Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Christoph Martens
Hey Adam,

I thought it might make sense to let the user specify a private key file
(e.g. an RSA-key) that is in the browsers KeyChain.
Would that make sense to have it implemented in the DOMCryptAPI?

Otherwise I can't see many use cases, because I think encryption on a high
OSI layer just doesn't make sense for me.
If someone is able to sniff SSL/TLS encrypted packages due to nulling he
will also be able to collect enough generated data to see how the hashing
on the Browser-side works and which one will be the next hash generated -
thanks to cuda and ati stream.
But that's just my personal opinion on that.

Greets from Germany,
Chris

__
Christoph Martens
JavaScript Engineer, Zynga Germany
Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



Zynga Game Germany GmbH
An der Welle 4
60322 Frankfurt, Germany
cmart...@zynga.com




On 7/27/11 7:53 AM, Adam Barth aba...@webkit.org wrote:

Hi webkit-dev,

As some of you are probably aware, Mozilla is experimenting with
exposing some basic cryptographic primitives to web applications:

https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest

I wanted to get a sense from the WebKit community about how interested
we are in implementing this feature.  My sense is that this API is
fairly early in it's lifecycle, so one perspective is that we should
wait for Mozilla to experiment for a bit longer and revisit this
question once the design is further along (e.g., submitted to the W3C
standards process).

Another perspective is that there are some simple parts of the API
that we should implement now, and we can grow into the more involved
parts of the API as they mature.  For example, the CryptoHash
interface can be implemented independently of the rest of the API and
provides value by itself.

Thoughts?

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Adam Barth
My sense is that the Mozilla folks want to start with the simple
building blocks first and then work up to more complicated things like
interacting with OS key stores and smart card readers.

DOMCrypt is also useful for protecting data at rest, which isn't
something you can do with TLS.  For example, imagine that a web site
wants to store a bunch of sensitive data on the client.  The site can
encrypt the data using DOMCrypt and then keep the KeyID off-device
(e.g., in the cloud or in escrow).  Later, the site can reunite the
KeyID with the encrypted data on the client in order to decrypt.

As a more concrete example of the above, consider a service like
LastPass that wants to store your passwords (encrypted) on the client
and never wants to touch your plaintext passwords on the server.

These use cases all involve the public key encryption/decryption
functionality.  The hashing and MACing operations are somewhat lower
level building blocks, but they seem like an easier place to start.

Adam


On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens cmart...@zynga.com wrote:
 Hey Adam,

 I thought it might make sense to let the user specify a private key file
 (e.g. an RSA-key) that is in the browsers KeyChain.
 Would that make sense to have it implemented in the DOMCryptAPI?

 Otherwise I can't see many use cases, because I think encryption on a high
 OSI layer just doesn't make sense for me.
 If someone is able to sniff SSL/TLS encrypted packages due to nulling he
 will also be able to collect enough generated data to see how the hashing
 on the Browser-side works and which one will be the next hash generated -
 thanks to cuda and ati stream.
 But that's just my personal opinion on that.

 Greets from Germany,
 Chris

 __
 Christoph Martens
 JavaScript Engineer, Zynga Germany
 Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



 Zynga Game Germany GmbH
 An der Welle 4
 60322 Frankfurt, Germany
 cmart...@zynga.com




 On 7/27/11 7:53 AM, Adam Barth aba...@webkit.org wrote:

Hi webkit-dev,

As some of you are probably aware, Mozilla is experimenting with
exposing some basic cryptographic primitives to web applications:

https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest

I wanted to get a sense from the WebKit community about how interested
we are in implementing this feature.  My sense is that this API is
fairly early in it's lifecycle, so one perspective is that we should
wait for Mozilla to experiment for a bit longer and revisit this
question once the design is further along (e.g., submitted to the W3C
standards process).

Another perspective is that there are some simple parts of the API
that we should implement now, and we can grow into the more involved
parts of the API as they mature.  For example, the CryptoHash
interface can be implemented independently of the rest of the API and
provides value by itself.

Thoughts?

