07:18:07 RRSAgent has joined #webappsec 07:18:07 logging to http://www.w3.org/2012/11/01-webappsec-irc 07:35:59 zakim, please call St_Clair_2 07:35:59 sorry, bhill2, I don't know what conference this is 07:36:07 zakim, this is 92794 07:36:07 sorry, bhill2, I do not see a conference named '92794' in progress or scheduled at this time 07:42:04 https://www.w3.org/2002/09/wbs/35125/TPAC2012/registrants#WebAps 07:59:09 bradee-oh has joined #webappsec 08:02:30 zakim, this is 92794 08:02:30 sorry, bhill2, I do not see a conference named '92794' in progress or scheduled at this time 08:07:38 for folks hoping to dial in, my apologies 08:07:55 I got the offset from UTC wrong in scheduling the call, so our bridge won't be available until 11:00 am local time 08:08:00 trying to get tomorrow's call time adjusted 08:14:48 timeless has joined #webappsec 08:19:43 tanvi has joined #webappsec 08:23:09 tanvi1 has joined #webappsec 08:34:17 we may try to move some of the UISafety discussion agenda time to tomorrow afternoon 08:34:39 to accomodate Giorgio's participation, as I forgot that today is a holiday in Catholic countries 08:35:02 but we will keep the Accessibility discussion, at least, on today's agenda 08:39:24 looks like Giorgio won't be able to make it in any case, so we'll leave the schedule unchanged 08:45:43 Meeting: WebAppSec Face to Face, Day 1, TPAC, 1-Nov-2012 08:45:48 Chair: bhill2, ekr 08:46:06 Agenda: http://lists.w3.org/Archives/Public/public-webappsec/2012Oct/0090.html 08:47:21 DanD has joined #webappsec 08:48:00 ekr has joined #webappsec 08:48:03 scribe ekr 08:48:40 rrsagent, begin 08:49:30 bhill: major issue with testing/CORS is identifying what coverage we have and what features may be at risk because of test coverage 08:50:15 bhill: there is a CORS fork in WHATWG 08:50:46 ... want to discuss how to deal with this. 08:51:29 dveditz: what's the reason for the fork? 08:51:46 odin: Anne was unhappy about the Invited Expert agreement. 08:52:53 bhill: only substantive change seems to be changes to references in WHATWG spec. 08:53:32 ... best strategy may be to discuss the changes with him. 08:53:51 gopal has joined #webappsec 08:54:15 ekr: which specs do the vendors intend to follow 08:54:30 odin: we usually follow the most updated specs. 08:54:31 sgodard has joined #webappsec 08:55:38 bhill: I don't think we should drop this. It's part of our package. 08:56:38 fanfi has joined #webappsec 08:57:28 correction to above: there is a change to referrer handling 08:58:28 bhill: let's ask Anne about that. 08:58:42 ... does Mozilla have anything to say about which set of specs they intend to track. 08:59:40 dveditz:we would expect to follow the CORS spec, but if there is an updated spec in another standards body, we might follow that? 09:00:25 bhill: so we would need to decide how to handle future updates 09:00:41 can we have a link to the fork? 09:05:00 [discussion of whether we can take this material] 09:05:06 ware has joined #webappsec 09:05:14 ekr: what is the IPR status of this contribution 09:05:18 https://github.com/whatwg/fetch 09:05:31 ^^^ link to fork of CORS 09:06:59 bhill: there is a mechanism for independent contributions that aren't invited experts. 09:07:50 s|https://github.com/whatwg/fetch|-> https://github.com/whatwg/fetch GitHub link to fork of CORS| 09:07:52 ... so maybe we can get such an agreement in place when there is a fixed list of WHATWG changes. 09:07:56 s|^^^ link to fork of CORS|| 09:08:26 odinho: this is happening with a bunch of other specs as well. 09:08:59 bhill: let's start by asking Anne what he is doing with other specs and then we can follow up with W3C staff 09:09:12 ... we had a set of objections to CSP on the basis of privacy 09:09:40 ... post-LC comments about reporting mechanism as a back channel and feature reporting as a fingerprinting vector. 