Re: Intent to implement: Cookie SameSite=lax by default and SameSite=none only if secure

2020-09-15 Thread Daniel Veditz
On Tue, Sep 15, 2020 at 10:13 AM Michael Reeps wrote: > Thank you for the prompt response to my email. I guess I interpreted the > standard to mean only when the cookie was intended for cross-site delivery, > which these are not: > If the bug carries the SameSite=None attribute how could the bro

Re: Intent to implement: Cookie SameSite=lax by default and SameSite=none only if secure

2020-09-14 Thread Daniel Veditz
On Mon, Sep 14, 2020 at 10:00 AM Michael Reeps wrote: > I am seeing this warning now, even when I am in a first party context: > > Cookie "xxx” will be soon rejected because it has the “SameSite” attribute > set to “None” or an invalid value, without the “secure” attribute. The > cookies in quest

Re: Intent to deprecate: Insecure HTTP

2020-08-04 Thread Daniel Veditz
You're replying to a 4 year old thread. Don't do that: you're jumping over 4 years of other conversations, and tagged on the end of an old thread whatever arguments you're making will unseen by a lot of people depending on how their mail readers work. Your arguments about HTTPS overhead on poor ne

Land your tests for now-public security bugs

2020-03-09 Thread Daniel Veditz
tl;dr: If you've ever landed a security fix please check-in your public testcases . We've long worried that if we landed tests along with our security f

Re: Intent to ship: Autodiscovery of WebExtension search engines

2020-02-19 Thread Daniel Veditz
On Wed, Feb 19, 2020 at 2:10 PM Dale Harvey wrote: > > If you _do_ invent a new one shared with other browser vendors, please > > don't use an "x-" prefix in anything new. > > Thanks, I got notice of others concerns about this as well and have been > looped in to discuss this more with standards

Re: Intent to ship: Autodiscovery of WebExtension search engines

2020-02-14 Thread Daniel Veditz
On Fri, Feb 14, 2020 at 11:50 AM Dale Harvey wrote: > We’re proposing a new mime-type [...]: “x-xpinstall” for WebExtension > search > engines. Example: /" some authors will tend to fill in the "missing" bit and get it wrong, and others will complain that the syntax is non-standard and broken. D

Re: Intent to Deploy: ThreadSanitizer

2020-02-14 Thread Daniel Veditz
On Thu, Feb 6, 2020 at 6:12 AM Christian Holler wrote: > Furthermore, data races are undefined behavior and can lead to > unforeseeable code behavior once compilers exploit this fact for better > optimizations. We have evidence that data races can cause intermittent > crashes and use-after-free m

Re: Intent to Ship: Require user interaction for notification permission prompts

2019-11-13 Thread Daniel Veditz
You could, but we're making this change because our user studies show users respond negatively to unexpected and unwanted prompts. If the users don't associate their triggering interaction with a desire to accomplish the task for which you're requesting permission they're still going to say "No" an

Re: Intent to ship: CSS subgrid

2019-10-18 Thread Daniel Veditz
On Fri, Oct 18, 2019 at 4:27 PM Tantek Çelik wrote: > Based on your reasoning, and our consistent intent emails and shipping > behavior, I think we should consider updating the blog post on this > matter regarding all CSS features (cc: annevk), or posting a separate > update post accordingly, usi

Re: Intent to ship: CSS subgrid

2019-10-18 Thread Daniel Veditz
>From my (personal) security-team perspective this is a fine pragmatic approach. Our overriding primary concern is whether exposing these new CSS features over insecure transport puts our users at additional risk. I don't see any meaningful privacy exposure here since these new features will be in

Re: Intent to prototype: Web Speech API

2019-10-16 Thread Daniel Veditz
On Wed, Oct 16, 2019 at 4:40 AM Johann Hofmann wrote: > as far as I can see the presented origin does not in fact get access to > the user's microphone The site doesn't get raw audio, but does get text representing what the browser thinks it heard. It's the same kind of privacy risk as raw audi

Re: The sec-approval process makes users safer

2019-09-10 Thread Daniel Veditz
On Tue, Sep 10, 2019 at 9:35 AM Boris Zbarsky wrote: > On 9/10/19 12:30 PM, Boris Zbarsky wrote: > > I just checked, and there are currently 826 bugs that have > > "in-testsuite?" set on them where I am the flag requester. > > And overall there seem to be ~7300 bugs that have that flag set. > Ot

Re: Intent to ship: Event-based form participation

2019-09-06 Thread Daniel Veditz
On Fri, Sep 6, 2019 at 3:07 AM John Dai wrote: > Is this feature enabled by default in sandboxed iframes? No. > But it's not specifically disabled in sandboxed frames or behind a non-default preference setting, right? If a sandboxed frame has allow-forms then this event is available along with a

Re: Intent to Ship - Support XCTO: nosniff for navigations

2019-09-05 Thread Daniel Veditz
On Thu, Sep 5, 2019 at 6:21 AM Sebastian Streich wrote: > Link to standard: > https://fetch.spec.whatwg.org/#x-content-type-options-header That bit of the standard doesn't describe this behavior--it still only talks about scripts and style. Is there an issue or PR to update the spec to describe

Re: Workers no longer working on file URLs?