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Christoph Martens

Well, I think that makes sense... But not for me. I have the opinion that
cloud-hosted keys aren't keys anymore - right?
I mean, man-in-the-middle attacks are the 100% use case when it comes to
encryption due to buggy DNS-protocol that can't be updated.

I also think that this is kinda interesting when it comes to signing
uploads or files from inside a WebApp.
It makes sense to build a JavaScript API for hashing the values - so that
you can transfer data via unencrypted connection - which isn't smart, but
it should gain a low level of security depending on the algorithm.
But I wouldn't trust the hoster if there are plaintext passwords stored on
their servers. That's kinda php4 =/

Do you know which algorithms are planned to be implemented? Are there
twofish, blowfish or similar going to be included as well?

__
Christoph Martens
JavaScript Engineer, Zynga Germany
Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



Zynga Game Germany GmbH
An der Welle 4
60322 Frankfurt, Germany
cmart...@zynga.com




On 7/27/11 10:11 AM, Adam Barth aba...@webkit.org wrote:

My sense is that the Mozilla folks want to start with the simple
building blocks first and then work up to more complicated things like
interacting with OS key stores and smart card readers.

DOMCrypt is also useful for protecting data at rest, which isn't
something you can do with TLS.  For example, imagine that a web site
wants to store a bunch of sensitive data on the client.  The site can
encrypt the data using DOMCrypt and then keep the KeyID off-device
(e.g., in the cloud or in escrow).  Later, the site can reunite the
KeyID with the encrypted data on the client in order to decrypt.

As a more concrete example of the above, consider a service like
LastPass that wants to store your passwords (encrypted) on the client
and never wants to touch your plaintext passwords on the server.

These use cases all involve the public key encryption/decryption
functionality.  The hashing and MACing operations are somewhat lower
level building blocks, but they seem like an easier place to start.

Adam


On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens cmart...@zynga.com
wrote:
 Hey Adam,

 I thought it might make sense to let the user specify a private key file
 (e.g. an RSA-key) that is in the browsers KeyChain.
 Would that make sense to have it implemented in the DOMCryptAPI?

 Otherwise I can't see many use cases, because I think encryption on a
high
 OSI layer just doesn't make sense for me.
 If someone is able to sniff SSL/TLS encrypted packages due to nulling he
 will also be able to collect enough generated data to see how the
hashing
 on the Browser-side works and which one will be the next hash generated
-
 thanks to cuda and ati stream.
 But that's just my personal opinion on that.

 Greets from Germany,
 Chris

 __
 Christoph Martens
 JavaScript Engineer, Zynga Germany
 Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



 Zynga Game Germany GmbH
 An der Welle 4
 60322 Frankfurt, Germany
 cmart...@zynga.com




 On 7/27/11 7:53 AM, Adam Barth aba...@webkit.org wrote:

Hi webkit-dev,

As some of you are probably aware, Mozilla is experimenting with
exposing some basic cryptographic primitives to web applications:

https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest

I wanted to get a sense from the WebKit community about how interested
we are in implementing this feature.  My sense is that this API is
fairly early in it's lifecycle, so one perspective is that we should
wait for Mozilla to experiment for a bit longer and revisit this
question once the design is further along (e.g., submitted to the W3C
standards process).

Another perspective is that there are some simple parts of the API
that we should implement now, and we can grow into the more involved
parts of the API as they mature.  For example, the CryptoHash
interface can be implemented independently of the rest of the API and
provides value by itself.

Thoughts?

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev



___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Adam Barth
These sorts of questions are probably better discussed on the whatwg
mailing list (where there is currently a thread about DOMCrypt)
because they're general questions about the use cases and features set
of the API and not about WebKit's implementation (or
non-implementation) of the API.

Thanks for you interest.

Adam


On Wed, Jul 27, 2011 at 2:29 AM, Christoph Martens cmart...@zynga.com wrote:

 Well, I think that makes sense... But not for me. I have the opinion that
 cloud-hosted keys aren't keys anymore - right?
 I mean, man-in-the-middle attacks are the 100% use case when it comes to
 encryption due to buggy DNS-protocol that can't be updated.

