- From: Francois Daoust <fd@w3.org>
- Date: Mon, 30 Mar 2009 14:36:03 +0200
- To: Mobile Web Best Practices Working Group WG <public-bpwg@w3.org>
Hi,
The minutes of the second day of last week's F2F are available at:
http://www.w3.org/2009/03/26-bpwg-minutes.html
... and copied as text below.
Before moving on to Content Transformation, we discussed the use of
Canvas and/or SVG in the context of Mobile Web Application Best
Practices. Positions varied from "nothing to recommend as BP" to "Canvas
rulez". Dan and Jeff are to cook something up out of this.
On Content Transformation, most of the usual suspects were around the
table. Tom could unfortunately not attend the meeting (hope you are
well, Tom!). Eduardo was eventually able to attend the meeting
physically thanks to dotMobi's sponsoring of part of his travel expenses.
Regarding the last remaining hot issues:
About Links rewriting
-----
We agreed that:
1. Proxies MAY rewrite links, where content transformation is
permitted, providing that content domain origin distinctions are
preserved by the proxy such that browsers accessing content via the
proxy do not inappropriately misconstrue different content origins as
being the same and inappropriately share cookies, or allow execution of
scripts or do other things that cause security problems as a result of
not knowing that different origins are involved.
2. Since there doesn't appear to be a way in which the URI sent to the
User Agent can be manipulated to preserve security related to same
origin policies it is permissible for a CT proxy to act on content in so
that security is nonetheless preserved as adjudged by conformance tests
that are to be researched. If no such security tests can be found then
there cannot be conformance associated with link rewriting and it cannot
be permissible for CT proxies to do so.
I am to investigate on the availability of tests to ensure that the same
origin policy is preserved on Content Transformation proxies.
About HTTPS links rewriting
-----
The lengthy discussion and final resolution was reopened on the final
day of the F2F.
See my upcoming email on the minutes of that last day for details.
About "heuristics" to prevent content transformation
-----
- .mobi domain names was added to the list of mandatory heuristics
- The other mandatory heuristics are that agreed during the 10 March call:
http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0066.html
- we agreed not to list any non-mandatory heuristics, so that there be
no confusion or false expectation on how a Content Transformation proxy
is supposed to handle those.
On X-Device-* HTTP header fields
-----
- They are needed
- I am to progress registration of the X-Device-* headers in the IANA
provisional message header field names:
http://www.iana.org/assignments/message-headers/prov-headers.html
Other
-----
We reviewed the remaining actions and last call comments and agreed on
other more minor changes that need to be brought to the guidelines.
Thanks,
Francois.
-----
26 Mar 2009
[2]Agenda
[2]
http://www.w3.org/2005/MWI/BPWG/Group/Meetings/London3/logistics.html
See also: [3]IRC log
[3] http://www.w3.org/2009/03/26-bpwg-irc
Attendees
Present
Jo, Kai, Eduardo, Rob, SeanP, DKA, francois, Jeffs, Jonathan,
Adam, Alan, Seungyun, Bryan_on_the_phone
Regrets
none
Chair
dka
Scribe
Kai, Rob, Alan
Contents
The day started with a discussion on SVG and Canvas for the
[4]Mobile Web Application Best Practices (MWABP) specification. The
rest of the day was spent addressing the remaining issues on the
[5]Guidelines for Web Content Transformation Proxies (CT)
specification.
* [6]Topics
1. [7]MWABP - Canvas
2. [8]CT - HTTPS Link Rewriting
3. [9]Disclosure on Eduardo's presence to the F2F
4. [10]CT - ISSUE-285 - Links rewriting
5. [11]CT - ISSUE-288 and ISSUE-284 - Non-normative list of
mobile heuristics
6. [12]CT - ISSUE-289 - Are X-Device-* HTTP Header fields
needed?
7. [13]CT - Miscellaneous actions
8. [14]CT - ACTION-912 - X-Device-* HTTP Header fields
registration
9. [15]CT - Abstract improvement
10. [16]CT - LC-2050 - restructuring, recoding, optimization
11. [17]CT - LC-2023 - charsets
12. [18]CT - LC-2084 - Vary HTTP header
13. [19]CT - LC-2047 - inter-proxy communication
14. [20]CT - LC-2053 - preventing transformation of mobile Web
pages
15. [21]CT - LC-2040 - 4.1.5.5 defines a protocol
16. [22]CT - LC-2044 - Web browsers identification
17. [23]CT - OPES reference
18. [24]CT - Rotan's point
19. [25]CT - Editorial notes
20. [26]CT - OPES and two-party consent
* [27]Summary of Action Items
[4]
http://www.w3.org/2005/MWI/BPWG/Group/Drafts/BestPractices-2.0/ED-mobile-bp2-20091703
[5]
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/0090313
Minutes of the F2F
* [28]Day 1/3
* [29]Day 2/3 (this page)
* [30]Day 3/3
_________________________________________________________
[28] http://www.w3.org/2009/03/25-bpwg-minutes.html
[29] http://www.w3.org/2009/03/26-bpwg-minutes.html
[30] http://www.w3.org/2009/03/27-bpwg-minutes.html
MWABP - Canvas
<jeffs>
[31]http://www.it.rit.edu/~jxs/test/canvas/action910draft.html
[31] http://www.it.rit.edu/~jxs/test/canvas/action910draft.html
jeffs: it's a draft for content
... about when to use SVG or canvas and added a ref that you should
use rich interfaces
... actually that there are variety of such interfaces available
... you don't need to draw buttons if all you need are buttons
DKA: conversation yesterday was whether it is really a best
practice, enough usage, enough reference material to recommend the
use
... is it a forward looking BP rather than something based on
existing practice
jeffs: I wanted to include this because more and more full featured
browsers in the mobile domain canvas is becoming much more tempting
... it is forward looking in that it is available, but not that much
forward looking
Jo: is there anything in canvas you cannot do with svg?
jeffs: they are similar. the primary diff is that svg will give you
a heavier dom and uses a compound doc like approach by the browser
vendors
... canvas is easier. It is a blank slate you just draw on. It is
lighter weight, for a developer and you don't have to learn a new
language
EdC: Is there are rec when to use svg or canvas?
DKA: we don't really want to get into the debate but want to talk
about using device capabilities
adam: can you use canvas from the dom?
Jo: Yes
jeffs: no you cannot. You can change the height, but the content is
not visible in the dom
Jo: the problem with Javascipt is that browser consumes the content.
What is important is that content is available.
jeffs: that's when you want to use svg.
Jo: so we should ban JS :-) other than for cool interaction effects
Jo: now we are getting into personal opinion, not best practice
jeffs: I think that is not true. I have pointed out concrete
situations where it makes more sense to use svg or canvas and have
tried to stay out of the debate
EdC: But you have stayed at low level arguments in you text. I like
what Jo said about content being discoverable
... so we should recommend svg and discourage canvas
jeffs: if you want it to be discoveralbe then you need to use svg,
but don't want to discourage canvas because it is so light weight
SeanP: are there other categories where this fits into, as discussed
yesterday? like conservative use of resources?
jeffs: i missed that conversation. I guess it would fit into
conservative use of resources. It is less intensive than doing dom
manipulation
... canvas will be valuable for information display
... hard to teach in svg, but easy to do in canvas
... one could talk about it in terms of information display rather
than dynamic graphics
... it makes sense to say that browsers are supporting this tag and
we should tell people when to use it
DKA: should we recast this as a cautionary notes on the use of
dynamic graphic elements
... can discuss the pros and cons of svg and canvas
jeffs: I would not object to that
... I would rather put this in positive terms, but we can do that
DKA: doesn't have to be negative
... I have a problem saying use canvas
adam: should be use the appropriate rendering api
DKA: yes, that way we could tell people what exists
jeffs: should we say use the appropriate rendering api or dynamic
graphics
Jo: we should say don't use canvas unless you can"t think of another
way
jeffs: canvas is about dynamic graphics.
... don't use it to draw user controls
Jo: I think it would be good to say not to draw buttons
... lot"s to say how not to use it
<francois> [32]Definition of the canvas element in HTML5
[32]
http://www.w3.org/TR/html5/the-canvas-element.html#the-canvas-element
DKA: Isn't there something about drawn graphics which are useful if
you don't know screen size
jeffs: if you feel you must draw buttons
DKA: perhaps we should encourage people to draw buttons because of
scalability
SeanP: hopefully the device will know how to draw buttons
jeffs: we need to help people in situations were all three
possibilities can be used
... I agree with Sean
francois: I posted an extract from HTML5 about canvas
... [reading]...
... they are still discussiing. It is a draft
... for the time being it is not clear
... there is not much to discuss at the moment
... it is an api and could have it on top of svg perhaps
... you can mix and match and play with the output
... in the past with svg we had no bp to promote
jeffs: that is an important point
... there is a temptation here if the developer doesn"t care if the
content of canvas is not available
... svg is another hurdle and feels heavier
DKA: is there are mobile specific angle that the html5 guys may not
have thought of
francois: it is about scalable vectors, scaling graphics, everything
will adjust
DKA: and it is lower size
SeanP: we discussed the difference between various technologies in
graphics. Can we say use this rather than that?
Jo: what is mobile here?
