Re: CRMF encoding issues with window.crypto.generatedCRMFRequest()

2009-07-17 Thread Daniel Veditz
Moving discussion to mozilla.dev.tech.crypto, but do go ahead and file bugs. I doubt 3.5 behaves any differently than 3.0 (you did mean 3.0.10, right? If you're using Firefox 2 please stop). nk wrote: > Hi all, > I am researching the window.crypto.generatedCRMFRequest() function > available on Fir

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Daniel Veditz
Jean-Marc Desperrier wrote: > In fact a solution could be that everytime the browser reject > downloading a ressource due to CSP rules, it spits out a warning on the > javascript console together with the minimal CSP authorization that > would be required to obtain that ressource. > This could help

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Brandon Sterne
On 7/16/09 8:17 PM, Ian Hickson wrote: > On Thu, 16 Jul 2009, Daniel Veditz wrote: >> Ian Hickson wrote: >>> * The more complicated something is, the more mistakes people will >>> make. >> We encourage people to use the simplest policy possible. The additional >> options are there for the edge ca

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Bil Corry
Jean-Marc Desperrier wrote on 7/17/2009 11:18 AM: > Bil Corry wrote: >> CSP is non-trivial; it takes a bit of work to configure it properly >> and requires on-going maintenance as the site evolves. It's not >> targeted to the uninformed author, it simply isn't possible to >> achieve that kind of

CRMF encoding issues with window.crypto.generatedCRMFRequest()

2009-07-17 Thread nk
Hi all, I am researching the window.crypto.generatedCRMFRequest() function available on FireFox (I am using FF 2.0.10). Now, if requested keys are for signing - everything looks good. But if requested keys are for key exchange (e.g. "rsa-ex"), the generated CRMF request structure has a number of is

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Daniel Veditz
Ian Hickson wrote: > This isn't intended to be a "gotcha" question. My point is just that CSP > is too complicated, too powerful, to be understood by many authors on the > Web, and that because this is a security technology, this will directly > lead to security bugs on sites (and worse, on site

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Sid Stamm
On 7/17/09 8:40 AM, Bil Corry wrote: An external validation tool could help authors understand > what their CSP rules are actually allowing/preventing (maybe > something similar to validator.w3.org). To compliment it, > another handy tool would be a browser plug-in that could help > create CSP

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Jean-Marc Desperrier
Bil Corry wrote: CSP is non-trivial; it takes a bit of work to configure it properly and requires on-going maintenance as the site evolves. It's not targeted to the uninformed author, it simply isn't possible to achieve that kind of coverage -- I suspect in the pool of all authors, the majority

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Bil Corry
Jean-Marc Desperrier wrote on 7/17/2009 2:26 AM: > Daniel Veditz wrote: >> CSP is designed so that mistakes of omission tend to break the site >> break. This won't introduce subtle bugs, rudimentary content testing >> will quickly reveal problems. > > But won't authors fail to understand how to s

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Jean-Marc Desperrier
Daniel Veditz wrote: CSP is designed so that mistakes of omission tend to break the site break. This won't introduce subtle bugs, rudimentary content testing will quickly reveal problems. But won't authors fail to understand how to solve the problem, and open everything wide ? From experience,

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Jean-Marc Desperrier
Daniel Veditz wrote: CSP is designed so that mistakes of omission tend to break the site break. This won't introduce subtle bugs, rudimentary content testing will quickly reveal problems. But won't authors fail to understand how to solve the problem, and open everything wide ? From experience,

Re: Comments on the Content Security Policy specification

2009-07-17 Thread Jean-Marc Desperrier
Daniel Veditz wrote: CSP is designed so that mistakes of omission tend to break the site break. This won't introduce subtle bugs, rudimentary content testing will quickly reveal problems. But won't authors fail to understand how to solve the problem, and open everything wide ? From experience,