 I also think that this is kinda interesting when it comes to signing
 uploads or files from inside a WebApp.
 It makes sense to build a JavaScript API for hashing the values - so that
 you can transfer data via unencrypted connection - which isn't smart, but
 it should gain a low level of security depending on the algorithm.
 But I wouldn't trust the hoster if there are plaintext passwords stored on
 their servers. That's kinda php4 =/

 Do you know which algorithms are planned to be implemented? Are there
 twofish, blowfish or similar going to be included as well?

 __
 Christoph Martens
 JavaScript Engineer, Zynga Germany
 Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



 Zynga Game Germany GmbH
 An der Welle 4
 60322 Frankfurt, Germany
 cmart...@zynga.com




 On 7/27/11 10:11 AM, Adam Barth aba...@webkit.org wrote:

My sense is that the Mozilla folks want to start with the simple
building blocks first and then work up to more complicated things like
interacting with OS key stores and smart card readers.

DOMCrypt is also useful for protecting data at rest, which isn't
something you can do with TLS.  For example, imagine that a web site
wants to store a bunch of sensitive data on the client.  The site can
encrypt the data using DOMCrypt and then keep the KeyID off-device
(e.g., in the cloud or in escrow).  Later, the site can reunite the
KeyID with the encrypted data on the client in order to decrypt.

As a more concrete example of the above, consider a service like
LastPass that wants to store your passwords (encrypted) on the client
and never wants to touch your plaintext passwords on the server.

These use cases all involve the public key encryption/decryption
functionality.  The hashing and MACing operations are somewhat lower
level building blocks, but they seem like an easier place to start.

Adam


On Wed, Jul 27, 2011 at 12:59 AM, Christoph Martens cmart...@zynga.com
wrote:
 Hey Adam,

 I thought it might make sense to let the user specify a private key file
 (e.g. an RSA-key) that is in the browsers KeyChain.
 Would that make sense to have it implemented in the DOMCryptAPI?

 Otherwise I can't see many use cases, because I think encryption on a
high
 OSI layer just doesn't make sense for me.
 If someone is able to sniff SSL/TLS encrypted packages due to nulling he
 will also be able to collect enough generated data to see how the
hashing
 on the Browser-side works and which one will be the next hash generated
-
 thanks to cuda and ati stream.
 But that's just my personal opinion on that.

 Greets from Germany,
 Chris

 __
 Christoph Martens
 JavaScript Engineer, Zynga Germany
 Freetime Cyanogen developer, kernel.org core dev and Metasploit hacker



 Zynga Game Germany GmbH
 An der Welle 4
 60322 Frankfurt, Germany
 cmart...@zynga.com




 On 7/27/11 7:53 AM, Adam Barth aba...@webkit.org wrote:

Hi webkit-dev,

As some of you are probably aware, Mozilla is experimenting with
exposing some basic cryptographic primitives to web applications:

https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest

I wanted to get a sense from the WebKit community about how interested
we are in implementing this feature.  My sense is that this API is
fairly early in it's lifecycle, so one perspective is that we should
wait for Mozilla to experiment for a bit longer and revisit this
question once the design is further along (e.g., submitted to the W3C
standards process).

Another perspective is that there are some simple parts of the API
that we should implement now, and we can grow into the more involved
parts of the API as they mature.  For example, the CryptoHash
interface can be implemented independently of the rest of the API and
provides value by itself.

Thoughts?

Adam
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev




___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Heads up : Qt port and its multimedia support.

2011-07-27 Thread Alexis Menard
Hello,

Just a small heads up on the multimedia support for the Qt port. At
the last webkit summit I've heard some Google folks a bit confused
about our multimedia story and I'm sure others are so here is the
story :

We had a first Phonon backend, abandoned and really far from feature
completion and far from working well : I removed it with
http://trac.webkit.org/changeset/89832 as we thought it was not good
idea to let it broken on the trunk.