DKA: screen sizes, dynamically adjusting buttons
... in order to render that independent of screen size
... without having to make several images
... what can we say that is relevant to the mobile space?
jeffs: sucking resources dry is mobile
... I think that dynamic graphics using svg will be much heavier and
coder brain power, rather than using the drawing api of canvas
Jo: you seem to be saying that developer efficiency is important
compared to run time efficiency
jeffs: Yes
... if it is dynamic then use it, not for static stuff
DKA: I suggest jeffs comes up with a new articulation of the deep
analysis we just had
jeffs: I can do that. What is the focus?
Jo: mobile specific aspects
DKA: dealing with screen sizes and resolutions, efficency across the
wire, but also rendering resources
adam: I feel uncomfortable about making non backed up statements
about resource consumption
... where are the threshholds?
DKA: should we ask Dom to come up with something?
adam: that would be useful
<francois> [33]http://www.borismus.com/canvas-vs-svg-performance/
[33] http://www.borismus.com/canvas-vs-svg-performance/
<Zakim> Bryan, you wanted to ask what is the specific reason that
SVG vs canvas is heavier in processing requirements - reliance on
DOM in somw way?
Bryan: could we document what the reasons are why canvas is lighter
weight?
... isn't that similar to what we talked about yesterday regarding
relying on the dom?
jeffs: i thought the group had concluded that dom manipulation is
resource heavy
Bryan: that seems to be challanged by adam
adam: we need values for this
jeffs: francois article may be useful. There are some metrics
adam: the document is not for mobile devices
francois: it is an indication
... it is dependent on the size of what you draw
jeffs: graphics that are redrawn a lot are better done in canvas
... I will see if I can get people to try some stuff out on various
maschines
DKA: perhaps Dom could be helpful with this
francois: I fear we will end up with figures and no immediate
conclusion
Jo: I think it is to early for a BP
DKA: I think we cannot say that now
Jo: an analysis will help in showing that it is too early
DKA: what could we say about exploiting device capabilities?
<Jo> PROPOSED RESOLUTION: It's too early and too speculative for a
BP on SVG Canvas etc.
<francois> +1
<DKA> -1
<jeffs> -1
jeffs: I don't agree
+0
<EdC> +1 too early as a best practice (should be based on
substantiated experience).
Jo: I don't know if you will find anything that will change the
fundamental problem
DKA: we need to see if there is a lot of use
<Jo> PROPOSED RESOLUTION: It's too early and too speculative for a
BP on SVG Canvas etc. plus there is not a specific enough mobile
motivation for any such statement
DKA: nobody has said what people are really doing with it
... if there are many then I don't agree
<DKA> -1
jeffs: I'd rather not spend energy on something that will not be
useful
... in teaching i found that svg has a feeling of being heavy and
canvas is not
<rob> +1 unless there is specific mobile advice to give about vector
graphics in general
jeffs: as for what is in use that is speculation
DKA: we need more info
... existing web apps that use svg or canvas
... who would want to find out which web apps, like apple's, are
using svg or canvas?
Jo: I think we are wasting time
DKA: what if there are many?
... otherwise we are doing a good service to the readers
jeffs: I think we should show people how to use this
Jo: this has not been established as a BP
DKA: I propose Jeff and I work on it
... let's close off discussion on this
<Jo> ACTION: Dan and Jeffs to wander the highways and byways of SVG
and Canvas and cook something up for the group's approval [recorded
in [34]http://www.w3.org/2009/03/26-bpwg-minutes.html#action01]
<trackbot> Created ACTION-924 - And Jeffs to wander the highways and
byways of SVG and Canvas and cook something up for the group's
approval [on Daniel Appelquist - due 2009-04-02].
<DKA> 15 minute break
<DKA> [35]http://en.wikipedia.org/wiki/WIPI
[35] http://en.wikipedia.org/wiki/WIPI
CT - HTTPS Link Rewriting
Dan: Let's pick a contentious issue to start with.
... We need to get to all this stuff today.
Jo: Let's go with ACTION-902
DKA: Where do we stand on this?
Jo: There were 3 fundamental questions.
... 1. Link rewriting is a form of CT and subject to the same
restrictions as other transformations
Francois: The security problems are caused by the changing of the
origin of the link, no necessarily the link rewriting itself. Adding
links can also be a problem.
DKA: I'm not sure how this helps us with the discussion.
Francois: We need to be clear in the document that insertion of
links also is like link rewriting.
DKA: How about making our definition of link rewriting to include
insertion of links.
<Jo> PROPOSED RESOLUTION: IN the following and in all subsequent
discussions Link Rewrioting is considered to include insertion of
links that introduce the "ame domain" issue
DKA: For positions where we have two different opposite viewpoints,
maybe each person should take the other's sides.
<Jo> PROPOSED RESOLUTION: In the following and in all subsequent
discussions Link Rewriting is considered to include insertion of
links and frame flattening and other techniques that introduce the
"same domain" issue
<Jo> > PROPOSED RESOLUTION: In the following and in all subsequent
discussions Link Rewriting is considered to include insertion of
links and frame flattening and other techniques that introduce the
"same origin" issue
Rob: What about flattening out the frameset, where you end up with
several documents all placed into one document after CT?
<rob> +1
<francois> +1
+1
<Jo> +1
<Kai> +1
<DKA> +1
<Bryan> +1
<JonathanJ> +1
RESOLUTION: In the following and in all subsequent discussions Link
Rewriting is considered to include insertion of links and frame
flattening and other techniques that introduce the "same origin"
issue
<Jo> PROPOSED RESOLUTION: Link rewriting is a form of transformation
and at a minimum is subject to the same limitations as other forms
of transformation described in this document
<rob> +1
<francois> +1
+1
<EdC> +1
<DKA> +1
RESOLUTION: Link rewriting is a form of transformation and at a
minimum is subject to the same limitations as other forms of
transformation described in this document
<JonathanJ> +EOF
Bryan: It might we worthwhile to note that it is an aspect of
non-proxy operation. Link rewriting is unnecessary if the CT proxy
is acting as a true proxy.
Rob: You may need to rewrite URIs with frameset flattening,
pagination, and javascript links.
Bryan: True, but it is important to note that in proxy mode link
rewriting is not always necessary, but for a non-proxy mode CT proxy
it is always necessary.
DKA: Can you make a resolution on this?
<Jo> PROPOSED RESOLUTION: Proxies MAY rewrite links, where content
transformation is permitted, providing that content domain origin
distinctions are preserved by the proxy.
Rob: Is the Google transformation engine out of scope.
DKA: Can you explain this Jo?
Francois: I though we agreed that this wouldn't work.
Jo: There are two parallel threads here. 1. Is this required for
hygene on the web? 2. Are the techniques available?
Francois: Should we do the techniques first?
Rob: There are two parallel threads and the answer to both is yes.
<DKA> +1
Jo: What we mean by this resolution is that content domain origin
distinctions are preserved.
Rob: Do we mean that content domain origin distinctions are kept
between the CP and the CT proxy or the CT proxy and the handset?
<Bryan> +1
Rob: We are trying to preserve security; safety from cross-domain
attacks.
<Zakim> Bryan, you wanted to explain that we should give an example
of how "domain origins distinctions can be preserved"
<Jo> PROPOSED RESOLUTION: Proxies MAY rewrite links, where content
transformation is permitted, providing that content domain origin
distinctions are preserved by the proxy such that browsers accessing
the proxy do not inappropriately misconstrue different content
origins as being the same and inappropriately share cookies, or
allow execution of scripts or do other things that cause security...
<Jo> ...problems as a result of not knowing that different origins
are involved
Bryan: We should provide an example of how domain origins can be
preserved. To me this isn't clear and needs to be shown.
Jo: I agree. We need to show that there are techniques that it can
be done and that it is testable.
<francois> +1
<Kai> +1
<DKA> +1
+1
<rob> +1
<Jo> +1
<Bryan> +1
<JonathanJ> +1
<Jo> PROPOSED RESOLUTION: Proxies MAY rewrite links, where content
transformation is permitted, providing that content domain origin
distinctions are preserved by the proxy such that browsers accessing
content via the proxy do not inappropriately misconstrue different
content origins as being the same and inappropriately share cookies,
or allow execution of scripts or do other things that cause...
<Jo> ...security problems as a result of not knowing that different
origins are involved
<Jo> +1
<EdC> +1
<JonathanJ> +1
<francois> +1
<DKA> +1
<rob> +1
<Jo> +1
+1
RESOLUTION: Proxies MAY rewrite links, where content transformation
is permitted, providing that content domain origin distinctions are
preserved by the proxy such that browsers accessing content via the
proxy do not inappropriately misconstrue different content origins
as being the same and inappropriately share cookies, or allow
execution of scripts or do other things that cause security problems
as a result of not knowing that different origins are involved
Jo: We need to show that there are testable techniques.
Francois: I don't really understand the testable parts. Do we need
to show the testable techniques in the guidelines.
Jo: Since you own the conformance statement, you need to do it.
Rob: The problems are in the DOM; needs to be testable in the DOM
spec.
Francois: There needs to be something testable in the proxy.
Rob: Testable the same way as in a browser.
Francois: What are the examples?
<Bryan> Here is the proposed informative text "Link rewriting is
always used by CT Proxies that are accessed as an origin server
initially, e.g. which provide mobile-adapted web search and
navigation to the web pages returned in the search results, or to
which the browser is redirected through the CT Proxy for adaptation
of a web page. Link rewriting *may* be used by CT Proxies acting as
normal HTTP proxies (e.g. configured or transparent) for the
browser, but may not b
<Bryan> e required since all browser requests flow through the CT
Proxy."