09:09:57 ... we had consensus in the WG but I hosted a plenary session yesterday to forestall external issues 09:10:05 .... will post my presentation 09:10:10 http://www.w3.org/wiki/Fingerprinting 09:10:21 ... basic idea was to establish a set of guidelines for these discussions 09:11:10 ... background for privacy interest group on the security community's assessment of the situation. 09:11:30 ... with the hope that their guidelines will take into consideration meaningful threat modelling 09:11:52 ... hopefully will give us better framework for the future. 09:11:58 I have made the request to generate http://www.w3.org/2012/11/01-webappsec-minutes.html odinho_ 09:12:18 ekr: some people may not be entirely convinced 09:13:40 dveditz: there was that other guy who wanted to have reporting on user-agent injected addons. I'm less sympathetic to tht 09:13:43 ware has joined #webappsec 09:14:42 dveditz: edward's problem is something we should address 09:15:04 dveditz: ingo chow wants to report on add-ons to see if someone is trying to target his site 09:15:08 http://lists.w3.org/Archives/Public/public-webappsec/2012Oct/0069.html 09:15:15 tlr has joined #webappsec 09:15:39 dveditz: concern is a malicious add-on adding scripts 09:15:48 ... but in that case it could probably turn off CSP reporting 09:16:04 ... from a privacy standpoint it's not the server's business 09:16:26 ... what the client runs 09:16:35 Present+ Odin_Horthe_Omdal Brad_Hill 09:16:42 Present+ Tanvi_Vyas 09:17:04 bhill: an issue of priority of constituencies 09:17:28 ... what about an add-on that injects ads 09:18:13 ekr: it's the user's browser 09:19:32 bhill: example of intermediaries injecting ads, rewritign scripts, etc. 09:20:12 odinho: add-ons are effectively part of the browser and shouldn't be influenced by comments 09:20:39 dveditz: we haven't fixed mozilla with addons reporting 09:21:31 ... would like an add-on that injects content in the CSP page should be able to override CSP but should have to explicitly do so. 09:22:20 bhill: should add-ons be able to disable reporting 09:22:25 ... can do it by brute force method 09:22:40 odinho: absolutely. 09:23:29 dveditz: you can always suppress it some other way 09:24:22 bhill: to wrap up the privacy thread... 09:24:38 ... replies from dveditz and mike west that it's not CSP's job to police extensions 09:24:54 ... is this something we want to resolve as the WG 09:25:16 odinho: maybe in a FAQ 09:25:33 bhill: there seems to be consensus in the WG. 09:25:59 dveditz: it's a statement on behalf of the server to enforce a policy, not a binding rule 09:26:01 Present+ Peleus_Uhley 09:26:24 Present+ Dan_Druda 09:27:10 proposed resolution: The priority of constituencies followed by this WG is that the user is in control of their user agent, and CSP is not a mechansim to allow resource owners to override user preferences or policy on how resources are rendered/modified/etc., including by user agent add-ons 09:27:15 s/Dan_Druda/Dan_Druta 09:27:22 so resolved 09:27:56 action to bhill2 respond to ingo chao on official WG position re: csp policies for add-on modifications to resources 09:27:56 Sorry, couldn't find to. You can review and register nicknames at . 09:28:10 action bhill2 respond to ingo chao on official WG position re: csp policies for add-on modifications to resources 09:28:10 Created ACTION-82 - Respond to ingo chao on official WG position re: csp policies for add-on modifications to resources [on Brad Hill - due 2012-11-08]. 09:28:19 s/action to bhill2 respond to ingo chao on official WG position re: csp policies for add-on modifications to resources// 09:28:50 I have made the request to generate http://www.w3.org/2012/11/01-webappsec-minutes.html odinho_ 09:29:38 we are taking a 30 minute break 09:29:42 Present+ Daniel_Veditz 09:29:46 reconvening at 11:00 local time 09:30:07 next agenda topic: CORS and WHATWG fork of "Fetch", guest speaker annevk 09:44:40 puhley has joined #webappsec 09:52:38 zakim, this is 92794 09:52:38 bhill2, I see SEC_WASWG(TPACSES)6:00AM in the schedule but not yet started. Perhaps you mean "this will be 92794". 