Then we have a QtMultimedia media player (Qt Multimedia is a separate
add-on for Qt) that was added to the tree last year to provide a more
extensive API than Phonon and supporting more platforms (Symbian).
Unfortunately Qt Multimedia lacks of stability, the quality of the
backends is really heterogenous and they behaves differently. I felt
the support was built on unstable foundations so I decided it was not
good option either.

As a fun project, QtWebKit people decided to give a try on how the Qt
port could use the GStreamer backend of webkit maintained by our GTK
friends. Main changesets related :
http://trac.webkit.org/changeset/72184,
http://trac.webkit.org/changeset/83078.

I also did the same on Mac, and it is possible for the Qt port to the
QtKit media player maintained by Apple. Main changesets
http://trac.webkit.org/changeset/87312 and
http://trac.webkit.org/changeset/89617.

Both implementation work pretty well with Qt, supports more features
than we had with QtMultimedia, have better results in LayoutTests and
make us work closer to the other webkit devs - only benefits :D
therefore after http://trac.webkit.org/changeset/91752 the GStreamer
media player is the default on Linux and QtKit the default media
player on Mac for the Qt port. On Windows and Symbian we still use
QtMultimedia media player for now.

Our Linux implementation is already covered by a bot so now the fellow
GStreamer media player contributors should watch the Qt bots when they
work on the media player. Unfortunately for our Apple friends we don't
have yet a Qt Mac bot, though we are working on making one ready for
build.webkit.org (we do have one running but not yet at the level to
be promoted to build.webkit.org) so I will watch carefully the stuff
going on the QtKit media player.

Anyway if you have any question on the multimedia support in Qt and if
you are unsure about a change that could affect QtWebKit in either
GStreamer and QtKit, CC me on a bug or reach me on IRC.

Thanks to Eric Carlson, Philippe Normand and others who helped me to
make all of this working.

Any questions?

-- 
Alexis Menard (darktears)
Software Engineer
INdT Recife Brazil
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] DOMCrypt

2011-07-27 Thread Sam Weinig
I think we should let the spec mature a bit before diving in.

-Sam

On Jul 26, 2011, at 10:53 PM, Adam Barth wrote:

 Hi webkit-dev,
 
 As some of you are probably aware, Mozilla is experimenting with
 exposing some basic cryptographic primitives to web applications:
 
 https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest
 
 I wanted to get a sense from the WebKit community about how interested
 we are in implementing this feature.  My sense is that this API is
 fairly early in it's lifecycle, so one perspective is that we should
 wait for Mozilla to experiment for a bit longer and revisit this
 question once the design is further along (e.g., submitted to the W3C
 standards process).
 
 Another perspective is that there are some simple parts of the API
 that we should implement now, and we can grow into the more involved
 parts of the API as they mature.  For example, the CryptoHash
 interface can be implemented independently of the rest of the API and
 provides value by itself.
 
 Thoughts?
 
 Adam
 ___
 webkit-dev mailing list
 webkit-dev@lists.webkit.org
 http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Fwd: Re: [New DOM property] selectionDirection on HTMLInputElement and HTMLTextAreaElement

2011-07-27 Thread Ryosuke Niwa
-- Forwarded message --
From: Ryosuke Niwa ryosuke.n...@gmail.com
Date: Jul 27, 2011 10:32 AM
Subject: Re: [New DOM property] selectionDirection on HTMLInputElement and
HTMLTextAreaElement
To: Ryosuke Niwa rn...@webkit.org
Cc: Aryeh Gregor simetrical+...@gmail.com, WebKit Development 
webkit-dev@lists.webkit.org, Tim Down timd...@gmail.com, Ian Hixie 
i...@hixie.ch, Ojan Vafai o...@chromium.org

Mozilla bug: https://bugzilla.mozilla.org/show_bug.cgi?id=674558

- Ryosuke
On Jul 14, 2011 5:46 PM, Ryosuke Niwa rn...@webkit.org wrote:
 Hi all,

 I have a patch to add selectionDirection property on HTMLInputElement and
 HTMLTextAreaElement on https://bugs.webkit.org/show_bug.cgi?id=60403.