Rob: Look up XXS.
<francois> [36]Cross-origin resource sharing draft
[36] http://www.w3.org/TR/2009/WD-cors-20090317
Francois: There is some work to allow cross-origin resource sharing.
... based on HTTP header fields saying I allow access to the other
origin.
Jo: Isn't that easy to subvert.
Francois: May be more involved than that.
DKA: Let's not get into philosophical discussions.
Francois: We need to provide some examples of how same origin can be
preserved.
Rob: One reason for rewriting URIs is that they get too long. Many
handsets truncate URIs at 256 characters.
Jo: Let's summarize the techniques that we have discussed today.
... differences in ports does not work.
Rob: Not all ports are are open as well.
Jo: Can't use subdomains.
Francois: Having a star in the DNS record doesn't work as Bryan
pointed out.
Jo: Can't use URI decorating.
Rob: So come back to how most CT proxies work, and that is use a
single domain for which the rest of the web is available.
Eduardo: If scripts are passed down to the handset then you could
have a problem.
Rob: But the scripts are executed on the CT proxy. This is where the
guidelines come into play, which says that CT proxy needs to execute
scripts and handle the cookies.
Eduardo: How can we say that in the guidelines?
Rob: We need to do some tests like with browsers, but on the proxy.
Eduardo: Where do you do the tests?
Rob: You do the tests on the origin server.
Kai: Why are we worried about this. If some one wants to do this
they won't care about this document.
Rob: The tools are there already.
<francois> [37]DOM conformance test suite
[37] http://www.w3.org/DOM/Test/
Francois: We can use the DOM conformance test suite.
Jo: Which is the relevant specification for the tests?
<DKA> +alan
Bryan: I wanted to comment on something said by Rob about the CT
proxy handling the cookies and scripts; I think this is true in
non-proxy mode. However, we don't do this in proxy mode. We wouldn't
want imply that a CT proxy always has to manage cookies.
Rob: True, but if it is necessary to execute the scripts on the CT
proxy, then for consistency the CT proxy needs to handle the
cookies.
Bryan: OK, but we want to be clear that just because the CT proxy
handles cookies for some pages on the domain, it doesn't have to do
it for all pages on the domain.l
Rob: Yes, we just need to say that if a CT proxy handles the
scripts, then it needs to handle the cookies.
s/domain.1/domain/
Francois: these tests don't cover the cookies.
Rob: Yes, but there are tests that cover cookies.
DKA: Can we reference these tests right now and look at them later?
Jo: We need to look at them first.
... Let's take a resolution that since we don't think it is possible
for the CT proxy to manipulate the URI, then we will say that the
proxy has to maintain security pending that we find some tests that
we can test the CT proxy with.
Francois: What we are saying is that the CT proxy becomes a web
browser and has to be tested like a web browser.
... I don't think that these tests cover security.
Rob: Maybe the Opera guys have some security tests.
<Jo> PROPOSED RESOLUTION: Since there doesn't appear to be a way in
which the URI sent to the User Agent can be manipulated to preserve
security it is permissible for a CT proxy to act on content in so
that security is nonetheless preserved as adjudged by conformance
tests that are to be researched. If no such security tests can be
found then there cannot be conformance associated with link...
<Jo> ...rewriting and it cannot be permissible for CT proxies to do
so.
<Jo> PROPOSED RESOLUTION: Since there doesn't appear to be a way in
which the URI sent to the User Agent can be manipulated to preserve
security related to same origin policies it is permissible for a CT
proxy to act on content in so that security is nonetheless preserved
as adjudged by conformance tests that are to be researched. If no
such security tests can be found then there cannot be...
<Jo> ...conformance associated with link rewriting and it cannot be
permissible for CT proxies to do so.
<DKA> +1
Rob: Is it worth mentioning what tests were are looking
for--JavaScript and cookies?
<EdC> I would replace "to do so" with "to rewrite links in such a
way that they do not preserve domain origin distinction" (other URL
rewriting that preserve it being ok in principle).
Rob: and DOM?
<rob> +1
<Bryan> +1
Francois: What else could there be? I think just cookies and
scripts.
<francois> +1
<Jo> +1
<EdC> +1
Francois: Just so I understand, if we can't find tests then we won't
allow link rewriting.
Jo: Yes.
+1
<Jo> +1
<JonathanJ> +1
RESOLUTION: Since there doesn't appear to be a way in which the URI
sent to the User Agent can be manipulated to preserve security
related to same origin policies it is permissible for a CT proxy to
act on content in so that security is nonetheless preserved as
adjudged by conformance tests that are to be researched. If no such
security tests can be found then there cannot be conformance
associated with link rewriting and it cannot be permissible for CT
proxies to do so.
Francois: Could be linked to HTML 5; they are the ones defining same
origin.
<Jo> ACTION: daoust to ascertain the availability of tests that
ensure that same origin policy conformance, when implemented in this
way, can be tested [recorded in
[38]http://www.w3.org/2009/03/26-bpwg-minutes.html#action02]
<trackbot> Created ACTION-925 - Ascertain the availability of tests
that ensure that same origin policy conformance, when implemented in
this way, can be tested [on François Daoust - due 2009-04-02].
<francois> [FWIW, the following page seems to be pretty complete on
same origin policy and security settings:
[39]http://code.google.com/p/browsersec/wiki/Part2#Standard_browser_
security_features ]
[39]
http://code.google.com/p/browsersec/wiki/Part2#Standard_browser_security_features
DKA: Let's move on to the next resolution.
<Jo> PROPOSED RESOLUTION: Interception of HTTPS is not permissible
without consent from the user on a case by case basis
Jo: We need to agree on what Case-by-case basis means.
Bryan' text: Here is the proposed informative text "Link rewriting
is always used by CT Proxies that are accessed as an origin server
initially, e.g. which provide mobile-adapted web search and
navigation to the web pages returned in the search results, or to
which the browser is redirected through the CT Proxy for adaptation
of a web page. Link rewriting *may* be used by CT Proxies acting...
scribe: as normal HTTP proxies (e.g. configured or transparent) for
the browser, but may not be required since all browser requests flow
through the CT Proxy."
Jo: Why don't include that as a note under link rewriting?
Bryan: OK
<Jo> PROPOSED RESOLUTION: Include text on the following lines as a
note under a section on Link Rewriting: "Link rewriting is always
used by CT Proxies that are accessed as an origin server initially,
e.g. which provide mobile-adapted web search and navigation to the
web pages returned in the search results, or to which the browser is
redirected through the CT Proxy for adaptation of a web page....
<Jo> ...Link rewriting *may* be used by CT Proxies acting as normal
HTTP proxies (e.g. configured or transparent) for the browser, but
may not be required since all browser requests flow through the CT
Proxy."
<EdC> +1
<Bryan> +1
<JonathanJ> +1
+1
<Jo> +1
<rob> +1
<DKA> +1
<adam> +1
Francois: I am at a bit of a loss on this resolution. The other
resolution still stands, right.
<francois> +1
RESOLUTION: Include text on the following lines as a note under a
section on Link Rewriting: "Link rewriting is always used by CT
Proxies that are accessed as an origin server initially, e.g. which
provide mobile-adapted web search and navigation to the web pages
returned in the search results, or to which the browser is
redirected through the CT Proxy for adaptation of a web page. Link
rewriting *may* be used by CT Proxies acting as normal HTTP proxies
(e.g. configured or transparent) for the browser, but may not be
required since all browser requests flow through the CT Proxy."
<Jo> PROPOSED RESOLUTION: Interception of HTTPS is not permissible
without consent from the user on a case by case basis
Jo: What does case-by-case basis mean?
Jo: What we are trying to avoid with "case-by-case basis" is blanket
preferences and also making the user do nonsensical things.
<Jo> PROPOSED RESOLUTION: Interception of HTTPS is not permissible
without explicit prior agreement from the Content Provider
<Jo> [we need to solve the next Proposed resolution prior to the
previous]
Jo: Let's look at the next resolution because the case-by-case
problem won't exist if we take the next resolution.
DKA: If we are viewing the CT proxy as the browser, then this HTTPS
resolution doesn't make sense.
Francois: Earlier we decide that a CT proxy is a distributed
browser.
Bryan: On Jo's proposed resolution, are we only including
resolutions that are testable? I don't think explicit prior
agreement is testable.
DKA: I don't think that it even makes sense. A bank is one thing,
but what about other types of transactions?
Jo: It is impossible to second-guess a CP's use of HTTPS. They want
a secure transaction.
DKA: I don't see that this is testable or scalable. I agree with
Bryan.
Jo: Then you would say that the resolution must be taken and can't
use non-testable as a cop out.
DKA: What do others think?
Eduardo: As a CP, I have an expectation that there will be security.
I'm going to break it, I'm not going to even tell you about.
DKA: What about Opera Mini, SkyFire?
Francois: There is tight integration between client and server.
DKA: You should still hijack the Opera server.
Rob: Could happen on Firefox as well.
DKA: If you assume that all of the actors in the chain are well
behaved, then what we are really talking about is malware somewhere
in the chain.
Kai: When HTTPS is used, it is carefully chosen. There is a
performance loss. It is used when we mean it. It shouldn't be mucked
with. There are serious legal concerns.
DKA: We talked about Opera Mini.