09:52:51 zakim, this will be 92794 09:52:51 ok, bhill2; I see SEC_WASWG(TPACSES)6:00AM scheduled to start in 8 minutes 09:53:41 zakim, call St_Clair_2 09:53:41 ok, bhill2; the call is being made 09:53:42 SEC_WASWG(TPACSES)6:00AM has now started 09:53:44 +St_Clair_2 09:54:56 call bridge is now open 09:55:29 + +1.781.369.aaaa 09:55:40 ware has joined #webappsec 09:58:15 bradee-oh has joined #webappsec 10:00:12 annevk has joined #webappsec 10:00:20 http://fetch.spec.whatwg.org/ 10:00:28 https://github.com/whatwg/fetch/commits 10:04:16 annevk: Last-Event-ID, etc. should not be on the simple header whitelist 10:04:29 annevk: it is about what developers can set, not what the spec can send 10:05:09 dveditz: clarify developers in above comment 10:05:26 annevk: developers are web content developers, web UA developers are "implementers" 10:05:49 tlr has joined #webappsec 10:06:07 Present+ Anne_van_Kesteren 10:06:55 ekr has joined #webappsec 10:07:17 annevk: diagram is buggy, should include "send" 10:07:51 annevk: hello world arrow at end should go all the way to dotted line 10:08:03 annevk: access check happens in network library, not in the XHR 10:08:20 annevk: long term plan is to integrate it with HTML fetch algorithm 10:08:37 annevk: just going to wait for implementations to stabilize 10:08:50 -> http://odin.s0.no/tmp/Hodges_odinho-CORS-Diagram-SimpleRequest.svg Draft of a very simple CORS overview 10:08:51 ekr_ has joined #webappsec 10:08:57 annevk: fetch handled by network layer 10:11:56 annevk: referrer source was feedback from mozilla about fetch algorithm 10:12:07 ... in some cases didn't like the header the algorithm would come up with 10:12:23 ... introduced concept to pass through explicit referer to override what would normally be computed 10:12:49 ... in certain cases you can make a choice what the appropriate referrer is 10:13:07 ... wanted ability to do explict setting 10:13:26 .. is an algorithm in a specification that invokes fetch, but control is not given to web developers 10:13:40 tanvi: this is for a resource to check referer when servicing a request 10:13:58 annevk: this is to indicate what the referrer should be for the user agent 10:14:17 annevk: it could be a script that invokes the XHR, or it could be the URL associated with the XHR object 10:14:37 annevk: could be invoked from another resource accessing using SOP 10:14:49 annevk: referrer includes path,etc. so might be different, even if Origin is the same 10:15:32 other changes are 308 status code 10:15:43 dveditz: should do this as it is a legitimate code 10:15:52 annevk: yes, other browsers do this too in other places with redirects 10:16:13 annevk: in practice all 3xx are not handled, need to be explicit in what ones should be 10:16:31 annevk: only two major changes, a typo fix, added julian and phllip to acks 10:16:38 Present+ Jonas_Sicking 10:17:30 annevk: no outstanding bugs that would cause changes to fetch algorithm 10:17:40 annevk: hixie and I want to wait on further work on fetch 10:17:52 annevk: to merge it with CORS, but that is 4 years down the road 10:18:15 annevk: there is one thing where developers complain, want more flexibility with access-control-allow-origin header 10:18:35 annevk: is * or a single value at the moment, maybe should be comma separated value for static resources with multiple consumers 10:18:48 annevk: need to set vary header today, lots of problems with that, proxies, etc. 10:19:23 jonas: if it's a static file, why would you want to protect it? 10:19:32 annevk: phone people are complaining because of licensing issues 10:20:35 DanD has joined #webappsec 10:20:58 s/phone/font 10:21:41 [ discussion about dynamic vs. static ] 10:22:00 devditz: concerns with multiple headers could easily be addressed by resources that care 10:22:18 jonas: one of original concerns was that adding multiple would lead to introducing patterns, etc. 10:22:24 annevk: don't want to add regexs 10:22:43 jonas: one other problem: at time of making request, need to know if in CORS mode or not when initating fetch algorithm 10:22:47 ware has joined #webappsec 10:23:11 jonas: when you load script elements would like to do fetch without CORS headers without declaring in advance 10:23:20 annevk: that exists today 10:24:00 annevk: no CORS, anonymous, and cross-origin modes 10:24:14 annevk: want to use "potentially CORS-enabled fetch" algorithm 10:24:22 odinho: has a no-CORS path 10:24:40 http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#potentially-cors-enabled-fetch 10:24:57 sicking has joined #webappsec 10:25:50 annevk: doesn't work as I thought 10:25:56 jonas: only place it is useful is script tags 10:25:59 annevk: images too 10:26:24 jonas: for images, either going to use image or not, if you need it, need to set CORS anyway 10:26:40 annevk: either way, change would be in fetch algorithm, not in CORS 10:26:53 odinho: also in track, for subtitles 10:28:05 annevk: only outstanding possible change is comma separated origins 10:28:16 dveditz: need to see if browsers would take that change 10:28:25 annevk: shouldn't be a problem, browsers don't object 10:28:43 annevk: origin spec allows space-separated origins 10:29:11 annevk: I think this is a bug in origin, tried to errata, but errata process doesn't apply to changing spec semantics 10:29:49 odinho: likely to result in bugs from users that just match a string 10:30:08 jonas: worried this will affect fonts, mozilla is only one using CORS for fonts 10:30:24 jonas: didn't realize that origin is changed to null on redirects, breaks fonts 10:30:31 annevk: needs to set * in that case on the resource 10:30:57 dveditz: reason origin spec had a list was interest in using it as an anti-CSRF spec 10:31:15 annevk: but implemenations differ, webkit is consistently null 10:31:44 ... allowing choice, as is done in origin spec, is bad 10:31:55 ... servers can't rely on it then 10:33:25 ... is worth pointing out in the syntax that the null behavior is explicitly specified as the behavior vs. the multi-origin option in Origin spec 10:34:47 dveditz: asymmetric to do multiple values for servers, not for redirect from client 10:35:04 annevk: best chocie is to get patent committments and go all the way to Rec quickliy 10:35:17 annevk: can go directly to PR if we have evidence of implemenations 10:35:36 annevk: a year later we can incorporate any updates 10:36:19 bhill2: only concern here is that we have knowledge of implemenations so we can know what is "at risk" 10:36:36 odinho: only know about opera, have implemented everything in spec, hopefully is correct and no omissions 10:36:49 gopal, are you there? 10:36:52 yes 10:37:38 based on your knowledge of tests, any features at risk? 10:37:50 gopal: hard to comment on that, will address in next agenda item 10:38:07 ... lots of tests, hard to associate with what parts of spec the tests cover 10:38:31 ... syntax elements from section 5 have lots of coverage, but not clear, should walk through tests to identify at risk items 10:38:44 ... can go through analysis in the afternoon when returned from lunch 10:39:35 bhill2: will do that after lunch, go directly to PR if no at risk features 10:41:12 gopal: allow origin header currently says origin list, but below says single origin, star or null 10:41:23 annevk: that's true, why I tried to follow errata 10:41:28 s/follow/file 10:42:04 annevk: already a note under access-control-allow-origin, syntax is constrained by resource processsing model and what browsers check against 10:42:13 annevk: so no changes needed there 10:42:40 annevk: confusion was whether this was a list of servers allowed, when really it was a redirect stack 10:42:55 odinho: parser in spec is future compliant 10:43:40 annevk: would be good to update to allow more than one access-control-allow-access headers? need to do ua sniffing anyway for future compat 10:44:02 odinho: if current impls read only first value and ignore later 10:44:07 annevk: still broken, need sniffing 10:44:32 annevk; main problem is caching and broken proxies wrt: vary 10:44:48 ... don't want to cache three versions of a font because of access control variance 10:45:21 ... proxies and caches need to deal with that situation already 10:45:35 ... don't know how much it impacts real world 10:46:05 ... if current is broken, would have been for a long time, haven't heard screaming 10:46:22 ... would just leave it as-is until complaints grow 10:46:55 bhill2: then let's stabilize, stabilize test suite and try to go to REC 10:47:01 annevk: text i s all consistent 10:48:53 ... want want to prevent other specs from using a space separated list of origins representing a redirect stack in the origin header 10:49:12 dveditz: shouldn't have multiple values in Origin header for redirects 10:49:51 annevk: would prefer to obsolete optional behavior in Origin RFC 10:50:10 ... all API specs have to hook into fetch algo so in practice not a problem 10:51:45 - +1.781.369.aaaa 10:51:48 adjourned for 2 hours for lunch 10:52:19 next agenda topic is detailed test coverage review of CORS, identification of any at risk features or features for which we lack enough coverage to decide on at risk status 10:53:00 puhley has left #webappsec 11:04:42 sicking has joined #webappsec 11:32:56 bradee-oh has joined #webappsec 12:51:23 tpacbot has joined #webappsec 12:54:12 sicking has joined #webappsec 12:55:51 npdoty has joined #webappsec 13:00:16 yes, they are supposed to be there at 14:00 13:03:08 bradee-oh has joined #webappsec 13:05:20 + +1.781.369.aabb 13:09:30 ware has joined #webappsec 13:11:53 Still waiting for everyone to get back from lunch. 13:13:07 bhill2 has joined #webappsec 13:13:16 zakim, who is here? 13:13:16 On the phone I see St_Clair_2, +1.781.369.aabb 13:13:17 On IRC I see bhill2, ware, bradee-oh, npdoty, sicking, tpacbot, gopal, timeless, RRSAgent, Zakim, trackbot, odinho, odinho_, caribou, tobie 13:13:37 Zakim, aabb is gopal 13:13:37 +gopal; got it 13:14:34 I'm Nick Doty, W3C, working on privacy across our standards 13:15:04 dveditz has joined #webappsec 13:16:39 DanD has joined #webappsec 13:17:09 dveditz_ has joined #webappsec 13:17:34 http://w3c-test.org/webappsec/tests/testRunner/ 13:18:30 q+ 13:19:37 gopal: we still need a lot of acceptance tests 13:20:11 … sections 1,2,3 and 4 we don't need coverage 13:20:19 1. not required 13:20:20 2. not required 13:20:22 3. not required 13:20:23 4. not required 13:21:16 … the most important sections to cover are 5.1-5.9 (various response and request headers) 13:21:32 .1 basic.htm, credentials-flag.htm, errors-async.htm, request.htm, simple-request.htm 13:21:34 5.2 credentials-flag.htm, request.htm 13:21:46 … several tests already go through some of the headers 13:21:57 Present+ Nick_Doty 13:22:07 … but we need consolidated set of pass/fail tests for each specific item in the spec 13:23:00 6.1.1 5.1 13:23:02 6.1.2 5.2 13:23:04 6.1.3 5.2 13:23:05 6.1.4 5.3 13:23:07 … section 6 is a mapping to headers in section 5.* 13:23:45 ScribeNick: dveditz 13:24:17 … tests for section 7 also have correspondence with tests for sections 5.* 13:24:42 seo has joined #webappsec 13:25:12 Scribe: Daniel Veditz 13:25:19 tanvi has joined #webappsec 13:25:23 I have made the request to generate http://www.w3.org/2012/11/01-webappsec-minutes.html odinho_ 13:25:38 ack me 13:25:40 … we need to document the mapping and that eventual consolidated tests cover the specific section 5.* feature and also the mapped section 6 and 7 texts 13:26:41 gioma1 has joined #webappsec 13:26:50 … browsers cache responses which somewhat invalidate the tests 13:27:03 … need to aggressively bust caching for valid tests 13:27:24 the previous two lines were odinho_ 13:28:09 s/… we need to/odinho_: we need to/ 13:28:14 tanvi1 has joined #webappsec 13:28:45 bhill2: thanks for the summary, sounds like we've made a lot of progress. Is this something we should work on today? 13:29:16 gopal: setting up the test environment is pretty easy, if you need help gopal can help with that 13:29:44 gopal: hard to tell what parts are at risk from the current tests 13:30:15 gopal: once we start putting it together [i.e. mapped to specific test sections] it will be clearer 13:30:58 gopal: some people from Mozilla pointed out test errors but also provided fixes which will increase success percentage 13:31:12 gopal: need help going through the failing tests looking for errors 13:32:23 DanD: is there any way to set up the test environment without having to hit the w3c test environment? 13:33:01 odinho_: brad set it up a VM that runs standalone, and odinho_ just runs his own instance of apache 13:33:38 to test locally: use VM image from Brad or set up /etc/hosts with w3c-org in your local environment 13:33:44 http://dl.dropbox.com/u/76057758/WebAppSecTestsuite.vdi.bz2 13:34:41 That is the latest VM image. Sun VirtualBox image of an Ubuntu, all free software 13:34:50 user/pass is webappsec/webappsec 13:35:09 that link seems dead 13:35:39 https://dl.dropbox.com/u/76057758/webappsecVM.tar.bz2 13:36:03 bhill2: use the second one 13:36:11 puhley has joined #webappsec 13:36:36 puhley has left #webappsec 13:37:15 bhill2: I was talking to some of the organizers of the "test the web forward" group to see if they'd like to sign on to maintaining this environment 13:37:30 bhill2: (for more than just webappsec tests) 13:37:44 puhley has joined #webappsec 13:38:15 gopal: brad, are all the recommended w3c ports enabled in that VM? 13:38:42 port 80, 81 13:38:48 bhill2: I didn't realize that, that's one of the reasons it would be good to have a dedicated person to maintain this 13:39:04 action bhill2 to update port numbers on apache for test vm; 80-83 13:39:04 Created ACTION-83 - Update port numbers on apache for test vm; 80-83 [on Brad Hill - due 2012-11-08]. 13:39:05 gopal: so if you see test failures you need to set up those ports 13:39:58 W3C Web test server exposes the following domain names for testing purpose as of 2011-06-07: 13:39:59 http://w3c-test.org/ 13:40:01 http://www.w3c-test.org/ 13:40:03 http://www1.w3c-test.org/ 13:40:04 http://www2.w3c-test.org/ 13:40:06 http://天気の良い日.w3c-test.org/ 13:40:08 http://élève.w3c-test.org/ 13:40:16 bhill2: is there anything further to do today to identify tests that need updating? 13:40:51 gopal: we can take that offline and see if there are any other topics to discuss here 13:41:27 bhill2: I mentioned "Test the Web Forward", because testing is the main step to get from CR to Recommendation 13:42:20 bhill2: for Cors and CSP. Will be a challenge for the UI safety proposals since testing ui events like clicking will be trickier to set up 13:42:57 odinho_: met up in Paris, a lot of developers came. First day "how do you test the spec, how do ref tests work" 13:43:19 … had some lightning talks also (odinho_ gave an indexedDB talk, for example) 13:43:36 … different experts were there on different topics, sat down and wrote some tests. 13:43:43 … 404 tests written that day 13:44:18 … CSP is a little harder because of the netword requirements, HTML tests easier 13:44:42 … creating CSP tests would work well in a setting like that 13:45:10 … first was in San Franciso, next in Beijing, most recent in Paris, doubling the number of tests written 13:45:44 bhill2: need to create a harness for sending UI events, then can copy that into multiple tests 13:46:36 odinho: chrome, opera have webdriver, moz has marionette which will be web driver when it's finished 13:48:16 bhill2: Giorgio is working on a standalone version of ClearClick 13:48:40 bhill2: would be nice not to need 5 different versions of each test for each driver/browser 13:48:52 bhill2: what are next actions? 13:49:13 gopal: create list of acceptance tests, especially those related to section 5.* collected in one area 13:50:12 bhill2: want actions in the tracker so we know what's left and how we are progressing 13:50:17 action gopal to create acceptance tests for section 5 13:50:22 Created ACTION-84 - Create acceptance tests for section 5 [on Gopal Raghavan - due 2012-11-08]. 13:50:24 ekr has joined #webappsec 13:51:02 action gopal to create acceptance tests for section 6 13:51:02 Created ACTION-85 - Create acceptance tests for section 6 [on Gopal Raghavan - due 2012-11-08]. 13:51:04 bhill2: wanted to create some actions here, assigned to gopal by default but encourage other people to take some of this on 13:51:09 action gopal to create acceptance tests for section 7 13:51:09 Created ACTION-86 - Create acceptance tests for section 7 [on Gopal Raghavan - due 2012-11-08]. 13:51:30 action odinho to fix transient CORS test failures due to caching 13:51:30 Sorry, couldn't find odinho. You can review and register nicknames at . 13:51:43 gopal: someone from Mozilla pointed out errors, we need to reach out to see if they're ready to contribute that 13:51:56 action oomdal to fix transient CORS test failures due to caching behavior 13:51:56 Created ACTION-87 - Fix transient CORS test failures due to caching behavior [on Odin Hørthe Omdal - due 2012-11-08]. 13:52:59 odinho: there is a meta help header that allows linking of test cases to the section they test 13:53:11 gopal: that's great, allows us to measure coverage without duplicating tests 13:53:25 odinho: have that set up on the next cases I will check in to the repository 13:53:52 bhill2: any other actions to talk about for this section of the agenda? 13:54:35 bhill2: to take an action for himself to see what the granularity of "at risk" is 13:54:52 bhill2: what is the granularity of "at risk"? 13:54:54 odinho_: as far as I've seen that much is up to the chair to decide 13:55:42 gopal: pre-flight section 3.1 (2.1?), referenced in section 6 and 7 13:56:23 section 6.2, item 7 13:56:24 gopal: section 6.2 item 7 13:57:13 bhill2: that's referring to a resource that advertises as requiring credentials 13:57:21 I have made the request to generate http://www.w3.org/2012/11/01-webappsec-minutes.html odinho_ 13:57:24 bhill2: it can't then turn around and grant to all callers 13:57:53 Present+ Ryan_Ware 13:58:22 bhill2: what's the UA behavior -- not specified 13:58:29 dveditz: do we need to fix that in the spec? 13:58:37 bhill2: I'm going to take an action to figure that out 13:58:54 action bhill2 to talk to annevk and clarify UA behavior on section 6.2 if resource asks for credentials and gives * to preflight 13:58:54 Created ACTION-88 - Talk to annevk and clarify UA behavior on section 6.2 if resource asks for credentials and gives * to preflight [on Brad Hill - due 2012-11-08]. 13:59:01 gopal: section 6.2 item 10 need clarification 13:59:43 … similar issue-- what's the expected behavior 14:00:40 odinho_: section 6 is for the resource, section 7 is for the UA and it probably says there 14:00:45 bhill2: does it say? 14:01:05 odinho_: yeah, we filed it as a bug when we implemented it if it wasn't there 14:01:34 bhill2: are we implementing test cases for the resource side of this spec? or only for user agents 14:02:01 odinho_: that can be outreach -- "we have a testsuite you can run against your server implementation" 14:02:36 bhill2: we don't necessarily need to cover the resource-specified behavior, it's outside our scope 14:02:40 > 14:03:18 http://dvcs.w3.org/hg/user-interface-safety/raw-file/tip/user-interface-safety.html 14:03:27 next part of discussion will be on UISafety directives 14:03:29 s/>// 14:03:34 bhill2: scheduled for a break now… if you haven't looked at the UI safety directives now would be a good time to do so 14:03:36 seo has left #webappsec 14:03:39 s// 14:03:44 bhill2: going to have a guest expert 14:04:15 bhill2: on accessibility, we don't want to deny users with accessibility requirements access to web content 14:04:23 kevin has joined #webappsec 14:04:52 odinho_: when were we going to discuss the