2019-07-17 Thread Daniel Veditz
See https://bugzilla.mozilla.org/show_bug.cgi?id=file-fallout and the 3 bugs it depends on. This is fallout from fixing the file:// issue in Fx68. Unsure if we're going to fix local workers since they also don't work in other browsers, but local fonts seem to be a big deal. -Dan Veditz On Wed, Ju

Re: Lack of browser mochitests in non-e10s configuration and support for turning off e10s on desktop going forward

2019-04-29 Thread Daniel Veditz
On Thu, Apr 25, 2019 at 1:58 PM Bobby Holley wrote: > As long as we're certain that we won't ship Fennec past ESR68, > The timeline was left vague. Ideally I assume we'd like to migrate Fennec folks to Fenix before ESR68 EOL, but if it's not ready there's no reason we have to stop shipping a 68-

Re: Proposed W3C Charter: Media Working Group

2019-04-09 Thread Daniel Veditz
There was supposed to be a a discussion about whether the charter 1) excluded EME, 2) included EME, or 3) included EME with protection for security researchers. I didn't see much discussion, then the charter was simply changed to option 2. https://github.com/w3c/charter-media-wg/issues/2 I think w

Re: Intent-to-Ship: Backward-Compatibility FIDO U2F support for Google Accounts

2019-03-14 Thread Daniel Veditz
On Thu, Mar 14, 2019 at 11:25 AM Alex Gaynor wrote: > one overriding concern: phishing, particularly moderately-sophisticated > phishing which can handle forms of 2FA such as TOTP, SMS, or push, is a > scourge. TOTP was never much defense against phishing, just password compromise (shoulder sur

Re: Improving our usage of Bugzilla

2019-03-12 Thread Daniel Veditz
On Tue, Mar 12, 2019 at 10:53 AM Kohei Yoshino wrote: > The User Story field will be soon removed from the new bug page. > https://bugzilla.mozilla.org/show_bug.cgi?id=1525376 Without a replacement that would be unfortunate. People have been asking for what Honza described for more than 20 yea

Re: Improving our usage of Bugzilla

2019-03-12 Thread Daniel Veditz
On Tue, Mar 12, 2019 at 4:50 AM Honza Bambas wrote: > I wanted to suggest (but never done that) to have specific fields (text > areas) in the bug form for following information: > - explanation of the cause of the defect or rational for the bug > - overview explanation of the fix for the defect (

Re: Improving our usage of Bugzilla

2019-03-12 Thread Daniel Veditz
On Tue, Mar 12, 2019 at 3:55 AM Sylvestre Ledru wrote: > 2) Bug type - new field > 3) Adding a new field called “Regressed by” > Will the new fields be searchable using quicksearch? ___ dev-platform mailing list dev-platform@lists.mozilla.org https://l

Re: Intent to implement and ship: Gamepad Extensions `multi touch` and `light indicator`

2019-02-25 Thread Daniel Veditz
Neither of the words "security" or "privacy" appear in this spec (most w3 web specs have at least a token attempt at a "Privacy and Security Considerations" section). At a surface glance this appears to add additional fingerprinting exposure. Have you talked to the privacy team about ways to minimi

Re: Proposed W3C Charter: Web Application Security (WebAppSec) Working Group

2019-02-22 Thread Daniel Veditz
I support this recharter (disclaimer: I'm a co-chair so of course I do). -Dan Veditz On Fri, Feb 22, 2019 at 5:29 PM L. David Baron wrote: > The W3C is proposing a revised charter for: > > Web Application Security (WebAppSec) Working Group > https://www.w3.org/2019/02/webappsec-2019-proposed

Re: Cookie policy/permission in live documents - proposal

2019-01-28 Thread Daniel Veditz
On Mon, Jan 28, 2019 at 12:57 AM Andrea Marchesini wrote: > If we try to apply the new cookie policy immediately, 3rd party trackers > in opened tabs should switch to a first-party-isolation storage, but they > could also have already data in memory (user-tokens), and populate the new > cookie ja

Re: Cookie policy/permission in live documents - proposal

2019-01-25 Thread Daniel Veditz
Your description equating cookies and storage within a document lifetime makes sense. Is this intended to also apply to network requests? The first-party document already has no access to 3rd party cookies so it shouldn't matter at that level if Necko's rules change "live". If I'm on twitter/facebo

Re: Checking if an nsIURI came from a resource: URL

2018-12-07 Thread Daniel Veditz
I'm afraid to ask why you want to treat these differently. Do you have a channel or a principal? By itself nsIURI only describes the url itself, not its effective origin nor its redirect history. On Fri, Dec 7, 2018, 8:08 AM Henri Sivonen It appears that my the time resource: URLs reach the HTML

Re: Intent to implement: implicit ref=noopener for target=_blank on anchor and area elements

2018-11-21 Thread Daniel Veditz
On Wed, Nov 21, 2018 at 7:08 AM Alex Gaynor wrote: > Do we have any sense of how large the breakage will be, and do we have any > docs for developers who are impacted? (I assume rel=opener is the fix?) > "opener" doesn't exist, and we shouldn't need it. You'd specify a target name other than "_b

Re: PSA: Major preference service architecture changes inbound

2018-07-19 Thread Daniel Veditz
On Tue, Jul 17, 2018 at 9:23 PM, Nicholas Nethercote wrote: > This is a good example of how prefs is a far more general mechanism than I > would like, leading to all manner of use and abuse. "All I want is a > key-value store, with fast multi-threaded access, where the keys aren't > known ahead o

Re: Intent to implement and ship: same-site cookies

2018-04-10 Thread Daniel Veditz
On Mon, Apr 9, 2018 at 11:56 PM, Anne van Kesteren wrote: > We keep > ​ ​ > trying to find ways to limit cookies transmitted over HTTP (and > limiting HTTP in general). Offering better cookies over HTTPS seems > like a good incentive for sites to migrate. > To me "better cookies" means the __Sec

Re: u2f

2018-01-28 Thread Daniel Veditz
On Sat, Jan 27, 2018 at 6:35 PM, greyhorseman wrote: > so we're talking 2 full releases and maybe 6-7 months? Am I at at least > close to correct. > If your question was truly "allow ME to use my ubikeys?" (emphasis mine) then you can do that since Firefox 57, by changing some internal prefs. ht

Re: u2f

2018-01-26 Thread Daniel Veditz
On Fri, Jan 26, 2018 at 6:06 PM, greyhorseman wrote: > question is when, if ever, Firefox is going to support this standard fully > and allow me to use my ubikeys? > https://hacks.mozilla.org/2018/01/using-hardware-token-based-2fa-with-the-webauthn-api/ __

Re: Intent to unship: remote jar: protocol pref

2018-01-16 Thread Daniel Veditz
On Fri, Jan 12, 2018 at 2:12 PM, Gijs Kruitbosch wrote: > the most likely group of people to have enabled this (given 0 public > reports on breakage so far, as far as I'm aware) are people on ESR or > otherwise in enterprise environments > ​Or those trying to run multi-file testcases packaged as

Re: Intent to unship: navigator.registerContentHandler()

2018-01-11 Thread Daniel Veditz
On Wed, Jan 10, 2018 at 5:35 PM, Tantek Çelik wrote: > Also good methodology worth repeating: >"thinking ... through all the way up to and including the user > ​​ > experience, makes for a much more viable approach" > ​Including, of course, "how will 4chan trolls abuse this?" and "how will a

Re: Intent to Implement: canvas-imagedata permission

2018-01-10 Thread Daniel Veditz
On Wed, Jan 10, 2018 at 12:32 PM, L. David Baron wrote: > Is stopping canvas fingerprinting actually a substantial reduction > in available entropy, or is it just removing a convenient source > that happens to combine a bunch of sources of entropy that are also > available elsewhere Blocking ca

Re: Device Orientation API future

2018-01-03 Thread Daniel Veditz
On Wed, Jan 3, 2018 at 7:48 AM, Jonathan Kingston wrote: > For GPS we only ever talk about "location", I still don't think that is a > far stretch from head/position tracking. > ​Users aren't going to understand why their tilt-the-tablet labyrinth game needs to know they're in Brighton in order

Re: Intent to ship: Do not allow a http-auth prompt requested by an image resource loaded from a cross-origin

2017-12-06 Thread Daniel Veditz
On Wed, Dec 6, 2017 at 9:13 AM, Dragana Damjanovic wrote: > Bug 1423522 should fix this. > ​That doesn't fix it, that reenables the phishing risk. There's no reason the phisher's server can't pretend to be a proxy if that's what it takes to get a spoofy auth prompt to show up on a discussion boa

Re: Intent to ship: Do not allow a http-auth prompt requested by an image resource loaded from a cross-origin

2017-12-06 Thread Daniel Veditz
On Tue, Dec 5, 2017 at 1:29 PM, Xidorn Quan wrote: > Would this affect authentication from proxy? For example, if the > cross-origin image is on a domain which PAC decides to use proxy for, > and the proxy requires authentication, would the dialog prompt for it be > suppressed as well? If so, it

Re: Intent to ship: CSP Violation DOM Events

2017-11-17 Thread Daniel Veditz
On Fri, Nov 17, 2017 at 9:25 AM, James Graham wrote: > On 17/11/17 16:06, Daniel Veditz wrote: > >> We fail many of the existing CSP web platform tests, despite having >> implemented most of the features, because they were written to use the >> violation events to chec

Re: Intent to ship: CSP Violation DOM Events

2017-11-17 Thread Daniel Veditz
On Fri, Nov 17, 2017 at 2:01 AM, James Graham wrote: > Do we have cross-browser (i.e. web-platform) tests covering this feature? We fail many of the existing CSP web platform tests, despite having implemented most of the features, because they were written to use the violation events to check t

Re: Reviews for in-tree documentation (was: Builds docs on MDN)

2017-10-19 Thread Daniel Veditz
On Thu, Oct 19, 2017 at 9:30 AM, smaug wrote: > (Hoping the r=documentation flag won't be misused ;)) ​I hope there will be some kind of hook making sure files touched in that manner are all actually documentation files and not other parts of the repo. - ​Dan Veditz​ __

Re: We need better canaries for JS code

2017-10-18 Thread Daniel Veditz
On Wed, Oct 18, 2017 at 4:51 AM, Mark Banner wrote: > I did an experiment, and the only way I got an error out was to have > "javascript.options.strict" on and > ​Why isn't it a code-style/review requirement that our own internal JS include "use strict"? As a quick check I found 659 .jsm files i

Re: Changes to tab min-width

2017-10-06 Thread Daniel Veditz
On Fri, Oct 6, 2017 at 12:15 PM, Randell Jesup wrote: > There's "publish an extension that > ​ ​ > lets you fiddle the width" (doable today). ​WebExtensions can't manipulate prefs other than the ones explicitly exposed via a WebExtension API. Only "system add-ons" have that power now. yes! I

Re: Changes to tab min-width

2017-10-06 Thread Daniel Veditz
On Fri, Oct 6, 2017 at 12:57 AM, Lars Hansen wrote: > even if I don't exactly remember the > ​ ​ > ID I'm looking for I can narrow it down to one or two tabs and then hover > ​ ​ > if I need to. > ​ ​ > Many other sites also have tabs that can be distinguished > ​ ​ > from the first few letters -

Re: Changes to tab min-width

2017-10-05 Thread Daniel Veditz
On Thu, Oct 5, 2017 at 1:07 PM, Gian-Carlo Pascutto wrote: > Is it technically difficult to try the technique of starting with 50px, > and switching to 100px as soon as 50px wouldn't fit anyway? ​Shrinking until they suddenly embiggen and push half your tabs out of sight is going to annoy plent

Re: Intent to implement and ship: CSP exemptions for content injected by privileged callers

2017-10-02 Thread Daniel Veditz
On Mon, Oct 2, 2017 at 8:17 AM, Boris Zbarsky wrote: > The fact is, direct DOM manipulation with no parser involved is really > annoying to use. > ​Fair enough. Could we propose improvements to the API​s that would make them more usable? For example an object argument to createElement() that con

Re: Intent to implement and ship: CSP exemptions for content injected by privileged callers

2017-10-02 Thread Daniel Veditz
On Fri, Sep 29, 2017 at 8:33 PM, Boris Zbarsky wrote: > On 9/29/17 3:32 PM, Kris Maglione wrote: > >> For instance, the following should all capture the caller principal for >> the `src` URL at call time: >> >> document.write(`http://example.com/favicon.ico";>`); >> div.innerHTML = `http:

Re: Intent to ship: CSP directive worker-src

2017-09-25 Thread Daniel Veditz
1 AM, Christoph Kerschbaumer wrote: > > On Sep 22, 2017, at 10:27 PM, Daniel Veditz wrote: > ​Christoph said > >> For backwards compatibility child-src will still be enforced for: >> * workers (if worker-src is not explicitly specified) >> > > ​But the spec says the fal

Re: Intent to ship: CSP directive worker-src

2017-09-22 Thread Daniel Veditz
On Fri, Sep 22, 2017 at 7:24 AM, Anne van Kesteren wrote: > > We plan to ship the CSP directive worker-src within Firefox 58. > > Will we also start enforcing script-src for workers? It seems good > that if you restrict script it actually stops all scripts. > ​Yes. That's what we enforced under

Re: Intent to unship: Top-level Navigations to a data: URI

2017-09-15 Thread Daniel Veditz
Just to clear up the headline: we intend to unship "top level navigations to data:" (currently allowed) by blocking them. The body of the message was clear, just fixing the subject for people (and twitter bots) that don't get that far. -Dan Veditz ___ de

Re: Important changes to account security on bugzilla.mozilla.org

2017-09-08 Thread Daniel Veditz
On Fri, Sep 8, 2017 at 2:42 PM, Frank-Rainer Grahl wrote: > > who can see confidential or secure bugs > > This is a bit vague. If I am cced to a secure bug does this apply if I > only have editbugs otherwise? ​There's a missing ".. by default" there. Only applies if your account is a member of

Re: OS/2 still supported ?

2017-09-07 Thread Daniel Veditz
​On Tue, Jul 25, 2017 at 1:04 AM, Enrico Weigelt, metux IT consult < enrico.weig...@gr13.net> wrote: > On 25.07.2017 02:04, Kris Maglione wrote: > > The only remaining in-tree references to the XP_OS2 macros are in NSPR >> and NSS, which are technically separate projects, and have their own >> set

Re: Device Memory header and JS API

2017-09-07 Thread Daniel Veditz
On Thu, Sep 7, 2017 at 11:28 AM, Enrico Weigelt, metux IT consult < enrico.weig...@gr13.net> wrote: > Optimally, the browser should tell nothing about the client - web > content should written in a way that it works independent from the > actual client. At least that's how the web originally was d

Re: Intermittent oranges and when to disable the related test case - a simplified policy

2017-09-06 Thread Daniel Veditz
On Wed, Sep 6, 2017 at 4:53 PM, Emma Humphries wrote: > This begs the question, why was that whiteboard tag being used that way? > ​Surely there are other reasons to disable tests, and people might want to track those too. If you want to restrict your new keyword to just "disabled because interm

Re: Device Memory header and JS API

2017-09-06 Thread Daniel Veditz
On Tue, Sep 5, 2017 at 10:13 AM, Shubhie Panicker via dev-platform < dev-platform@lists.mozilla.org> wrote: > Boris expressed privacy concern with the API and suggested starting a > thread here to get some concrete feedback. ​It's great that you agreed to send this (and other client hints?) only

Re: Proposed W3C Charter: WebVR Working Group

2017-08-16 Thread Daniel Veditz
On Wed, Aug 16, 2017 at 3:51 PM, L. David Baron wrote: > I still think opposing this charter because the group should still > be in the incubation phase would be inconsistent with our shipping > and promotion of WebVR. > ​I agree that would be exceptionally odd and require a well reasoned argume

Re: Intent to ship version 4 of the Safe Browsing protocol

2017-08-16 Thread Daniel Veditz
On Wed, Aug 16, 2017 at 7:20 AM, Enrico Weigelt, metux IT consult < enrico.weig...@gr13.net> wrote: > Regarding CID vs CONTRACTID - still haven't understood why CIDs are > random numbers, instead of human-readable names ​Someone in 1999 or 2000 thought it was a good idea and set the pattern.​ A

Re: Retaining Nightly users after disabling of legacy extensions

2017-08-13 Thread Daniel Veditz
Don't do (c) -- its pointless. You won't be helping us test nightly changes and will miss any important fixes (especially security ones). Go ahead and switch to beta if you have to. Your extensions will work, you'll be helping us ship a good 56, and you'll get security fixes. Hate to lose nightly t

Re: Removal of deprecated apis

2017-08-11 Thread Daniel Veditz
On Fri, Aug 11, 2017 at 2:19 PM, Frank-Rainer Grahl wrote: > Great that you are so zealous to remove deprecated apis from the tree. I > just wish I would see the same amount of work put into fixing web > extensions shortcomings. If you're not seeing that we've put multiples of effort into build

Re: Phabricator and confidential reviews

2017-08-09 Thread Daniel Veditz
On Wed, Aug 9, 2017 at 11:32 AM, Mark Côté wrote: > I actually like Gijs's proposal, to mirror *from* Phabricator *to* BMO. > That way, if you're looking at the bug and want to pull someone in, you CC > them; if you're looking at the fix and want to involve someone, you add > them as a subscriber

Re: nsIURI API changes - punycode domain names

2017-08-09 Thread Daniel Veditz
On Wed, Aug 9, 2017 at 9:57 AM, Valentin Gosu wrote: > This is a definite improvement in terms of web-compat. document.origin, > location.href, etc will from now on return punycode. > ​What do web pages do if they want to reflect a pretty URL into their page? Will everyone have to include script

Re: Phabricator and confidential reviews

2017-08-09 Thread Daniel Veditz
On Tue, Aug 8, 2017 at 5:30 PM, Mark Côté wrote: > I am not sure how often CCed users are involved with confidential bugs' > patches > ​[​ > ​] Anecdotally I have been told that a lot of the time users are CCed > just to be informed of the problem, e.g. a manager might want to be aware > of a

Re: Phabricator and confidential reviews

2017-08-09 Thread Daniel Veditz
On Wed, Aug 9, 2017 at 12:20 AM, Axel Hecht wrote: > I think we should strive to have as few people as possible with general > access to security bugs. ​We do. We've reduced the number of people with access, and split the "client" security group into ~10 sub groups so that any given person has

Re: Phabricator and confidential reviews

2017-08-09 Thread Daniel Veditz
On Tue, Aug 8, 2017 at 11:38 PM, Nicolas B. Pierron < nicolas.b.pier...@mozilla.com> wrote: > However, users outside of the security group(s) can see confidential bugs >> if they are involved with them in some way. Frequently the CC field is >> used as a way to include outsiders in a bug. > > > N

Re: Intent to ship: Treating 'data:' documents as unique, opaque origins

2017-08-08 Thread Daniel Veditz
On Tue, Aug 8, 2017 at 6:12 AM, Christoph Kerschbaumer wrote: > compliant with the behavior of other browsers which all have been shipping > that behavior for a long time. > No other browser has _ever_ treated data: the way we do. The spec at one time said they should because it makes a kind of

Re: Phabricator Update, July 2017

2017-07-12 Thread Daniel Veditz
On Wed, Jul 12, 2017 at 8:54 AM, Byron Jones wrote: > Consider that we are talking about "turning off" mozreview now. Will all >> the bugzilla links to those reviews go dead? Or do we have to maintain a >> second service in read-only mode forever? >> > > the patches will be archived in some for

Re: Mozilla Charset Detectors

2017-05-26 Thread Daniel Veditz
On Fri, May 26, 2017 at 4:12 AM, wrote: > Still, sometimes XML fragments come up and even if they are not 100% XML > spec compliant i still have to process them. This includes encoding > detection as well, when the XML declaration is missing from the fragments. > ​Where do the fragments come fro

Re: Intent to change editor newline behavior

2017-04-05 Thread Daniel Veditz
On Wed, Apr 5, 2017 at 7:14 AM, Aryeh Gregor wrote: > > really help. :-( But to me it seems like the kind of thing that we'd > > want to be able to quickly turn off on the release channel through > > shipping a hotfix add-on that sets a pref if something goes wrong... > > FWIW, changing the def

Re: Better download security through browsers

2017-03-27 Thread Daniel Veditz
On Mon, Mar 27, 2017 at 1:22 AM, Frederik Braun wrote: > UI hooks, for the SafeBrowsing > ​ ​ > malicious file checks, where we really, > ​ ​ > really discourage you from using > ​ ​ > the downloaded file but you can still click around that with lots of > ​ ​ > left-clicking. > ​"Not known to be

Re: Better download security through browsers

2017-03-25 Thread Daniel Veditz
Most people working on sub-resource integrity has wanted to extend SRI to downloads, it was even in the initial version of the spec but foundered in the weeds of edge cases iirc. I don't see an open issue for it though: looks like it got lost in the transition from our old repo to the new one. It's

Re: Third Party Library Alert Service

2017-03-18 Thread Daniel Veditz
On Fri, Mar 17, 2017 at 3:26 PM, Ehsan Akhgari wrote: > We have library imports that are forks, for example > ​ ​ > dom/media/webaudio/blink, as the README file explains. That should > probably be removed from that list. > ​Forks are tricky. Just because we can't directly import the upstream do

Re: Expanding regular regression triage to include crashes?

2016-12-20 Thread Daniel Veditz
On Mon, Dec 19, 2016 at 10:00 PM, Kan-Ru Chen wrote: > I think the most important is to identify whether the crash bugs are > regressions so they can be tracked accordingly. I would guess that crash bugs filed by project Uptime are going to be (or at least look like) regressions or they would h

Re: W3C Proposed Recommendation: CSP2 (Content Security Policy 2)

2016-12-09 Thread Daniel Veditz
We have implemented CSP2 and are in support of it's adoption as a standard. -Dan Veditz On Mon, Nov 7, 2016 at 10:07 PM, L. David Baron wrote: > A W3C Proposed Recommendation is available for the membership of W3C > (including Mozilla) to vote on, before it proceeds to the final > stage of being

Re: HTML spec changes about data: URIs and origins

2016-09-13 Thread Daniel Veditz
On Tue, Sep 13, 2016 at 12:25 PM, Boris Zbarsky wrote: > Probably; we know they get created; what we don't know is how they're used. ​Since Gecko is the only engine that behaves this way we can be reasonably sure we won't find public "must use Firefox" web sites depending on this behavior​. Int

Intent to Implement and ship: cookie prefixes

2016-07-18 Thread Daniel Veditz
The "Cookie prefix" adds restrictions to how cookies with two specific prefixes may be used. This addresses some of the Weak Confidentiality and Weak Integrity concerns noted by RFC 6265 ( https://tools.ietf.org/html/rfc6265#section-8.5). Cookies whose names start with "__Secure-" or "__Host-" mus

Re: WebRTC connections do not trigger content policies. Should they?

2016-06-21 Thread Daniel Veditz
On Sat, Jun 18, 2016 at 6:37 AM, Eric Rescorla wrote: > instead of having it sourced from the > ​ ​ > advertiser's > ​ ​ > origin, they instead stand > up ".publisher.example.com" > ​ ​ > and > ​ ​ > point > ​ ​ > it at the advertiser's > IP addresses (via an A record to the advertiser's > ​ ​ >

Re: Moving XP to ESR?

2016-04-21 Thread Daniel Veditz
On 4/20/16 11:53 AM, Armen Zambrano G. wrote: > Would it make more sense to have a relbranch instead of using ESR? Oh lordy, no! It's hard enough diverting engineering work to supporting a single ESR 9 months after the fork. Why would we do two of them? How would a relbranch differ from ESR? > II

Re: Triage Plan for Firefox Components

2016-03-31 Thread Daniel Veditz
On Thu, Mar 31, 2016 at 12:28 PM, Milan Sreckovic wrote: > I’m going to start and keep arguing that we do not want to have an > explicit name for that largest bucket of “wishlist” bugs, and should > instead have it marked by the absence of a tag. ​What distinguishes a bug that has not been tria

Re: FYI: e10s will be enabled in beta 44/45

2015-12-13 Thread Daniel Veditz
On Mon, Dec 7, 2015 at 4:36 AM, Kurt Roeckx wrote: > On 2015-12-04 19:43, jmath...@mozilla.com wrote: > >> Not an issue since initial rollout to beta and release will be to users >> who do not have addons installed. >> > > Is it even possible to have no addons installed? Firefox installed a > nu

Re: Voting in BMO

2015-06-11 Thread Daniel Veditz
On Thu, Jun 11, 2015 at 1:18 PM, Mike Hoye wrote: > The word "vote" implies that the act of voting has a direct effect on the > outcome, which is clearly not the case here and really shouldn't be. But > that's probably the root of a lot of community frustration. > ​Forums like Reddit and StackOv

Re: Firefox still blocks the (fixed) Java Deployment Toolkit & click-to-play popup displays wrong item repeatedly

2015-06-03 Thread Daniel Veditz
The Java Deployment Kit can be used to force the use of a down-rev vulnerable version of Java if it's installed and even prompt for its installation (which a large number of users will fall for, even if a small percent). It's an enterprise feature and an enterprise-managed deployment of Firefox can

Re: No more binary components in extensions

2015-05-04 Thread Daniel Veditz
The patch in the bug removes it from the shared manifest parser, Thunderbird and SeaMonkey are out of luck unless they fork this. -Dan Veditz ___ dev-platform mailing list dev-platform@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-platform

Re: Intent to deprecate: Insecure HTTP

2015-04-19 Thread Daniel Veditz
On Thu, Apr 16, 2015 at 5:16 AM, wrote: > - You don't want to hear about non-centralized security models. DANE > provides me with control over certificate pinning for people visiting my > websites. > ​[...] If you don't like DANE, explain why, and propose something else > that is non-centralized

Re: Intent to deprecate: Insecure HTTP

2015-04-19 Thread Daniel Veditz
On Wed, Apr 15, 2015 at 6:13 PM, Karl Dubost wrote: > Socially, eavesdropping is part of our daily life. We go to a café, we are > having a discussion and people around you may listen what you are saying. > You read a book in the train, a newspaper and people might see what you are > reading. >

Re: Intent to deprecate: Insecure HTTP

2015-04-19 Thread Daniel Veditz
On Tue, Apr 14, 2015 at 3:29 AM, Henri Sivonen wrote: > I think we should make > ​ ​ > the UI designation of plain http undesirable once x% the sites that > ​ ​ > users encounter on a daily basis are https. Since users don't interact > ​ ​ > with the whole Web equally, this means that the UI for

Re: Intent to deprecate: persistent permissions over HTTP

2015-03-08 Thread Daniel Veditz
On Fri, Mar 6, 2015 at 10:18 AM, Ehsan Akhgari wrote: > On 2015-03-06 1:14 PM, andreas@gmail.com wrote: > >> I can no longer unblock popups on sites that use HTTP. The web is a big >> place. It will take a long time for everyone to move. >> > > I think Anne is not proposing that. He's propos

Re: Proposed W3C Charter: Web Application Security (WebAppSec) Working Group

2015-02-11 Thread Daniel Veditz
On Wed, Feb 11, 2015 at 2:02 AM, Mike West wrote: > > >> https://mikewest.github.io/internetdrafts/origin-cookies/draft-west-origin-cookies-00.html >> >> https://mikewest.github.io/internetdrafts/first-party-cookies/draft-west-first-party-cookies-00.html >> >> Not many people are interested thus

Re: Proposed W3C Charter: Web Application Security (WebAppSec) Working Group

2015-02-11 Thread Daniel Veditz
A new version of the charter has been uploaded that hopefully addresses these objections On Thu, Jan 29, 2015 at 10:32 PM, L. David Baron wrote: > (1) The "Confinement with Origin Web Labels" deliverable is described > in a way that makes it unclear what the deliverable would do. It > s

Re: Proposed W3C Charter: Web Application Security (WebAppSec) Working Group

2015-01-30 Thread Daniel Veditz
On Thu, Jan 29, 2015 at 10:32 PM, L. David Baron wrote: > There are a number of problematic aspects to this charter to which > we object: > > (1) The "Confinement with Origin Web Labels" deliverable is described > in a way that makes it unclear what the deliverable would do. It > should

Re: W3C Proposed Recommendation: longdesc

2015-01-11 Thread Daniel Veditz
On 1/7/15 6:51 PM, John Foliot wrote: > (Q: what part of openness = rejecting an attribute that many still > want to see retained? That seems very "closed" to me...) Don't confuse "open" with a democratic and/or consensus process. Open means that our decision making process is as transparent as po

Re: Breakdown of Firefox full installer

2014-10-14 Thread Daniel Veditz
On 10/13/2014 4:54 PM, Chris More wrote: > For example, the win32 installer for Firefox 32 is 34MB. Remember the days when Asa would jump all over people for breaking the 5Mb barrier? https://wiki.mozilla.org/Download_Size -Dan Veditz ___ dev-platform m

Re: Breakdown of Firefox full installer

2014-10-14 Thread Daniel Veditz
On 10/13/2014 9:25 PM, Chris Peterson wrote: > Going forward, it would be interesting to see a dashboard track Firefox > installer size every day (or show every changeset's delta on Treeherder). We used to have http://arewesmallyet.com -- I found references to it as late as a year ago but it seems

Re: Intent to Implement:

2014-10-13 Thread Daniel Veditz
On 10/13/2014 9:15 AM, Jonas Sicking wrote: > This will only be exposed to privileged and certified apps, right? > Other content that does createElement("webview") will simply get a > HTMLUnknownElement, right? What does an unprivileged app get if it tries to use ? Probably not an HTMLUnknownEleme

Re: Restricting gUM to authenticated origins only

2014-09-08 Thread Daniel Veditz
On 9/8/2014 2:16 AM, Mounir Lamouri wrote: > On Sun, 7 Sep 2014, at 04:56, Martin Thomson wrote: >> It's more the case that a persistent positive grant from permission >> manager would be ignored for non-secure origins and non-secure origins >> would not show any option to persist. > > I don't kno

Re: Intent to implement: Disabling auto-play videos on mobile networks/devices?

2014-08-25 Thread Daniel Veditz
On 8/24/2014 6:21 PM, Eric Rescorla wrote: > FWIW, to the best of my knowledge WebRTC calls do not require a click. But you have to click on the door-hanger to share camera/mic (or be on a site you have already trusted not to abuse the permissions). -Dan Veditz ___

Re: Press Me! Button

2014-07-31 Thread Daniel Veditz
On 7/31/2014 9:59 AM, Martin Thomson wrote: > I found out what it was though: > https://github.com/raymak/contextualfeaturerecommender > > I don't remember installing that addon. Was it one of the Telemetry Experiments? https://github.com/raymak/contextualfeaturerecommender/tree/master/phase1/exp

Alternative add-on signing proposal

2014-06-23 Thread Daniel Veditz
Many of you may have seen the earlier add-on "file registration" and signing discussions. I have posted a revised proposal that requires all add-ons to be signed (AMO-hosted add-ons will be signed automatically) to the mozilla.addons.user-experience group/list. If you're interested in this top

Re: Overriding the CSP for privileged protocols

2014-06-05 Thread Daniel Veditz
On 6/5/2014 8:50 AM, Boris Zbarsky wrote: > On 6/5/14, 11:39 AM, Matthew Gertner wrote: >> The problem is that on sites the enforce their own CSP, the resources >> may not be loaded. For example, github.com has script-src set to >> 'self' so it won't load stylesheets via our protocol. Is there any

Re: Target Milestone field in bugzilla

2014-01-16 Thread Daniel Veditz
On 1/9/2014 9:47 AM, Gavin Sharp wrote: > In theory (mine at least), the field is free to be used for planning > which release you want the bug fixed in, before the bug is fixed. > After the bug is fixed, it should be used as you describe. Some groups do use the field this way, for example the NSS

Re: The future of PGO on Windows

2013-02-01 Thread Daniel Veditz
On 1/30/2013 8:03 PM, Ehsan Akhgari wrote: It turns out that disabling PGO but keeping LTCG enabled reduces the memory usage by ~200MB, which means that it's not an effective measure. Disabling both LTCG and PGO brings down the linker's virtual memory usage to around 1GB, which means that we wil