Jo: Out of scope of this document.
DKA: There is the opportunity for malware even on a desktop browser.
Jo: Are you saying that because there are opportunities for malware,
why not introduce more?
DKA: If you assume that the actors are benign, then what we are
talking about malware.
Jo: I don't agree. We are saying that the CP doesn't want anyone to
listen in.
Kai: Obtaining permission from the origin server means that the CT
proxy goes out of scope.
Francois: The only reason to allow HTTPS link rewriting is to allow
good user experience.
... You are not honoring the spirit of HTTPS.
DKA: So one reason not to allow HTTPS link rewriting would be
because the user couldn't examine the certificate.
... You might not be able prevent phishing attacks.
<Zakim> Bryan, you wanted to ask if this is testable and to point
out dependency upon domain validation for downloaded or signed
objects
Rob: You could allow the user to see the real certificate through
some UI.
Bryan: You have the same trust issues as with the scripts and
cookies and some domain stuff.
... I can be downloading content for use outside the browser and the
trust might be broken because I downloaded it through the proxy.
Rob: That comes back to the link-rewriting argument.
Eduardo: There might be some cases where HTTPS could be used--on
phones where the cert handling might be broken.
DKA: I'm warming to requiring consent for HTTPS link rewriting; it's
just web breaking.
Rob: What about the long tail where there is HTTPS but no mobile
site.
DKA: How about giving a strongly worded warning to the user that
their connection is not secure?
Francois: Because it is not necessarily up just to the user.
DKA: What about if I give someone my password? Then the CP is not
necessarily talking to the real user.
Rob: True. It is usually the user's responsibility to take on the
risk.
Francois: What about banks that don't allow CT proxies to intervene?
DKA: Well, there is no reason that CT proxies couldn't be more
restrictive that what we say.
Kai: The CP is selecting HTTPS, and it shouldn't be changed.
Rob: What the CP is saying is that I'm providing a secure connection
to your PC, and it's the user's choice to have a distributed
browser.
Francois: There is no way for the CP to refuse the choice.
Kai: no-transform?
Francois: But it is already too late?
Rob: The HTTPS request should have a via header that would not
normally be there.
<DKA> PROPOSED RESOLUTION: It's enough to get the user's consent (in
response to a strongly worded warning) in order for proxies to
transform https content.
Francois: That is not enough.
Eduardo: As a CP, I would not feel comfortable with this. Also, the
legal framework could be a problem.
DKA: We can't always say "don't do this if it is illegal"
<DKA> PROPOSED RESOLUTION: Proxies must never transform https
content unless a prior agreement has been reached with the specific
origin server.
<EdC> Change "I feel comfortable" with "I do not feel conformtable".
<Zakim> Bryan, you wanted to state we should not require such a
consent to be real-time or explicit
Bryan: Getting user consent on a case-by-case basis will really bug
users and they'll give up. If you are doing it often, it's going to
break.
... We've had significant problems with HTTPS and the way it is used
and prompting the user.
Kai: I would second that. You might have to do it for every asset on
the page.
<DKA> PROPOSED RESOLUTION: It's enough to get the user's consent on
https session set-up (in response to a strongly worded warning) in
order for proxies to transform https content.
Rob: The user can give their consent in real time. The HTTPS link
stays up for a long time.
<Bryan> for the minutes: "We've had significant problems with HTTPS"
should be "We've seen significant issues with interrupting the
normal flow of applications using HTTPS"
DKA: You would have a strong warning that required consent. You
might really need to get to your bank.
Kai: Users try to avoid that popup. It happens when secure content
is mixed with insecure content.
... What is more important that users know they are leaving a secure
connection;.
DKA: What is really important is that the user knows that the HTTPS
connection is going through a CT proxy.
Kai: Are user's going to understand the implications of this?
DKA: If the user trusts Vodafone, then the user may want the HTTPS
link through the CT proxy.
Kai: What about some unknown company?
DKA: Then the user can refuse.
Rob: There is the long tail where there are websites that have been
written long ago that provide HTTPS.
<DKA> PROPOSED RESOLUTION: Proxies must never transform https
content unless a prior agreement has been reached with the specific
origin server.
<inserted> scribenick: adam
Rob: It's not a symetric agreement. The server knows nothing about
the user's identity.
francois: Technically, yes, but the impression is that it's
symmetrical.
DKA: We need to draw this to a close.
Kai: I don't want anybody else to do anything with my https content.
It's secured content.
... Supportive of the resolution.
<SeanP> -1
<rob> -1 because this is not scalable to even a thousand long-tail
websites that may use HTTPS for log-in
<Kai> +1
<EdC> +1
<Bryan> +1
<Jo> +1
<francois> +1 (because something's missing in the technology stack
to enable that)
Bryan: We're not saying anything about the verifiability of such
agreement
<Kai> of course, if there is an agreement it is out of scope of this
document :-)
Bryan: Unless there is some kind of agreement with both origin
server and user, then you shouldn't transform. It doesn't have to be
realtime or explicit though.
DKA: Yes, but this resolution says: *never*.
rob: This resolution is about the consent of the origin server. The
consent of the user is separate resolution.
DKA: Yes, but if we pass this resolution then we'll never encounter
the other one in reality.
... This would mean that a lot of existing implementations are
not-compliant.
kai: Perhaps rightfully so.
... Can the intermediary be trusted not to do anything with the
secured data?
Rob: Assuming we don't pass this resolution because it's a "never",
we may pass one that says "may" in which case it's the user's choice
to trust the intermediary.
<DKA> PROPOSED RESOLUTION: Proxies may transform https content in
the cases where there is a pre-existing agreement between the proxy
operator and the source or in the case where user consent has been
given on a warning provided at the beginning of the https setup.
<Jo> -1
<francois> -1
Rob: There's two sides to it. Does the CP agree? Does the user
agree? But because with this resolution there's no way for the
content providers to agree the user will never get a choice.
<EdC> -1
DKA: This is the opposite resolution.
SeanP: So there will be a warning every time?
<Bryan> -1 the user consent should be required no more often than
once per browsing session, and should be able to apply to all sites
accessed through the CT proxy in that session
DKA: The warning will be each time the user starts a session.
<Kai> -1 because an agreement between user and proxy operator may
still hold the CP responsible, which is untenable
<Jo> [two party consent is required and can't be achieved]
DKA: Disagree with "CT proxy session" -- my decision to trust the CT
depends on the sites I am interacting with.
Kai: If the CP has decided his content needs to be secured, but this
security is compromised by intermediary (because there is an
agreement with the user) then the CP might still be held
responsible.
[ Discussion on whether a bank (for example) would be happy with
this proposal ]
DKA: We don't want to weaken the perceived security of mobile
internet.
Jo: May be pragmatic to transform https content without consent of
CP, but can't be a BP.
<DKA> PROPOSED RESOLUTION: We will remain silent on https content
rewriting.
<DKA> PROPOSED RESOLUTION: We will identify https transformation as
a feature at risk - something you can remove from the document.
Francois: Could mark it as a feature at risk, we may have to remove
this recommendation if we can't implement it.
<francois> [40]Definition of a feature at risk
[40]
http://www.w3.org/2005/10/Process-20051014/tr.html#at-risk-feature
Jo: If we allow https transformation we leave CP with no way of
saying: "I don't want this to happen."
dka: Could we give the origin server a way to tell the origin server
on set-up that I don't want you to transform https content.
... What happens on the handshake when the ct proxy establishes the
connection with the origin server?
Bryan: SSL handshake between CT Proxy and origin server.
... But the origin server has no way to know that this is coming
from the proxy and not from a browser.
Rob: You could put in a via header... But that's after the SSL is
established.
DKA: At that point (on seeing the first HTTP request on the SSL
connection with a via) can return a 403 and close. And the CT Proxy
knows that the origin server doesn't want to establish an SSL
connection.
Kai: So the via header is required.
Jo: Yes.
DKA: Is this the middle-way we want? The control is back on the
server.
Francois: But legacy content that doesn't know about this will
quietly get opted-in.
Jo: Two party consent is fundamental principle. But this isn't two
party consent -- it's one party consent and one party ignorance.
DKA: This doesn't break two party consent.
Kai: The server has an opportunity to refuse because it sees the
header.
<EdC> 3 issues: (1) only opt-out for CP, no opt-in (silence ==
accept https break). (2) We assume via header fields never get
suppressed ior transit (3) We are implicitly specifying a protocol
for https: first establish tsl/ssl session, then check http via -- I
can already foresee the broadsides of the IETF.
<DKA> PROPOSED RESOLUTION: We will remain silent on https content
rewriting.
Kai: Is the user protected from unwanted manipulation?
DKA: None of this prevents bad proxies / malware.
Kai: The goal we are trying to acheive is measure conformance to
this document.
DKA: There isn't much consensus. The weight of opinion is on
explicitly disallowing https transformation.
<DKA> PROPOSED RESOLUTION: Proxies must never transform https
content unless a prior agreement has been reached with the specific
origin server.
Francois: We've already had significant feedback saying please don't
allow HTTPS link re-writing.
Rob: We could say that proxies may transform (subject to user
consent) and mark it as a feature at risk.
Jo: Feature at risk is only valid on the grounds of implementation
experience -- if it turns out to be unviable.
Rob: We shouldn't remain silent. We have things to say about user
consent and should note that there is no way for the origin server
to consent.
DKA: That sounds like an informative statement. Remain silent means:
No normative statement.
Jo: I think it would look strange.
<DKA> PROPOSED RESOLUTION: Proxies may transform https content in
the cases where there is a pre-existing agreement between the proxy
operator and the source or in the case where user consent has been
given on a warning provided at the beginning of the https setup.
EdC: Replace "or" with "and" and I agree.
<Bryan> -1 we should not mandate the "at the begginning..."
Bryan: Don't want to make statements about when consent is provided
since it can have unforeseen effects.
SeanP: Agree with Bryan, user experience might not be good.
Rob: If we go with a resolution like this a number of resolutions on
when consent is provided is likely to follow.
<Bryan> I suggest "... or in the case where user consent has been
given by prior agreement or in response to a warning provided by the
CT Proxy"
<Jo> PROPOSED RESOLUTION: Two party consent is required for HTTPS
link rewriting
<DKA> PROPOSED RESOLUTION: Proxies may transform https content in
the cases where there is a pre-existing agreement between the proxy
operator and the source or or in the case where user consent has
been given by prior agreement or in response to a warning provided
by the CT Proxy.
<SeanP> +1 to the last one
<EdC> -1 same issue: "and" instead of "or"
<Kai> -1 it continues to leave the CP being responsible
<Kai> +1 to Jo's proposal
<rob> +1 if it is legally OK to have one-party consent
<Jo> PROPOSED RESOLUTION: Per OPES two party consent is required for
HTTPS link rewriting (by the content provider and the user)
<Bryan> my core opinion on this is that HTTPS link rewriting will
end up breaking sites and is a bad idea in general, but I would not
want to restrict someone's ability to solve that challenge
<DKA> PROPOSED RESOLUTION: Proxies must never transform https
content unless a prior agreement has been reached with the specific
origin server.
<Bryan> +1
<Kai> +1
<Bryan> I want breakfast
<SeanP> -1
<francois> +1
<EdC> +1
<rob> -1
<DKA> +0
<Jo> +1
0
RESOLUTION: Proxies must never transform https content unless a
prior agreement has been reached with the specific origin server.
Note inserted after the meeting: the above resolution has been
revised during the following day of the F2F after another discussion
on OPES and two-party consent. See [41]the corresponding topic and
resolution in the minutes of day 3.
[41] http://www.w3.org/2009/03/27-bpwg-minutes.html#item01
<JonathanJ> 0
<achuter> +0
Rob: This will give us trouble with reference implementations.
<Jo> [adjourned]
SeanP: from a practical sense, nearly every deployment Novarra's
done has involved HTTPS rewriting
... and those that didn't it was asked for later
DKA: this is a victim of dogma over common sense
<Bryan> Sean, do the deployments act as a transparent or configured
proxy?
<SeanP> Both
Disclosure on Eduardo's presence to the F2F
EdC: My presence here at this meeting is partly sponsored by dotMobi
<EdC> All my thanks to dotMobi to allow me to participate in the F2F
meeting.
CT - ISSUE-285 - Links rewriting
Jo: I think we can close this
DKA: do we need any further resolutions to close this?
francois: we can link the action to the issue
CT - ISSUE-288 and ISSUE-284 - Non-normative list of mobile heuristics
Jo: under sec 4.2.9 of the CTG draft we have the heuristics
... the resolution is a SHOULD take account of these heuristics. So
they are no longer heuristics
... Is there a textual change to make here?
francois: the examples are no longer examples but a list of things
that unambiguously make a page mobile-aware
<francois> [42]minutes on mandating heuristics
[42] http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0066.html
francois: and the other things in the appendix remain examples of
heuristics that could also be taken into account of under
undocumented circumstances
Jo: ok, so I'll reword 4.2.9
DKA: So we still have some non-mandatory heuristics
francois: These could create confusion if people expect that
following them will result in certain actions
<Jo> ACTION: Jo to inser sections under proxy decision to transform
a. to specify SHOULD NOT in the presence of the features listed at
[43]http://www.w3.org/2009/03/10-bpwg-minutes.html and b. to include
the current cullets listed as heuristics [recorded in
[44]http://www.w3.org/2009/03/26-bpwg-minutes.html#action03]
[43] http://www.w3.org/2009/03/10-bpwg-minutes.html
<trackbot> Created ACTION-926 - Inser sections under proxy decision
to transform a. to specify SHOULD NOT in the presence of the
features listed at
[45]http://www.w3.org/2009/03/10-bpwg-minutes.html and b. to include
the current cullets listed as heuristics [on Jo Rabin - due
2009-04-02].
[45] http://www.w3.org/2009/03/10-bpwg-minutes.html
francois: but it's just a probable
... and we've already seen in the past examples of "W3C said ..."
quotes out of context
<DKA> PROPOSED RESOLUTION: We delete all non-normative heuristics
and close issue-288
<DKA> PROPOSED RESOLUTION: We delete non-normative heuristics except
for doctypes and close issue-288
<DKA> PROPOSED RESOLUTION: We delete all non-normative heuristics
and close issue-288.
<francois> +1
DKA: it's not our job to tell CT-proxy vendors how to do everything
Jo: but a domain name of *.mobi is a very good indication we should
keep
francois: In theory it's not although in practice it is
Jo: what about the TAG finding that URIs should be "meaningful"?
francois: your point is valid as a good practice
SeanP: the mandatory ones are SHOULD, can the rest be MAY?
francois: different levels of SHOULD, MAY, might, could... are
confusing
Jo: I'll try to find this TAG advice
<Jo> TAG FINDING: Good Practice: URIs intended for direct use by
people should be easy to understand, and should be suggestive of the
resource actually named.
<Jo> --> [46]http://www.w3.org/2001/tag/doc/metaDataInURI-31.html
TAG FINDING on Metadata in URIs
[46] http://www.w3.org/2001/tag/doc/metaDataInURI-31.html
Rob: but the use of different User-Agents to view content isn't
always relevant to the direct-use-URI
<Jo> PROPOSED RESOLUTION: Add .mobi to the list of mandatory
heuristics as it is a stronger indication of mobile intent than many
of the content-types and DOCTYPEs already agreed
francois: is there a reference (eg .mobi charter) we can use?
<Jo> PROPOSED RESOLUTION: Add .mobi to the list of mandatory
heuristics as it is a stronger indication of mobile intent than many
of the content-types and DOCTYPEs already agreed - other URI
patterns are more ambiguous as to their intent
<Bryan> oops - need a new bridge code?
Kai: are there dotmobi constraints that guarantee this?
Jo: Yes, there are compliance rules with the company dotmobi to take
out a *.mobi domain name
+1
<DKA> +1
<achuter1> +1
<EdC> +1
<Jo> [am conflicted so 0]
<JonathanJ> +1
<Bryan> +1
<Kai> 0
<francois> 0 (note there could be a vendor-neutrality problem on top
of the Web arch possible push-back)
RESOLUTION: Add .mobi to the list of mandatory heuristics as it is a
stronger indication of mobile intent than many of the content-types
and DOCTYPEs already agreed - other URI patterns are more ambiguous
as to their intent
<SeanP> 0
<Bryan> what about "m.domain" type hostnames?
francois: I think we shouldn't even mention the rest that are not
SHOULDs
EdC: but combinations such as application/xhtml+xml AND
[47]http://m.* will actually be good practice
[47] http://m.*/
francois: but it doesn't give the content-provider any guarantees
EdC: they are ambiguous but they are in use
SeanP: I don't see a big problem leaving them in a non-normative
appendix
jo: are we abandoning the list in 4.2.9?
francois: apart from the agreed SHOULD parts, yes
<Bryan> Which version is 4.2.9 in? Can someone past a URI to the
draft?
francois: the rest either delete or move to an appendix
jo: even the mobileOK Basic confomance mark?
<DKA> PROPOSED RESOLUTION: close issue-288 and move on.
Rob: it's a feature-at-risk because there is currently no standard
machine-readable trustmark
<Bryan> Can we say which bullets in "Examples of heuristics:" (in
4.2.8 in 081107) are being removed?
<DKA> PROPOSED RESOLUTION: We delete all non-normative heuristics
and close issue-288.
<Bryan> Which ones are "non-normative"?
<francois>
[48]http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-draf
ts/Guidelines/090313#sec-proxy-decision-to-transform
[48]
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/090313#sec-proxy-decision-to-transform
<francois> +1
Jo: ok, let's just remove the non-mandatory items
<SeanP> 0
0
EdC: even remove the line "the user-agent has features ... to allow
it to present the content"?
francois: yes because User-Agent was considered at the HTTP Request
stage
jo: but it could also be considered in conjunction with the content
of the response
<Jo> -->
[49]http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-draf
ts/Guidelines/090313 Current Draft
[49]
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/090313
francois: but that is difficult to test
... eg the user-agent can render tables but it may be so wide as to
be unviewable
Rob: as Kai points out there's definitely no best-practice here
<DKA> PROPOSED RESOLUTION: We delete all non-normative heuristics
and close issue-288.
<francois> +1
<Jo> +1
<DKA> +1
0
RESOLUTION: We delete all non-normative heuristics and close
issue-288
<DKA> CLOSE ISSUE-288
<trackbot> ISSUE-288 Should the Content Transformation Guidelines
include a non normative list of non-mandated mobile heuristics?
closed
<DKA> PROPOSED RESOLUTION: Close Issue-284
<DKA> +1
+1
<francois> +1
<EdC> +1
<DKA> CLOSE ISSUE-284
<trackbot> ISSUE-284 W3C mobile addressing standards closed
RESOLUTION: Close Issue-284
CT - ISSUE-289 - Are X-Device-* HTTP Header fields needed?
[50]http://www.w3.org/2005/MWI/BPWG/Group/track/issues/open
[50] http://www.w3.org/2005/MWI/BPWG/Group/track/issues/open
DKA: haven't we already talked about "content selection" which isn't
"content transformation" but is about selecting suitable content for
the user's situation
francois: then you're already mobile-friendly enough that the
CT-proxy has nothing to adapt
DKA: what if there is something that needs adapting?
EdC: like what?
SeanP: there are cases where altered headers might be sent first,
then what?
francois: Then the Vary: User-Agent header can be used to indicate
there was alternate content available
<achuter1> scribenick: achuter1
<DKA> ScribeNick: achuter1
<DKA> Scribe: Alan
Fran�ois: Headers can be interpreted only on basis of prior
experience
Fran�ois: Often no way to get original UA header.
Jo: Knowing that there is a mobile present, user requests desktop
version
EdC: We need the x-device header
<Jo> PROPOSED RESOLUTION: Leave X-Device headers in as they add
value
EdC: then the provider can know what the requester really is.
<francois> -1
<Jo> PROPOSED RESOLUTION: Leave X-Device headers in as they add
value and close ISSUE-289
<SeanP> +1
<francois> -1
Fran�ois: I would like to take them out
<rob> 0
<EdC> +1
<DKA> +1
<Jo> [francois explains that his -1 is a formal objection and is not
to be taken seriously]
RESOLUTION: Leave X-Device headers in as they add value and close
ISSUE-289
<DKA> CLOSE Issue-289
<trackbot> ISSUE-289 Should CT proxies send X-Device-* headers after
having determined the content is not mobile-optimized? closed
CT - Miscellaneous actions
<DKA> ACTION-830?
<trackbot> ACTION-830 -- Bryan Sullivan to review correspondence
with Dennis cf LC-2065 and to draft a) proposed changes to the
document and b) a proposed response to Dennis -- due 2008-09-09 --
OPEN
<trackbot>
[51]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/830
[51] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/830
<francois> [I think the real problem to solve is the availability of
the original HTTP request, and that, once this is solved, there is
no strong use case to have the origin HTTP header fields along with
altered ones.]
Bryan: would be provided by implementation
<SeanP>
[52]http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidel
ines-20080801/2065?cid=2065
[52]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2065?cid=2065
dan: How to respond to LC 2065
Bryan: had resolution that was partial agreement with this.
Dan: LC 2065 says that CT proxy must allow user possibility of
obtaining transformed version, but our document gives a should not a
MUST.
... LC 2065 secxond point in list says CT proxies must allow users
possibility to turn off transformation.
<Jo> CLOSE ACTION-830
<trackbot> ACTION-830 Review correspondence with Dennis cf LC-2065
and to draft a) proposed changes to the document and b) a proposed
response to Dennis closed
<DKA> PROPOSED RESOLUTION: Regarding LC-2065 write back to Dennis
that we agree and we think sections 4.2.2 and 4.2.9 of current draft
(1q) accomodate this.
<DKA> +1
<EdC> +1
<DKA> RESOLUTION: Regarding LC-2065 write back to Dennis that we
agree and we think sections 4.2.2 and 4.2.9 of current draft (1q)
accomodate this.
<Bryan> Section "4.2.9.1 Alteration of Response" says "If a proxy
alters the response then: ... It should indicate to the user that
the content has been transformed for mobile presentation and provide
an option to view the original, unmodified content.". This meets the
intent but not the requirement level as requested.
<DKA> ACTION-850?
<trackbot> ACTION-850 -- Bryan Sullivan to provide some text on
whitelists to see if we can include them somehow and come to an
agreement re. LC-2003 -- due 2008-09-29 -- OPEN
<trackbot>
[53]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
[53] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
Jo: About Action 850
<DKA> LC-2003?
<Jo> --> [54]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
ACTION-850
[54] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
Bryan: do we really need to say anything about whitelists?
<DKA> CLOSE ACTION-850
<trackbot> ACTION-850 Provide some text on whitelists to see if we
can include them somehow and come to an agreement re. LC-2003 closed
Jo: Action was attempt to reintroduce it.
<francois> ACTION-858?
<trackbot> ACTION-858 -- Sean Patterson to find out if novarra has
figures on whether users choose to proceed at the HTTPS interstitial
page -- due 2008-10-13 -- OPEN
<trackbot>
[55]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/858
[55] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/858
<DKA> CLOSE ACTION-858
<trackbot> ACTION-858 Find out if novarra has figures on whether
users choose to proceed at the HTTPS interstitial page closed
<DKA> ACTION-867?
<trackbot> ACTION-867 -- François Daoust to look into an appendix
with relevant normative statements of RFC2616 and report back to the
group. -- due 2008-10-27 -- OPEN
<trackbot>
[56]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/867
[56] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/867
<DKA> CLOSE ACTION-867
<trackbot> ACTION-867 Look into an appendix with relevant normative
statements of RFC2616 and report back to the group. closed
<DKA> ACTION-886?
<trackbot> ACTION-886 -- Jo Rabin to propose beefed up text on
heuristics in respect of practice vs good practice -- due 2008-12-02
-- OPEN
<trackbot>
[57]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/886
[57] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/886
<DKA> CLOSE ACTION-886?
<DKA> CLOSE ACTION-886
<trackbot> ACTION-886 Propose beefed up text on heuristics in
respect of practice vs good practice closed
<DKA> ACTION-887
<DKA> ACTION-887?
<trackbot> ACTION-887 -- Jo Rabin to put a reference somewhere to
the Best Practice about exploiting device capabilities -- due
2008-12-02 -- OPEN
<trackbot>
[58]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/887
[58] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/887
<DKA> CLOSE ACTION-887
<trackbot> ACTION-887 Put a reference somewhere to the Best Practice
about exploiting device capabilities closed
<DKA> ACTION-889?
<trackbot> ACTION-889 -- Jo Rabin to take the editorial comments in
[59]http://lists.w3.org/Archives/Public/public-bpwg-ct/2008Nov/0019.
html into account for next version of the draft -- due 2008-12-09 --
PENDINGREVIEW
[59]
http://lists.w3.org/Archives/Public/public-bpwg-ct/2008Nov/0019.html
<trackbot>
[60]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/889
[60] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/889
<francois> [relevant section removed for ACTION-887]
[Eduardo's comments]
Jo: changed "header fields" to "value of header fields"
... Will preface the first sentence in 4.1.5
<Jo> ACTION: Jo tpo preface the first sentence in 4.1.5 with Aside
from the usual procedures defined in [RFC 2616 HTTP] [recorded in
[61]http://www.w3.org/2009/03/26-bpwg-minutes.html#action04]
<trackbot> Created ACTION-927 - Tpo preface the first sentence in
4.1.5 with Aside from the usual procedures defined in [RFC 2616
HTTP] [on Jo Rabin - due 2009-04-02].
<DKA> PROPOSED RESOLUTION: Accept Jo's editorial changes detailed in
email 13-March-2009 and close ACTION-927
<DKA> PROPOSED RESOLUTION: Accept Jo's editorial changes detailed in
email 13-March-2009 and close ACTION-889
Jo: All Eduardo's comments dealt with.
RESOLUTION: Accept Jo's editorial changes detailed in email
<DKA> CLOSE ACTION-889
<trackbot> ACTION-889 Take the editorial comments in
[62]http://lists.w3.org/Archives/Public/public-bpwg-ct/2008Nov/0019.
html into account for next version of the draft closed
[62]
http://lists.w3.org/Archives/Public/public-bpwg-ct/2008Nov/0019.html
<DKA> ACTION-892?
<trackbot> ACTION-892 -- François Daoust to prepare an ICS with
MUST/MUST NOT (to view if that's a good idea), try to add a "depends
on" column, explain "Not applicable" or remove it. -- due 2008-12-09
-- OPEN
<trackbot>
[63]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/892
[63] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/892
<DKA> ACTION-893?
<trackbot> ACTION-893 -- Robert Finean to start putting together a
set of guidelines that could help address the security issues
triggered by links rewriting. -- due 2008-12-23 -- OPEN
<trackbot>
[64]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/893
[64] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/893
<Bryan> Here is my proposed response to 850 (sorry about the line
breaks): Re "1. Content transformation proxies...": Section "4.2.9.1
Alteration of Response" says "If a proxy alters the response then:
... It should indicate to the user that the content has been
transformed for mobile presentation and provide an option to view
the original, unmodified content." Re "2. Content transformation
proxies...": this will be addressed by adding text to "4.1.5.3 User
Selection of
<Bryan> Restructured Experience": "Proxies SHOULD provide users with
the option to enable or disable content transformation, as a
preference to be applied until changed." These changes meet the
intent but not the requirement level as requested. The reason for
the requirement leve difference is that not all CT Proxies may be
capable of retaining user preferences.
<DKA> ACTION-850?
<trackbot> ACTION-850 -- Bryan Sullivan to provide some text on
whitelists to see if we can include them somehow and come to an
agreement re. LC-2003 -- due 2008-09-29 -- CLOSED
<trackbot>
[65]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
[65] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/850
<DKA> ACTION-893?
<trackbot> ACTION-893 -- Robert Finean to start putting together a
set of guidelines that could help address the security issues
triggered by links rewriting. -- due 2008-12-23 -- OPEN
<trackbot>
[66]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/893
[66] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/893
Rob: Was about man-in-the-middle security
Jo: Can't have a BP that requires a security audit.
<DKA> CLOSE ACTION-893
<trackbot> ACTION-893 Start putting together a set of guidelines
that could help address the security issues triggered by links
rewriting. closed
Jo: Now a moot point after the link rewriting resolution.
[break now]
<DKA> [resuming]
<francois> Scribe: Kai
<DKA> ACTION-896?
<trackbot> ACTION-896 -- François Daoust to stimulate discussion on
the SHOULD NOT question ref mobile heuristics -- due 2009-01-20 --
PENDINGREVIEW
<trackbot>
[67]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/896
[67] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/896
<DKA> CLOSE ACTION-896
<trackbot> ACTION-896 Stimulate discussion on the SHOULD NOT
question ref mobile heuristics closed
<DKA> ACTION-900?
<trackbot> ACTION-900 -- Jo Rabin to raise issues on inconclusive CT
threads once the new draft of CT is prepared -- due 2009-01-27 --
PENDINGREVIEW
<trackbot>
[68]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/900
[68] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/900
<DKA> ACTION-901?
<trackbot> ACTION-901 -- Sean Patterson to raise issue the thread he
started on transforming mobile content entitled \"RE: [minutes] CT
Call 6 january 2009\" -- due 2009-01-27 -- OPEN
<trackbot>
[69]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/901
[69] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/901
SeanP: I think it is done
<francois> [70]http://www.w3.org/2009/01/20-bpwg-minutes.html#item04
[70] http://www.w3.org/2009/01/20-bpwg-minutes.html#item04
<DKA> CLOSE ACTION-901
<trackbot> ACTION-901 Raise issue the thread he started on
transforming mobile content entitled \"RE: [minutes] CT Call 6
january 2009\" closed
<DKA> ACTION-902
<DKA> ACTION-902?
<trackbot> ACTION-902 -- Jo Rabin to summarise current discussions
on https link re writing -- due 2009-01-27 -- PENDINGREVIEW
<trackbot>
[71]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/902
[71] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/902
<DKA> CLOSE ACTION-902
<trackbot> ACTION-902 Summarise current discussions on https link re
writing closed
CT - ACTION-912 - X-Device-* HTTP Header fields registration
<DKA> ACTION-912?
<trackbot> ACTION-912 -- Eduardo Casais to suggest some new wording
on X-Device-* HTTP header fields keeping the normative meaning but
noting that we're working with IETF and may deprecate this in the
future -- due 2009-03-10 -- PENDINGREVIEW
<trackbot>
[72]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/912
[72] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/912
<EdC>
[73]http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0058.htm
l
[73] http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0058.html
EdC: this has not been resolved on a call
Jo: I have added some text to EdC proposed text
<Zakim> francois, you wanted to report on discussion with IETF
Jo: do you, EdC, have a problem with my text
EdC: no
francois: i was asked to join a liaison call with IETF
... the point was not to talk about it being a good or bad idea, but
how to register such a header field, when it has already been
implemented.
... it can be grandfathered in. It is too late and we don't want to
add more confusion we can choose the most recent deployed one and it
should be accepted by IETF
... we need solid use cases. On the naming we can move forward with
the X- prefix
<DKA> PROPOSED RESOLUTION: adopt the text as proposed bt Eduardo and
modified by Jo regarding X- prefix.
<DKA> PROPOSED RESOLUTION: adopt the text as proposed bt Eduardo and
modified by Jo regarding X- prefix and close ACTION-912
francois: in the guidelines we will have a normative statement to
use headers which we will not register. I think that will be hard to
move forward.
Jo: what is the problem here?
francois: the header fields need to be registered in the IANA DB
... if we will have an objection we will have to convince them we
need them
Jo: is that really necessary?
francois: there are two levels of registration. One is simple and
does not require support by the IETF
EdC: there will be discussion
francois: they should appear in some list and moving them to the
repository will then be harder
Jo:
francois: we already recevied comments that this should not be in a
W3C draft
... we should action somebody to register this on the temporary
registry
... to envoke grandfathering we need to find out how uses these
header fields
rob: I think we can use them. It is default, but in practice they
don't
Jo: can we ask francois to do this, knowing that we may run out of
time to finish this
francois: I am not sure I agree. We cannot really move forward on
something that is not fully defined
... if we use it we must define it
EdC: you ask to go through a process that make them deprecated and
then have them removed
francois: IETF and W3C work closely together and they have already
said this is not our task so if we don't go through the process we
will just get the same answer
<DKA> PROPOSED RESOLUTION: adopt the text as proposed bt Eduardo and
modified by Jo regarding X- prefix, we will register the header with
IETF and close ACTION-912
EdC: there are some fields that have been temporary for a long time
SeanP: they also recommed X-forwarded
francois: it is related to proxy in general
... it has nothing to do with transformation
DKA: look at the proposal please
SeanP: what is difference between edc and jo's text/
EdC: Jo said we may or may not committ...
<EdC> +1
<rob> +1
<francois> 0
<DKA> +1
<DKA> +2
<SeanP> +1
RESOLUTION: adopt the text as proposed bt Eduardo and modified by Jo
regarding X- prefix, we will register the header with IETF and close
ACTION-912
<Jo> ACTION: daoust to progress registration of the X- headers
irrespective his personal distate for the subject [recorded in
[74]http://www.w3.org/2009/03/26-bpwg-minutes.html#action05]
<trackbot> Created ACTION-928 - Progress registration of the X-
headers irrespective his personal distate for the subject [on
François Daoust - due 2009-04-02].
<DKA> ACTION-925?
<trackbot> ACTION-925 -- François Daoust to ascertain the
availability of tests that ensure that same origin policy
conformance, when implemented in this way, can be tested -- due
2009-04-02 -- OPEN
<trackbot>
[75]http://www.w3.org/2005/MWI/BPWG/Group/track/actions/925
[75] http://www.w3.org/2005/MWI/BPWG/Group/track/actions/925
<DKA> CLOSE ACTION-912
<trackbot> ACTION-912 Suggest some new wording on X-Device-* HTTP
header fields keeping the normative meaning but noting that we're
working with IETF and may deprecate this in the future closed
francois: so far I found out that no two browsers behave the same
... what you can do with a client script depends on the browser
CT - Abstract improvement
Jo: Matt points out the abstract is wrong and incomprehensible
Jo: Matt points out the abstract is wrong and incomprehensible
... we were told not to tell transforming proxy providers how to do
their work
DKA: there could be informative guidance
... somebody want to write a good abstract?
EdC: I'll do it
... with the gist of what is here and that it provides informative
guidance
Jo: leave out the informative
<DKA> ACTION Eduardo to write an abstract for CT.
<trackbot> Created ACTION-929 - Write an abstract for CT. [on
Eduardo Casais - due 2009-04-02].
Jo: we'll leave that with Eduardo
... next point is not completely implemented resolutions
... [going into LCs]
CT - LC-2050 - restructuring, recoding, optimization
[76]LC-2050
[76]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2050
Jo: we wanted to change something in the scope section
... do we need to maintain these definitions? We did not define
these concepts very formally because they are used lightly.
... making the distinction is good
[we are talking about 2.2]
jo: i thought the mandatory heuristics mean that a no tranform is
implied
... but it is not
<Jo> PROPOSED RESOLUTION: Ref LC-2050 RESOLVE NO to expanidng the
definitions and leave defininitons in place
<rob> +1
<SeanP> +1
RESOLUTION: Ref LC-2050 RESOLVE NO to expanidng the definitions and
leave defininitons in place
CT - LC-2023 - charsets
[77]LC-2023
[77]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2023
Jo: i put in a note here [reading note]
... rather than what I was mandated to do
... resolution was already taken
CT - LC-2084 - Vary HTTP header
[78]LC-2084
[78]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2084
Jo: Resolution was taken
francois: I did provide this and can reprovide
... Jo has already reinserted it
... it was on receiving http headers
Jo: so no further action required
CT - LC-2047 - inter-proxy communication
[79]LC-2047
[79]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2047
[viewing the LC]
Jo: what did we resolve?
[viewing]
Jo: is this clear without a diagram?
... if I add one will it help?
... perhaps we should scrap the idea
EdC: is there a text on what it is called?
Jo: yes there is
[viewing]
1.3 Scope
Jo: [mumbles into his non existing beard as he reads the section
... no action]
CT - LC-2053 - preventing transformation of mobile Web pages
[80]LC-2053
[80]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2053
DKA: we clarified that yesterday
EdC: it seems closely linked ot hte normative heuristic
Jo: lets close it
CT - LC-2040 - 4.1.5.5 defines a protocol
[81]LC-2040
[81]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2040
Jo: LC-2040 done
DKA: should we send a note to the commenter?
francois: by the time we send the response we will be done
CT - LC-2044 - Web browsers identification
[82]LC-2044
[82]
http://www.w3.org/2006/02/lc-comments-tracker/37584/WD-ct-guidelines-20080801/2044
Jo is mumbling again
[viewing]
DKA: we do this
EdC: section 4.1.3 is completely different
francois: we discussed this in Mandeljeu
... we removed the normative part on detecting http browser request
... we are now talking about it in a normative way
Jo: the resolution then seems to have changed
... all done
CT - OPES reference
Jo: I put some wording in
... we need to review
... we were asked to note that we refer to IAB, about two party
consent
... which we did
... is not really dangling then
CT - Rotan's point
Jo: about the CT Doc missing a statement about role of main parties
...etc.
Jo: we used to say in the doc in previous version that the
principles operate similar to CSS
... in that the user can override
SeanP: I found the statement
... it was in June
<francois> [83]CT former draft with control
[83]
http://www.w3.org/2005/MWI/BPWG/Group/TaskForces/CT/editors-drafts/Guidelines/080606#sec-proxy-control
[viewing coupled with mumbling]
Jo: I thought we had something about CSS
<SeanP>
[84]http://www.w3.org/TR/2008/WD-ct-guidelines-20080414/#sec-control
-conflicts
[84]
http://www.w3.org/TR/2008/WD-ct-guidelines-20080414/#sec-control-conflicts
Jo: if nobody thinks it's useful lets move on
DKA: I think it would be useful in the intro
... especially with regard to respect to each others choices
<Jo> ACTION: Jo to write something in the introduction about respect
for CP prefgernces, respect for user preferences and the CP's
ultimate sanction on the degree of preference they are willing to
accommodate [recorded in
[85]http://www.w3.org/2009/03/26-bpwg-minutes.html#action06]
<trackbot> Created ACTION-930 - Write something in the introduction
about respect for CP prefgernces, respect for user preferences and
the CP's ultimate sanction on the degree of preference they are
willing to accommodate [on Jo Rabin - due 2009-04-02].
jo: done with this then
CT - Editorial notes
Jo: we have done some, just making sure...
4.1.5
Jo: goes back a long way....
... it is more likely that the accept header will cause heuristic
responses
... if we can say that alteration of the UA Header field doesn't
achieve anything then we can leave it
rob: it is hard to prove. Will be in the long tail.
Jo: if the web site adapts in response to the UA header then we
should not do anything with it. It is a user preference
rob: during the browser wars this became common place and they are
still there in the long tail
... it is not in mobile adapted pages
francois: is this just for 406 error code?
jo: if we say you can ignore 406 then what other mechanism do we
offer CPs?
... what we are doing is being helpful in saying that a site needs a
browser revision
... we may make it difficult for them
... for example for security reasons a CP may not want to serve
content
... if with a 406 you rewrite the header, what can the CP do?
DKA: so legitimate uses of 406...
francois: a bit different from the note here
SeanP: this sounds theoretical
EdC: I have done this...and with a bank
... they did not want to take liability with anything else
francois: is one way out to not allow to change the UA ?
Jo: I don't think it works
DKA: can we say don't pay attention to 406?
Jo: if the CP does not want to serve content to a particular device,
proxy etc. what do we anticipate them to do to signal that
DKA: ideally send a 406, in reality an errorpage with 200 code
... it is up to the provider or CT proxy provider
rob: in a case where they really don't want to, won't they send a
403?
Jo: we must be careful not remove choices for CPs
... so we should put a note on using 403 in there
<Jo> ACTION: Jo to insert informative text in the relevant aqppendix
describing the use of 403 in declining to server content because of
security concerns or whatever [recorded in
[86]http://www.w3.org/2009/03/26-bpwg-minutes.html#action07]
<trackbot> Created ACTION-931 - Insert informative text in the
relevant aqppendix describing the use of 403 in declining to server
content because of security concerns or whatever [on Jo Rabin - due
2009-04-02].
<Jo> ACTION: Jo to specify what he means by the USer Agent editorial
note under 4.1.5 [recorded in
[87]http://www.w3.org/2009/03/26-bpwg-minutes.html#action08]
<trackbot> Created ACTION-932 - Specify what he means by the USer
Agent editorial note under 4.1.5 [on Jo Rabin - due 2009-04-02].
Jo: 4.1.6.1
about the via header
francois: it just shows that there is a CT proxy active
Jo: ok
4.2.9
no it is 4.2.7
Jo: need to do some reorganizing here
4.2.8
Jo: do we also mean other legacy WML content?
francois: in the rest we don't talk about other types, but yes do
mean it
EdC: you can only determine the type, but you can't look in it
Jo: remain silent on it then
5.0
seungyun: this section is fine for me (had a question regarding an
older version(
Jo: if I am a CP and somebody has a problem with my content I want
to find out if they have a problem with my proxy
SeanP: operatos will deploy this...will they want to make it
available for anybody
Kai: CPs will not leave this open to the public
seungyun: is transformed content still mobileOK?
... it should be aligned with mobileOK
Jo: we have touched upon this and then stepped back from it.
Difficult to say something meaningful
seungyun: how do we test then?
Jo: we have a conformance claim against this document and the other
if you do transform you produce mobileOK content. It would not be
good to limit this by combining them.
francois: can you think of a wording to solve this?
Jo: no
SeanP: You can put in something like "reasonable"
<Jo> ACTION: Jo to propose text for section 5 referring to
"reasonable terms, timeliness, of access and so on, relating to the
use cases of bug determinations, testing and so on [recorded in
[88]http://www.w3.org/2009/03/26-bpwg-minutes.html#action09]
<trackbot> Created ACTION-933 - Propose text for section 5 referring
to \"reasonable terms, timeliness, of access and so on, relating to
the use cases of bug determinations, testing and so on [on Jo Rabin
- due 2009-04-02].
I think this section already expresses openness
<Jo> [reasonable and non-discriminatory]
[discussion this needing something to prevent unreasonable
hindrances to fulfillment]
Section E
no, D 1.3.2
Jo: this is about thematic consistency
... bottom line we have a muddle. We need to ask TAG how to apply
this or is the following correct...asking them to clear up the
muddle.
<Jo> ACTION: Jo to try to draft another doc to the TAG about D.1.3.2
[recorded in
[89]http://www.w3.org/2009/03/26-bpwg-minutes.html#action10]
<trackbot> Created ACTION-934 - Try to draft another doc to the TAG
about D.1.3.2 [on Jo Rabin - due 2009-04-02].
Jo: that's it
CT - OPES and two-party consent
rob: I have one more question. Can"t find the reference in OPES
about two party consent
francois: OPES states that we should aim at two party consent but
one party consent is enough
... there are other guidelines, from which Jo infered, that state
two party consent is needed
<francois>
[90]http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0052.htm
l
[90] http://lists.w3.org/Archives/Public/public-bpwg/2009Mar/0052.html
Jo: where to go with this?
EdC: we already did take a resolution on it
rob: the dialog around it mentions two party consent
Jo: I believe as we say later on that one party consent is not
enough. so what do they mean by "by itself"?
EdC: does only what opes says has value?
Jo: we can say more but should not contradict it
Summary of Action Items
[NEW] ACTION: Dan and Jeffs to wander the highways and byways of SVG
and Canvas and cook something up for the group's approval [recorded
in [91]http://www.w3.org/2009/03/26-bpwg-minutes.html#action01]
[NEW] ACTION: daoust to ascertain the availability of tests that
ensure that same origin policy conformance, when implemented in this
way, can be tested [recorded in
[92]http://www.w3.org/2009/03/26-bpwg-minutes.html#action02]
[NEW] ACTION: daoust to progress registration of the X- headers
irrespective his personal distate for the subject [recorded in
[93]http://www.w3.org/2009/03/26-bpwg-minutes.html#action05]
[NEW] ACTION: Jo to inser sections under proxy decision to transform
a. to specify SHOULD NOT in the presence of the features listed at
[94]http://www.w3.org/2009/03/10-bpwg-minutes.html and b. to include
the current cullets listed as heuristics [recorded in
[95]http://www.w3.org/2009/03/26-bpwg-minutes.html#action03]
[NEW] ACTION: Jo to insert informative text in the relevant
aqppendix describing the use of 403 in declining to server content
because of security concerns or whatever [recorded in
[96]http://www.w3.org/2009/03/26-bpwg-minutes.html#action07]
[NEW] ACTION: Jo to propose text for section 5 referring to
"reasonable terms, timeliness, of access and so on, relating to the
use cases of bug determinations, testing and so on [recorded in
[97]http://www.w3.org/2009/03/26-bpwg-minutes.html#action09]
[NEW] ACTION: Jo to specify what he means by the USer Agent
editorial note under 4.1.5 [recorded in
[98]http://www.w3.org/2009/03/26-bpwg-minutes.html#action08]
[NEW] ACTION: Jo to try to draft another doc to the TAG about
D.1.3.2 [recorded in
[99]http://www.w3.org/2009/03/26-bpwg-minutes.html#action10]
[NEW] ACTION: Jo to write something in the introduction about
respect for CP prefgernces, respect for user preferences and the
CP's ultimate sanction on the degree of preference they are willing
to accommodate [recorded in
[100]http://www.w3.org/2009/03/26-bpwg-minutes.html#action06]
[NEW] ACTION: Jo tpo preface the first sentence in 4.1.5 with Aside
from the usual procedures defined in [RFC 2616 HTTP] [recorded in
[101]http://www.w3.org/2009/03/26-bpwg-minutes.html#action04]
[94] http://www.w3.org/2009/03/10-bpwg-minutes.html
[End of minutes]
Received on Monday, 30 March 2009 12:36:48 UTC