honest site, the user agent replaces the Origin header  
with null, so a conforming server will not modify state in response  
to a redirect.


http://crypto.stanford.edu/websec/specs/origin-header/
-


So one thing to keep in mind is that any POST-based form would not be  
vulnerable to this kind of attack unless the victim site actually  
submits a form to an untrusted site. There is no way for a GET request  
to be redirected to a POST, and it seems to me the practice of Site A  
submitting a form to untrusted site B is likely to be quite rare and  
easily avoidable.


Furthermore, HTML5 specifies that the XXX-Origin (or whatever it might  
get renamed to) header should not be sent for GET requests, the only  
kind of request where it would plausibly help anything.


Thus, the difference in behavior of the CSRF-prevention Origin does  
not do any good, and so we may as well use just one Origin header.


Regards,
Maciej