 The purpose of this property is to let websites control base and extent of
 selection. The property has been added to the HTML5 spec section
 4.10.20
http://www.whatwg.org/specs/web-apps/current-work/multipage/association-of-controls-and-forms.html#textFieldSelection
,
 and an extensive discussion about this
 feature
http://lists.whatwg.org/pipermail/whatwg-whatwg.org/2011-January/029814.html

 has
 been done on whatwg. Given the discussion took place on whatwg and how
 simple this API is, I consider it to be a stable API.

 Best,
 Ryosuke Niwa
 Software Engineer
 Google Inc.
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


[webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Scott Graham
Hi,

When the Timer is fired for SMILTimeContainer to update animations, the
elapsed time is calculated based on the client's currentTime().

That elapsed time is passed into updateAnimations and is used most of the
way down.

In some cases during the update though, SMILTimeContainer::elapsed() is
re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged,
createInstanceTimesFromSyncbase).

This seems somewhat incorrect because it means that various parts of the
animation will be updated with (slightly) different elapsed times than
others. It also makes it impractical to use a debugger to step the code.

Does anyone disagree that all updates should use the same elapsed time
during the update? Or, in other words, is there any reason to re-get the
current wallclock time during the update?

Thanks,
Scott
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Simon Fraser
On Jul 27, 2011, at 11:14 AM, Scott Graham wrote:

 Hi,
 
 When the Timer is fired for SMILTimeContainer to update animations, the 
 elapsed time is calculated based on the client's currentTime().
 
 That elapsed time is passed into updateAnimations and is used most of the way 
 down.
 
 In some cases during the update though, SMILTimeContainer::elapsed() is 
 re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged, 
 createInstanceTimesFromSyncbase).
 
 This seems somewhat incorrect because it means that various parts of the 
 animation will be updated with (slightly) different elapsed times than 
 others. It also makes it impractical to use a debugger to step the code.
 
 Does anyone disagree that all updates should use the same elapsed time during 
 the update? Or, in other words, is there any reason to re-get the current 
 wallclock time during the update?

I think your analysis is correct. You should file a bug for this in 
bugs.webkit.org, and folks can review your proposed changes there.

Simon


___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Scott Graham
On Wed, Jul 27, 2011 at 12:15 PM, Simon Fraser simon.fra...@apple.comwrote:

 On Jul 27, 2011, at 11:14 AM, Scott Graham wrote:
  Does anyone disagree that all updates should use the same elapsed time
 during the update? Or, in other words, is there any reason to re-get the
 current wallclock time during the update?

 I think your analysis is correct. You should file a bug for this in
 bugs.webkit.org, and folks can review your proposed changes there.


Thanks, done: https://bugs.webkit.org/show_bug.cgi?id=65274

scott
___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


Re: [webkit-dev] Timing updates for SVG SMIL animations

2011-07-27 Thread Darin Fisher
Perhaps related to this thread, shouldn't we be basing SVG animations off of
the same animation scheduler that drives requestAnimationFrame and soon CSS
animations (https://bugs.webkit.org/show_bug.cgi?id=64591)?  It seems less
than ideal to use a Timer.

-Darin


On Wed, Jul 27, 2011 at 11:14 AM, Scott Graham scot...@chromium.org wrote:

 Hi,

 When the Timer is fired for SMILTimeContainer to update animations, the
 elapsed time is calculated based on the client's currentTime().

 That elapsed time is passed into updateAnimations and is used most of the
 way down.

 In some cases during the update though, SMILTimeContainer::elapsed() is
 re-called (e.g. in SVGSMILElement::beginListChanged, endListChanged,
 createInstanceTimesFromSyncbase).

 This seems somewhat incorrect because it means that various parts of the
 animation will be updated with (slightly) different elapsed times than
 others. It also makes it impractical to use a debugger to step the code.

 Does anyone disagree that all updates should use the same elapsed time
 during the update? Or, in other words, is there any reason to re-get the
 current wallclock time during the update?

 Thanks,
 Scott


 ___
 webkit-dev mailing list
 webkit-dev@lists.webkit.org
 http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev


___
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev