Options:
- # Session Start: Wed Jan 27 00:00:00 2010
- # Session Ident: #whatwg
- # [14:39] * Attempting to rejoin channel #whatwg
- # [14:39] * Rejoined channel #whatwg
- # [14:39] * Topic is 'WHATWG: http://www.whatwg.org/ -- logs: http://krijnhoetmer.nl/irc-logs/ -- stats: http://gavinsharp.com/irc/whatwg.html -- Please leave your sense of logic at the door, thanks!'
- # [14:39] * Set by annevk42 on Mon Oct 19 22:03:06
- # [14:39] * Quits: ray (i=ray@drong.notacat.org) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: syp (n=syp@lasigpc9.epfl.ch) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: gsnedders (n=gsnedder@204.232.194.186) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: tiglionabbit (n=nick@67-207-136-95.slicehost.net) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: Philip` (n=philip@zaynar.co.uk) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: hober (n=ted@unaffiliated/hober) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: shepazu (n=schepers@adsl-150-130-9.rmo.bellsouth.net) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: sebmarkbage (n=miranda@213.80.108.29) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Quits: starjive (i=beos@81-233-16-19-no30.tbcn.telia.com) (leguin.freenode.net irc.freenode.net)
- # [14:39] * Joins: tigliona1bit (n=nick@67-207-136-95.slicehost.net)
- # [14:39] * Joins: syp_ (n=syp@lasigpc9.epfl.ch)
- # [14:40] * Joins: gsnedder1 (n=gsnedder@204.232.194.186)
- # [14:40] * Joins: Philip` (n=philip@zaynar.co.uk)
- # [14:40] * Joins: ray (i=ray@drong.notacat.org)
- # [14:42] * Joins: TabAtkins (n=chatzill@70-139-15-246.lightspeed.rsbgtx.sbcglobal.net)
- # [14:57] * Joins: Chris|UNC (n=blahness@152.2.194.196)
- # [15:00] * Quits: takoratta (n=takoratt@202.171.161.131) (Client Quit)
- # [15:00] * Chris|UNC is now known as Chris|Work
- # [15:00] * Quits: Chris|Work (n=blahness@152.2.194.196) (Client Quit)
- # [15:01] * Joins: ChrisLTD|Work (n=blahness@152.2.194.196)
- # [15:07] * Quits: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp) ("Tomorrow to fresh woods, and pastures new.")
- # [15:08] * Joins: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp)
- # [15:10] * Joins: BlurstOfTimes (n=blurstof@168.203.117.66)
- # [15:10] * Quits: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp) (Client Quit)
- # [15:10] * Joins: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp)
- # [15:13] * Quits: hish (n=chatzill@p57B7F29F.dip.t-dialin.net) (Remote closed the connection)
- # [15:14] * Quits: danbri (n=danbri@unaffiliated/danbri) (Read error: 110 (Connection timed out))
- # [15:17] * Quits: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp) ("Tomorrow to fresh woods, and pastures new.")
- # [15:17] * Joins: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp)
- # [15:19] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [15:22] * Joins: danbri (n=danbri@ip176-48-210-87.adsl2.static.versatel.nl)
- # [15:22] * Joins: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com)
- # [15:31] * Joins: miketaylr (n=miketayl@38.117.156.163)
- # [15:34] * Joins: vvv (n=vvv@mediawiki/VasilievVV)
- # [15:46] * Joins: shepazu (n=schepers@adsl-150-130-9.rmo.bellsouth.net)
- # [15:52] <hsivonen> whoa! WebKit nightlies can already animate an element to full screen
- # [15:52] <hsivonen> when has that landed and has it been proposed to the CSS WG or any WG?
- # [15:52] <Lachy> hsivonen, how?
- # [15:53] <hsivonen> Lachy: I didn't go through view source yet
- # [15:53] <Lachy> demo?
- # [15:53] <hsivonen> Lachy: http://jilion.com/sublime/video
- # [15:54] <Lachy> oh, that's just full window zooming, not full screen
- # [15:54] <hsivonen> Lachy: alt-click in a nightly for full screen
- # [15:54] <Lachy> I suspect it's done with CSS transitions or CSS animations
- # [15:55] <hsivonen> Lachy: see docs on the page
- # [15:57] <Lachy> I guess my webkit version is a few days too old.
- # [15:57] <Lachy> upgrading now, will see if that works
- # [15:58] <hsivonen> webkitEnterFullScreen
- # [15:58] <hsivonen> http://code.google.com/p/chromium/issues/detail?id=16735#c30
- # [15:58] <Lachy> nice. webkitEnterFullScreen()
- # [15:58] * Quits: paul_irish (n=paul_iri@c-71-192-163-128.hsd1.nh.comcast.net) ("Leaving...")
- # [15:59] <hsivonen> 2009-11-12 Eric Carlson <eric.carlson@apple.com>
- # [15:59] <Lachy> I've long argued that we should drop that restriction in HTML5, and the bogus security note, about entering full screen
- # [15:59] <Rik|work> this demo uses webkit transitions
- # [16:00] <hsivonen> yay. secret rdar bug
- # [16:00] <hsivonen> Rik|work: how is the transition specified?
- # [16:00] <hsivonen> also, what's the UI spoofing security story for this stuff?
- # [16:00] <zcorpan> <source title='http://d31j8lt3uybmqs.cloudfront.net/sublimevideo/dartmoor.mp4' type='video/mp4' /> - poor man's preload='none'?
- # [16:01] <Rik|work> with CSS transitions set in JS
- # [16:01] <Lachy> full screen doesn't work for me in the latest webkit on Mac
- # [16:01] * hsivonen wonders if there's a spec
- # [16:02] <hsivonen> oddly, it's only for HTMLMediaElement
- # [16:02] <hsivonen> not for Element
- # [16:02] <hsivonen> but still, the overlaid custom controls are supported
- # [16:03] <Lachy> hsivonen, which platform are you using?
- # [16:03] <Rik|work> hsivonen: after running the full window version, I have -webkit-transition: -webkit-transform; set on the <video> style attribute
- # [16:04] <Rik|work> but I don't know how the alt+click triggers the full screen mode
- # [16:05] <hsivonen> Lachy: Snow Leopard
- # [16:05] <Rik|work> and the minified JS is not helping
- # [16:06] <hsivonen> Rik|work: seems to call webkitEnterFullScreen() on the video element
- # [16:08] <hsivonen> WebKit sure has long changeset messages
- # [16:08] <Lachy> hsivonen, ok. It's not working for me on Leopard. I'll try Snow Leopard later. It works on Windows though
- # [16:08] <Rik|work> didn't know there is a function for that
- # [16:09] <hsivonen> hmm. platform/mac-tiger/Skipped
- # [16:09] <hsivonen> does WebKit still support pre-Tiger Mac OS X?
- # [16:10] <hsivonen> http://trac.webkit.org/changeset/50893
- # [16:10] * Quits: GarethAdams|Work (n=GarethAd@pdpc/supporter/active/GarethAdams)
- # [16:10] * gsnedder1 is now known as gsnedders
- # [16:11] <AryehGregor> Strict-Transport-Security: max-age=500
- # [16:11] <AryehGregor> What kind of useless STS header is that? 500 seconds?
- # [16:11] <AryehGregor> I leave the tab open for ten minutes and MITM starts working again?
- # [16:12] <AryehGregor> It should be six months or something. Then browsers could ship it in a fixed list and avoid the bootstrapping problem.
- # [16:19] <hsivonen> what happens if an attacker spoofs DNS and sets a long STS time to live on a bogus cert?
- # [16:19] * Quits: boblet (n=boblet@p1072-ipbf36osakakita.osaka.ocn.ne.jp)
- # [16:19] <hsivonen> will users then be locked out of the real service for a long time?
- # [16:19] <AryehGregor> He'd have to get a bogus cert first.
- # [16:19] <AryehGregor> In that case, you lose anyway.
- # [16:19] <Rik|work> hsivonen: webkitEnterFullScreen seems to be protected, I can't call it in the console, I think it's only available in an onclick event
- # [16:19] <AryehGregor> In theory, though, yeah, sure.
- # [16:20] <AryehGregor> You can probably manage your STS settings somewhere, though.
- # [16:20] <hsivonen> AryehGregor: isn't the CA lock feature's whole point that getting a bogus cert is a real threat scenario
- # [16:20] <AryehGregor> Rik|work, I should hope so!
- # [16:20] <Rik|work> yeah, document.querySelector('video').webkitEnterFullScreen(); doesn't work
- # [16:20] <Rik|work> but window.onclick = function () {document.querySelector('video').webkitEnterFullScreen()} works
- # [16:21] <AryehGregor> hsivonen, no, the whole point of STS is 1) attackers could intercept an HTTP request (e.g., from typing "paypal.com" into URL bar) before it gets promoted to HTTPS, 2) users can click through normal cert warnings, but not if STS is set.
- # [16:21] <hsivonen> Rik|work: yay for APIs that modify behavior depending on call stack
- # [16:21] <AryehGregor> hsivonen, well, popup windows already do that.
- # [16:21] * Joins: foolip (n=philip@h-63-95.A163.priv.bahnhof.se)
- # [16:21] <Rik|work> it throws Error: INVALID_STATE_ERR: DOM Exception 11 otherwise
- # [16:21] <hsivonen> AryehGregor: is the CA lock feature different from STS then?
- # [16:22] <hsivonen> AryehGregor: I'm pretty sure one of the strict SSL things that are emerging had a CA lock feature
- # [16:22] <AryehGregor> I think that's being left out of the first draft.
- # [16:22] <AryehGregor> http://lists.w3.org/Archives/Public/www-archive/2009Sep/att-0051/draft-hodges-strict-transport-sec-05.plain.html#strict-transport-security-http-response-header-field
- # [16:22] <hsivonen> oh ok
- # [16:23] <AryehGregor> It would be even better, IMO, if you could lock it to your own organization's private key. That way you could switch CAs if you wanted.
- # [16:23] <AryehGregor> But let's start with the basics, making SSL actually effectively prevent MITM. :)
- # [16:24] <hsivonen> my bank uses EV when I log in through their front door to do banking
- # [16:24] * Quits: KevinMarks (n=KevinMar@c-67-161-44-219.hsd1.ca.comcast.net) (Client Quit)
- # [16:24] <hsivonen> but they don't use EV when a merchant redirects to them for payment
- # [16:24] <hsivonen> FAIL
- # [16:24] <AryehGregor> EV isn't good for much anyway, as far as I can tell.
- # [16:25] <AryehGregor> I mean, it relies on what, someone actually clicking on some icon to show the certificate details?
- # [16:25] <hsivonen> AryehGregor: well, yeah, but if a bank is going to use EV at all, they should use it all the time and *especially* when the user enters through someone else's site
- # [16:26] <hsivonen> Paypal seems to get it
- # [16:26] <hsivonen> banks not so much
- # [16:26] <hsivonen> but even Paypal uses autocomplete='off'
- # [16:26] <hsivonen> which doesn't make sense
- # [16:26] <AryehGregor> Paypal is an online-only operation, it's typical that those have much more tech savvy than a brick-and-mortar place that also happened to put up a website.
- # [16:26] <AryehGregor> Why doesn't it make sense?
- # [16:27] <hsivonen> because my browser is better at telling if it is refilling a form on the real paypal.com than I am
- # [16:27] <AryehGregor> The point is so that it doesn't save the password where someone can look it up by clicking Preferences -> Privacy -> Show Saved Passwords or whatever.
- # [16:27] * Joins: dglazkov (n=dglazkov@c-67-188-0-62.hsd1.ca.comcast.net)
- # [16:27] <AryehGregor> Although you're right that autofilling is a cue that you're on the right site.
- # [16:28] <hsivonen> I have a greasemonkey script that fixes that for me when I enter through paypal.com
- # [16:28] <AryehGregor> It should probably autofill the username but not the password, does it do that?
- # [16:28] <hsivonen> but for some reason, the script fails when I enter through the French front of Paypal
- # [16:28] <hsivonen> AryehGregor: no
- # [16:28] <AryehGregor> Oh well.
- # [16:28] <hsivonen> they can't control my Webmail autofill
- # [16:29] <hsivonen> and email is the single point of failure anyway
- # [16:29] <AryehGregor> The entire concept of passwords is broken anyway.
- # [16:29] <hsivonen> so unless they want to send me a one-time pad, they shouldn't bother with the autofill=off nonsense
- # [16:29] <AryehGregor> Failure of e-mail won't break PayPal, they require more than just an e-mail to do password resets. I think. My mother's account was recently disabled for some reason and I had to take a phone call to get it reset.
- # [16:29] <hsivonen> also, it's not good to make me carry the Paypal password on a piece of paper
- # [16:30] <AryehGregor> Passwords are really stupid, we should be logging in using some kind of public-key infrastructure where the private key isn't actually exposed to a programmable computer at any point.
- # [16:31] <AryehGregor> Like it's in a USB device that only provides an API to the computer to let it encode or decode things using the private key, but doesn't actually tell it what it is, so you need the physical device to use the key.
- # [16:31] <AryehGregor> That could replace all passwords and make it impossible to steal someone's login remotely, whether with phishing or anything else.
- # [16:31] <AryehGregor> But it would require a whole bunch of infrastructure.
- # [16:33] <Philip`> Everyone would lose their devices
- # [16:33] <Philip`> Also, it would make it too hard to share your login details with somebody else
- # [16:34] <TabAtkins> Password on brain states. You just have to wait for ubiquitous persocom implants, and mind emulation.
- # [16:34] <hsivonen> AryehGregor: hardware dongles FAIL for compatibility reasons
- # [16:34] <TabAtkins> Implementation details, really.
- # [16:35] <AryehGregor> Philip`, you can get around the "losing" part by entrusting a master copy to someone who won't lose it, like your bank vault. And have some setup where you can reclaim your accounts even if you lose the device, just like you can reclaim accounts if you forget the password today.
- # [16:35] <AryehGregor> Philip`, sharing login details is best accomplished by some form of explicit delegation, not just giving them your login. But you could share private keys with someone too.
- # [16:36] <AryehGregor> hsivonen, what?
- # [16:36] <AryehGregor> TabAtkins, once you have mind emulation, couldn't you use that to emulate the brain states? :)
- # [16:36] <Philip`> If you e.g. are in a business and need to process some financial transaction before the end of the day but the only person who is able to authorise it is on holiday, it's far easier if you just ask them for their login name and password before they leave
- # [16:36] <AryehGregor> Also, what's to prevent playback attacks?
- # [16:36] <AryehGregor> Replay attacks, I mean.
- # [16:37] <TabAtkins> AryehGregor: Not without the consent of the mind-state, obviously. And if you can do that, you can force the real person to give up whatever authent mechanism is used as well.
- # [16:37] <AryehGregor> Philip`, you're making assumptions about how easy it would be to delegate here.
- # [16:37] <Philip`> and that's a situation where normal people can understand the security model and risks, so it's probably going to be better than some complex fancy delegation system that's theoretically much more secure
- # [16:37] <TabAtkins> At least mind-states know that they're just copies.
- # [16:38] <AryehGregor> Meh, it would be a black box. You train people to do it and they can do it. The dongle is a magical device that lets them log in, don't let anyone else have it. If they want to let someone else use their account, they can make a file to send to them by clicking through a friendly GUI.
- # [16:38] <AryehGregor> It's a lot less complicated than many other things people have to do every day.
- # [16:38] <AryehGregor> Plus, normal people hate passwords and would welcome a bit of extra complexity if it meant they didn't have to use them.
- # [16:39] <AryehGregor> (geeks also hate passwords, of course)
- # [16:39] * Quits: miketaylr (n=miketayl@38.117.156.163) (Excess Flood)
- # [16:39] * Joins: miketaylr (n=miketayl@38.117.156.163)
- # [16:45] * Joins: Sidnicious (n=Sidney@pdpc/supporter/professional/sidney)
- # [16:51] <hsivonen> AryehGregor: hardware dongles are OK if they show you a number and you write it into your device
- # [16:52] <hsivonen> AryehGregor: handware dongles that connect to your computing device are bad, because:
- # [16:52] <hsivonen> 1) people think they are more secure than the Windows malware signing stuff as you
- # [16:52] <hsivonen> 2) they limit competetition between desktop OSs, because driver availability for Mac and Linux will suck
- # [16:53] <hsivonen> 3) they don't work with your portable device that doesn't have the right interface form factor
- # [16:53] <hsivonen> so smart cards and USB dongles are bad
- # [16:53] <AryehGregor> 1) You mean like the things that cycle through new numbers every minute? Do those actually work if you don't want the one receiving the number to be able to figure out what the next number is? I always thought client and server were just running the same PRNG with the same seed, so it's basically a shared secret, which isn't as good as a public key.
- # [16:53] * Joins: starjive (i=beos@81-233-16-19-no30.tbcn.telia.com)
- # [16:54] <hsivonen> Finland has wasted enormous amounts of tax payer money on a smart card system
- # [16:54] <AryehGregor> 2, 3) Just make it a USB standard, say, like mass storage devices. Portable devices usually have one of the mini-USB things, don't they?
- # [16:54] <hsivonen> AryehGregor: RSA has number generators. I don't know what their properties are and if they require you to trust your identity broker
- # [16:54] <hsivonen> AryehGregor: cheap phones don't have USB host mode
- # [16:55] <AryehGregor> Also, how long would the number have to be for real security? RSA normally relies on public keys that are a few thousand bits . . .
- # [16:55] <AryehGregor> hsivonen, they could pretty easily. I never said this wouldn't require infrastructure changes, that's the major problem with it.
- # [16:55] <hsivonen> anyway, the enormously expensive smart card system in Finland is a massive FAIL
- # [16:55] <hsivonen> and what really works is one-time pads (on paper)
- # [16:56] <hsivonen> and banks that issue the pads working as identity broker back ends
- # [16:56] * Philip` 's bank has a thing where you have to put your card and PIN number into a device, then enter a number from the web site and type the result back into the site
- # [16:56] <Philip`> so it's not a PRNG thing
- # [16:56] <hsivonen> and a government site acting as a broker that connects identity consumers with the banks so that you don't need n times m integration
- # [16:56] <AryehGregor> Philip`, interesting.
- # [16:57] <hsivonen> anyway, the value added by an RSA thingy compared to a paper OTP is likely low
- # [16:57] <TabAtkins> So basically a government-run openid server?
- # [16:57] <Philip`> (The card is the important component, the devices are all the same)
- # [16:57] <hsivonen> TabAtkins: not OpenID, but kinda
- # [16:57] <hsivonen> say you want to check your pension situation
- # [16:57] <TabAtkins> Yeah, not the specific technology. Just making an analogy.
- # [16:57] <hsivonen> so you go to the pension site
- # [16:57] <hsivonen> it redirects you to the identity broker
- # [16:58] <hsivonen> the identity broker supports the smart card stuff
- # [16:58] <hsivonen> but no one uses it
- # [16:58] <hsivonen> so instead, you click the logo of your bank
- # [16:58] <hsivonen> get forwarded to your bank
- # [16:58] <hsivonen> give a number from your OTP to the bank
- # [16:58] <hsivonen> the bank redirects you to the broker
- # [16:58] <hsivonen> and the broker redirects you to the pension site
- # [16:59] <hsivonen> and the pension site gets your personal ID number
- # [16:59] * Quits: BlurstOfTimes (n=blurstof@168.203.117.66) (Remote closed the connection)
- # [16:59] <hsivonen> everyone has the ID number anyway
- # [16:59] <hsivonen> assigned at birth
- # [17:00] * Joins: BlurstOfTimes (n=blurstof@168.203.117.66)
- # [17:00] <hsivonen> or when becoming a resident if not born here
- # [17:01] <hsivonen> works with any browser
- # [17:01] <hsivonen> no hardware dongles
- # [17:01] <hsivonen> no barriers to launching new software or hardware browsing platforms
- # [17:01] <hsivonen> no South Korea situation
- # [17:02] <TabAtkins> Well, the government has to recognize you as an identity backend.
- # [17:02] <TabAtkins> But that's it, I guess. And backends can then use whatever stuff they want to id you.
- # [17:03] * Quits: dglazkov (n=dglazkov@c-67-188-0-62.hsd1.ca.comcast.net)
- # [17:03] * Joins: mlpug (n=mlpug@a88-115-164-40.elisa-laajakaista.fi)
- # [17:03] <AryehGregor> OTP?
- # [17:04] <hsivonen> one-time pad
- # [17:06] * Quits: breakmau5 (n=breakz@erft-4db7d631.pool.mediaWays.net) (Read error: 113 (No route to host))
- # [17:06] * Quits: Maurice (n=ano@a80-101-46-164.adsl.xs4all.nl) ("Disconnected...")
- # [17:06] * Joins: MikeSmithX (n=MikeSmit@EM114-48-42-128.pool.e-mobile.ne.jp)
- # [17:07] * Philip` thought it was usually "one-time password" in this context
- # [17:07] <hsivonen> there's a whole pad of them
- # [17:07] <hsivonen> Wikipedia upholds my usage: http://en.wikipedia.org/wiki/OTP
- # [17:08] <AryehGregor> Interesting.
- # [17:08] <hsivonen> hmm. except http://en.wikipedia.org/wiki/One-time_pad seems to say the pad is a cipher
- # [17:08] <hsivonen> Philip`: so yeah, one-time password
- # [17:09] <AryehGregor> Right, a one-time pad is definitely a cipher.
- # [17:10] <AryehGregor> One-time passwords would be awkward to type in all the time, though. Fine for occasional use, but not for every time you log into your e-mail account.
- # [17:10] <AryehGregor> Passwords are a lousy tradeoff between convenience and security, they're both inconvenient and insecure.
- # [17:12] <Sidnicious> To quote Dan K., "passwords are used because they scale well, one at a time."
- # [17:13] <hsivonen> AryehGregor: if you can't trust your computer with your passwords and have a USB crypto dongle, wouldn't you have to enter a pin into the dongle to allow crypto operations at specific times?
- # [17:13] <Sidnicious> There's almost zero effort required to "secure" an account with a password.
- # [17:13] <hsivonen> AryehGregor: that's how those FAILed smart cards worked
- # [17:13] <hsivonen> AryehGregor: otherwise, your untrusted computer can poke at the dongle and perform actions as you
- # [17:14] <hsivonen> AryehGregor: just like untrusted software that hijacks your passwords on your computer can do
- # [17:14] <AryehGregor> hsivonen, it can only impersonate you as long as the crypto thing is in the machine. As opposed to forever.
- # [17:15] <hsivonen> AryehGregor: so you'd plug and unplug it all the time?
- # [17:15] * Joins: FireFly (n=firefly@unaffiliated/firefly)
- # [17:16] <AryehGregor> Hmm.
- # [17:16] <AryehGregor> It's all very annoying, I guess. There's no easy solution short of, let's say, unsurmountable biometrics plus hardware DRM, all dirt-cheap.
- # [17:16] <AryehGregor> (unbreakable hardware DRM, obviously)
- # [17:18] <Philip`> It'd be a boring world if there easy perfect solutions to problems
- # [17:18] <Philip`> Much better when it's all about tradeoffs
- # [17:23] <Sidnicious> The solution to the dongle problem would be a physical button on the device that you press to enable it for a single transaction.
- # [17:24] <TabAtkins> What if malware sends transaction requests at the same time as your bank?
- # [17:24] <Sidnicious> Hrm.
- # [17:25] * Joins: dglazkov (n=dglazkov@nat/google/x-pjajgtsbtqjoewqn)
- # [17:25] <Philip`> Mechanical buttons sound bad for cost and reliability
- # [17:25] <TabAtkins> Well, you need buttons if you want the "type in the code" thing anyway.
- # [17:26] <Philip`> True
- # [17:27] <Sidnicious> Lemme butt in with a quick spec question... is anyone familiar with why forminput and formchange events don't bubble?
- # [17:27] * Philip` used to use a computer where the only USB ports were on the back, with a large desk between him and the machine, so USB dongles would be pretty inconvenient
- # [17:27] <Sidnicious> (<http://www.whatwg.org/specs/web-apps/current-work/multipage/association-of-controls-and-forms.html#event-dispatch>)
- # [17:27] <Philip`> Clearly they should be wireless
- # [17:28] * Quits: MikeSmith (n=MikeSmit@EM114-48-82-170.pool.e-mobile.ne.jp) (Read error: 110 (Connection timed out))
- # [17:28] <Philip`> Sidnicious: Seems like not bubbling is the default behaviour
- # [17:28] <Philip`> Why should they bubble?
- # [17:28] <Sidnicious> Event delegation.
- # [17:29] * Joins: breakmau5 (n=breakz@erft-4db7d631.pool.mediaWays.net)
- # [17:30] <Philip`> Can't you do that with capturing instead?
- # [17:35] * Joins: JonathanNeal (n=Jonathan@76-219-69-134.lightspeed.breaca.sbcglobal.net)
- # [17:36] <Sidnicious> TBH I've been spoiled by using jQuery for all my event-related work in recent memory. It only supports binding to the bubbling phase, except in a couple of special cases.
- # [17:37] <Sidnicious> If capturing works just as well, I guess the libraries'll adapt.
- # [17:38] <Philip`> Hmm, strange that jQuery wouldn't support event capture
- # [17:38] <Dashiva> IE compat, surely
- # [17:39] <Philip`> Does IE not have any equivalent to capture?
- # [17:40] <Dashiva> I don't believe so
- # [17:41] <Philip`> That might explain it then
- # [17:42] * Quits: roc (n=roc@121-72-171-11.dsl.telstraclear.net)
- # [17:42] <Sidnicious> All right.
- # [17:44] * Quits: dglazkov (n=dglazkov@nat/google/x-pjajgtsbtqjoewqn)
- # [17:50] * Joins: dglazkov (n=dglazkov@nat/google/x-bdxakwverxgvtuih)
- # [17:51] * Quits: Lachy (n=Lachlan@pat-tdc.opera.com) ("Leaving")
- # [17:58] * Quits: pesla (n=retep@procurios.xs4all.nl) ("( www.nnscript.com :: NoNameScript 4.21 :: www.esnation.com )")
- # [18:05] * Quits: JonathanNeal (n=Jonathan@76-219-69-134.lightspeed.breaca.sbcglobal.net) ("Leaving")
- # [18:09] * Quits: Phae (n=phaeness@gateb.mh.bbc.co.uk)
- # [18:09] * Joins: dbaron (n=dbaron@nat/mozilla/x-lhumalrqrzzeidbt)
- # [18:15] * Joins: Maurice (i=copyman@5ED548D4.cable.ziggo.nl)
- # [18:18] * Joins: jorlow_ (n=jorlow@c-67-164-97-172.hsd1.ca.comcast.net)
- # [18:21] * Quits: mhausenblas (n=mhausenb@wg1-nat.fwgal01.deri.ie)
- # [18:23] * Joins: jg (n=jg@c-98-229-106-42.hsd1.ma.comcast.net)
- # [18:25] * Quits: starjive (i=beos@81-233-16-19-no30.tbcn.telia.com) (Client Quit)
- # [18:25] * Joins: Lachy (n=Lachlan@85.196.122.246)
- # [18:27] * Joins: dave_levin (n=dave_lev@74.125.59.65)
- # [18:33] * Joins: cying (n=cying@70.90.171.153)
- # [18:34] * Joins: sbublava (n=stephan@77.118.36.229.wireless.dyn.drei.com)
- # [18:37] * Joins: boogyman (n=boogyman@unaffiliated/boogyman)
- # [18:38] * Joins: JonathanNeal (n=Jonathan@rrcs-76-79-114-213.west.biz.rr.com)
- # [18:40] * Quits: jg (n=jg@c-98-229-106-42.hsd1.ma.comcast.net) (Read error: 110 (Connection timed out))
- # [18:40] * Joins: jg (n=jg@proxy.lucent.com)
- # [18:44] * Quits: mat_t (n=mattomas@91.189.88.12) (Client Quit)
- # [18:47] * Joins: sebmarkbage (n=miranda@213.80.108.29)
- # [18:48] * Parts: boogyman (n=boogyman@unaffiliated/boogyman)
- # [18:50] * Joins: KevinMarks (n=KevinMar@157.22.22.46)
- # [18:55] * Joins: myakura (n=myakura@p3213-ipbf4202marunouchi.tokyo.ocn.ne.jp)
- # [19:01] * Joins: jonpierce (n=jonpierc@209-6-91-231.c3-0.smr-ubr1.sbo-smr.ma.cable.rcn.com)
- # [19:07] * Joins: hober (n=ted@unaffiliated/hober)
- # [19:08] * Quits: jorlow_ (n=jorlow@c-67-164-97-172.hsd1.ca.comcast.net) (Client Quit)
- # [19:20] * Joins: jorlow_ (n=jorlow@67.218.107.51)
- # [19:21] * Quits: tametick (n=chatzill@chello084114134061.3.15.vie.surfer.at) (Client Quit)
- # [19:28] * Joins: drunknbass_work (n=aaron@cpe-76-173-195-145.socal.res.rr.com)
- # [19:29] * workmad3 is now known as wm3|food
- # [19:37] * Joins: starjive (i=beos@81-233-16-19-no30.tbcn.telia.com)
- # [19:49] * Quits: jorlow_ (n=jorlow@67.218.107.51) (Read error: 104 (Connection reset by peer))
- # [19:50] * Joins: jorlow_ (n=jorlow@67.218.107.51)
- # [19:58] * Joins: cpearce (n=cpearce@ip-118-90-40-252.xdsl.xnet.co.nz)
- # [19:59] * Quits: dbaron (n=dbaron@nat/mozilla/x-lhumalrqrzzeidbt) ("8403864 bytes have been tenured, next gc will be global.")
- # [20:05] * Joins: cying_ (n=cying@70.90.171.153)
- # [20:05] * Quits: jorlow_ (n=jorlow@67.218.107.51) (Client Quit)
- # [20:10] * Joins: jorlow_ (n=jorlow@nat/google/x-hulhqxhdfofcvfuv)
- # [20:10] * Quits: jorlow (n=jorlow@nat/google/x-okxwgwczunehpqcy)
- # [20:16] * Quits: jorlow_ (n=jorlow@nat/google/x-hulhqxhdfofcvfuv) (Client Quit)
- # [20:16] * Joins: Omnipotent (n=youshoul@unaffiliated/dor)
- # [20:17] * Joins: GarethAdams|Home (n=GarethAd@pdpc/supporter/active/GarethAdams)
- # [20:21] * Quits: cying (n=cying@70.90.171.153) (Read error: 110 (Connection timed out))
- # [20:21] * cying_ is now known as cying
- # [20:24] * Joins: tametick (n=chatzill@chello084114134061.3.15.vie.surfer.at)
- # [20:24] * Joins: jorlow (n=jorlow@nat/google/x-tgyjkyvosuvpcler)
- # [20:32] * Joins: Steve^ (n=steve@92.40.140.35.sub.mbb.three.co.uk)
- # [20:35] * Joins: roc (n=roc@121-72-171-11.dsl.telstraclear.net)
- # [20:36] <Dashiva> I don't have any facts to back me up, but it is my impression that the people who participate in the telcons are already quite well informed and active on the mailing list
- # [20:41] * Joins: ap (n=ap@17.246.19.5)
- # [20:43] * Quits: cpearce (n=cpearce@ip-118-90-40-252.xdsl.xnet.co.nz) ("ChatZilla 0.9.86-rdmsoft [XULRunner 1.9.0.15/2009101909]")
- # [20:47] * Parts: jonpierce (n=jonpierc@209-6-91-231.c3-0.smr-ubr1.sbo-smr.ma.cable.rcn.com)
- # [20:49] * Joins: jwalden (n=waldo@nat/mozilla/x-oaecueydpkxlfftj)
- # [21:01] * Quits: starjive (i=beos@81-233-16-19-no30.tbcn.telia.com) (Client Quit)
- # [21:05] * Joins: Craig` (n=craig@host81-141-118-158.wlms-broadband.com)
- # [21:08] * Joins: jacobolus (n=jacobolu@h-66-166-3-76.lsanca54.static.covad.net)
- # [21:10] * Joins: dbaron (n=dbaron@nat/mozilla/x-qsvmgzixzldtship)
- # [21:10] * Quits: Craig` (n=craig@host81-141-118-158.wlms-broadband.com) (Remote closed the connection)
- # [21:11] <jgraham> Dashiva: I recall noticing people at telecons who have rarely posted to the mailing list
- # [21:13] * Quits: sbublava (n=stephan@77.118.36.229.wireless.dyn.drei.com) (Client Quit)
- # [21:13] * Joins: cpearce (n=cpearce@203-97-204-82.dsl.clear.net.nz)
- # [21:15] <Philip`> Do they contribute in other ways?
- # [21:16] <Philip`> (It's not so useful having people well informed if they don't do anything with their informedness)
- # [21:18] * Quits: cying (n=cying@70.90.171.153) (Remote closed the connection)
- # [21:18] * Joins: john_fallows (n=j_r_fall@adsl-75-61-86-190.dsl.pltn13.sbcglobal.net)
- # [21:18] * Joins: cying (n=cying@70.90.171.153)
- # [21:20] <john_fallows> is websocket-protocol of empty string supported by draft-hixie-thewebsocketprotocol-68 ?
- # [21:21] <john_fallows> section 5.1 seems to indicate that server must send back empty string for /subprotocol/ when websocket-protocol header in client handshake is empty string (because it is non-null)
- # [21:23] <Hixie> how do you mean by "supported"?
- # [21:23] <john_fallows> i meant permitted by the specification
- # [21:23] <john_fallows> actually, as i'm trying to explain it, i found something relevant
- # [21:24] <Hixie> the API won't accept it
- # [21:24] <john_fallows> if there are any entries in the /headers/ list whose names are the empty string
- # [21:24] <Hixie> but if a (non-browser) client sends it, the server defines what should happen
- # [21:24] <john_fallows> this is for names, not values
- # [21:24] <john_fallows> yep, that's fine
- # [21:24] <Hixie> er, the protocol spec defines what should happen on the server, i mean
- # [21:25] <john_fallows> i think there might be a section further up that states the subprotocol value should be non-null and non-empty
- # [21:25] <john_fallows> yep, got it
- # [21:25] <Hixie> i guess i don't know what you mean by "permitted by the specification"
- # [21:25] <Hixie> which specification? there are two
- # [21:25] <Hixie> the API? the protocol?
- # [21:25] <Hixie> sent by the client? by the server?
- # [21:25] <john_fallows> sorry, i was discussing the wire protocol spec draft-hixie-thewebsocketprotocol-68
- # [21:25] <Hixie> client->server? server->client?
- # [21:26] * Quits: Steve^ (n=steve@92.40.140.35.sub.mbb.three.co.uk) ("Leaving")
- # [21:27] <john_fallows> the description of section 5.1 "Sending the server's handshake" /subprotocol/ says...
- # [21:27] <john_fallows> "Either null, or a string representing the subprotocol the server is ready to use."
- # [21:27] <john_fallows> ...
- # [21:27] <john_fallows> "The empty string is not the same as the null value for these purposes."
- # [21:27] * Quits: myakura (n=myakura@p3213-ipbf4202marunouchi.tokyo.ocn.ne.jp) ("Leaving...")
- # [21:27] <john_fallows> i read that to mean empty string was permitted, but it is not, as described elsewhere in the document
- # [21:28] * Quits: othermaciej (n=mjs@c-69-181-42-237.hsd1.ca.comcast.net)
- # [21:28] <Hixie> there's no concept of what is permitted from the server in the subprotocol name
- # [21:28] <Hixie> the server just sends back what the client sends
- # [21:29] <Hixie> if the client sent the empty string, then the server will send the empty string
- # [21:30] <Hixie> (assuming it wants to accept the connection)
- # [21:30] <john_fallows> understood
- # [21:31] <john_fallows> so the constraint of non-empty protocol name is for client only, as described by section 4.1 Handshake (in section 4 Client-side requirements)
- # [21:31] <john_fallows> "The /resource name/ and /protocol/ strings must be non-empty strings of ASCII characters in the range U+0020 to U+007E."
- # [21:31] <john_fallows> ?
- # [21:32] * Quits: drunknbass_work (n=aaron@cpe-76-173-195-145.socal.res.rr.com) (Client Quit)
- # [21:32] <Hixie> right
- # [21:32] <Hixie> and the API also restricts it
- # [21:32] <john_fallows> ok, now it makes sense
- # [21:33] <john_fallows> the difference in strictness between client and server caused my temporary confusion :-)
- # [21:34] <Hixie> in practice there's no reason for a server to support the subprotocol "", since compliant clients can't send it
- # [21:34] <john_fallows> yes, agreed.
- # [21:35] <john_fallows> btw, i have some feedback regarding delivery of binary WebSocket frame payloads to JavaScript
- # [21:35] <john_fallows> should i send an email to the mailing list?
- # [21:35] <Hixie> yes please
- # [21:36] <Hixie> for binary i'm basically waiting for the text stuff to be widely implemented first though
- # [21:36] <Hixie> baby steps
- # [21:36] <Hixie> (also waiting for JS to have binary support)
- # [21:37] <john_fallows> i suspect that waiting for JS to have binary support is unnecessary and will explain the proposal in the email
- # [21:39] <Hixie> i think it's likely that JS binary support will come long before websocket is widely supported
- # [21:39] <Hixie> so it might be a moot point
- # [21:40] <john_fallows> that would be wonderful, will send the proposal and then we can discuss it
- # [21:41] <john_fallows> btw, I'll be at Google HQ later this afternoon, would like to stop by to say hi if you are around.
- # [21:41] <Hixie> ===========================================
- # [21:41] * Quits: jg (n=jg@proxy.lucent.com) (Remote closed the connection)
- # [21:42] <Hixie> sure
- # [21:42] <Hixie> dunno when i'll get in, but i'll be on IRC so we can coordinate here
- # [21:42] <john_fallows> sure, or if you email me your phone number, i can give you a call when my meeting is done
- # [21:43] * Quits: roc (n=roc@121-72-171-11.dsl.telstraclear.net)
- # [21:44] * wm3|food is now known as workmad3
- # [21:45] <Hixie> don't have a phone
- # [21:47] * Joins: erlehmann (n=erlehman@dslb-088-075-184-232.pools.arcor-ip.net)
- # [21:48] <john_fallows> hope to see you later, bye for now.
- # [21:49] * Quits: plainhao (n=plainhao@mail.xbiotica.com)
- # [21:54] <Hixie> later
- # [21:54] * Quits: tigliona1bit (n=nick@67-207-136-95.slicehost.net) (Client Quit)
- # [22:02] * Joins: drunknbass_work (n=aaron@71.107.253.243)
- # [22:11] * Quits: ROBOd (n=robod@89.122.216.38) ("http://www.robodesign.ro")
- # [22:14] * Quits: jacobolus (n=jacobolu@h-66-166-3-76.lsanca54.static.covad.net) (Read error: 60 (Operation timed out))
- # [22:14] * Quits: jwalden (n=waldo@nat/mozilla/x-oaecueydpkxlfftj) ("ChatZilla 0.9.85-rdmsoft [XULRunner 1.9.2/20100122095031]")
- # [22:16] * Joins: jacobolus (n=jacobolu@h-66-166-3-76.lsanca54.static.covad.net)
- # [22:16] * Quits: mlpug (n=mlpug@a88-115-164-40.elisa-laajakaista.fi) (Remote closed the connection)
- # [22:19] * Joins: mackstann_ (n=death@216-20-152-177-dsl.hevanet.com)
- # [22:22] * Joins: othermaciej (n=mjs@17.246.19.82)
- # [22:25] * Joins: jwalden (n=waldo@nat/mozilla/x-qxhopmyjzbkkqilp)
- # [22:44] * Joins: john_r_fallows (n=j_r_fall@adsl-75-61-86-190.dsl.pltn13.sbcglobal.net)
- # [22:45] <john_r_fallows> Hixie: sent the WebSocket binary frame proposal to the mailing list - http://lists.w3.org/Archives/Public/public-html-comments/2010Jan/0009.html
- # [23:04] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [23:06] * Joins: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com)
- # [23:07] * Joins: mpavel (n=pavel@cpc1-dund3-0-0-cust363.sgyl.cable.virginmedia.com)
- # [23:08] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [23:09] * Quits: mpavel (n=pavel@cpc1-dund3-0-0-cust363.sgyl.cable.virginmedia.com) (Client Quit)
- # [23:10] * Joins: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com)
- # [23:10] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [23:14] * Quits: miketaylr (n=miketayl@38.117.156.163) (Remote closed the connection)
- # [23:17] * Joins: nessy (n=Adium@124-171-43-189.dyn.iinet.net.au)
- # [23:17] * Joins: boblet (n=boblet@p1072-ipbf36osakakita.osaka.ocn.ne.jp)
- # [23:18] * Quits: ChrisLTD|Work (n=blahness@152.2.194.196) (Client Quit)
- # [23:23] * Quits: peol (n=peol@unaffiliated/peol) (Remote closed the connection)
- # [23:23] * Quits: MikeSmithX (n=MikeSmit@EM114-48-42-128.pool.e-mobile.ne.jp) (Read error: 110 (Connection timed out))
- # [23:28] * Joins: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com)
- # [23:31] * Quits: Maurice (i=copyman@5ED548D4.cable.ziggo.nl)
- # [23:31] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [23:34] * Joins: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com)
- # [23:38] * Quits: BlurstOfTimes (n=blurstof@168.203.117.66) (Client Quit)
- # [23:45] * Quits: dave_levin (n=dave_lev@74.125.59.65)
- # [23:46] * Quits: othermaciej (n=mjs@17.246.19.82) (Remote closed the connection)
- # [23:46] * Joins: othermaciej (n=mjs@nat/apple/x-ocmsprgiccbcqocz)
- # [23:50] * Quits: zcorpan (n=zcorpan@90-224-190-71-no135.tbcn.telia.com) (Remote closed the connection)
- # [23:51] * Joins: slightlyoff (n=slightly@72.14.229.81)
- # [23:55] * Joins: Rik` (n=Rik`@pha75-2-81-57-187-57.fbx.proxad.net)
- # Session Close: Thu Jan 28 00:00:00 2010
The end :)