- From: Philippe Le Hegaret <plh@w3.org>
- Date: Thu, 04 Jun 2015 09:10:04 -0400
- To: public-web-perf <public-web-perf@w3.org>
Available at http://www.w3.org/2015/06/03-webperf-minutes.html Web Performance 03 Jun 2015 Attendees Present Ilya, Yoav, Michael, NicJ, Todd, Plh Regrets Chair Ilya Scribe yoav Contents * [2]Topics 1. [3]When are new entries delivered to observer? 2. [4]Timing attacks 3. [5]Extend getEntries to allow attribute filtering 4. [6]workerStart 5. [7]secureConnectionStart should account for non-HTTPS secure transports 6. [8]Make secureConnectionStart a mandatory attribute 7. [9]What value should secureConnectionStart have when using preexisting connection? * [10]Summary of Action Items __________________________________________________________ Ilya: registry discussion <Ilya> [11]Is there a plan to add content type (e.g webp) and content length in the performance resource timing records? [11] https://twitter.com/annevk/status/605503229292453889 When are new entries delivered to observer? NicJ: Soasta are interested in getting an event when resource timing entry has started Todd: that may have privacy implications for third party content Todd/Ilya: Although it may be privacy implications, we already reveal duration for TOR. yoav: You'd get TAO headers after the event started, so that's an issue <plh> [12]When are new entries delivered to observer? [12] https://github.com/w3c/performance-timeline/issues/13 Ilya: We'll followup on GH with an issue with use-cases, and look into the fetch registry Timing attacks <plh> [13]Timing attacks [13] https://github.com/w3c/hr-time/issues/4 plh: Did you guys talk to your security teams? Todd: timing attack come out quite often and require a lot of effort ... They're usually very difficult since they're related to specific HW and SW so difficult to use en masse Ilya: one of the security folks is in touch with that team and has a dialog with them ... perhaps we should acknowledge that in the spec, but it's not clear we should change the precision of the timer Todd: As long as we didn'tprove there's a real attack here, the timer shouldn't change ... "real attack" == "without controlling the HW" Ilya: should we reference that in the spec? Todd: I don't know if we should reference it <plh> [14]HRT Privacy and Security [14] http://w3c.github.io/hr-time/#sec-privacy-security plh: HR time does reference the subject in general Ilya: Maybe this section is enough plh: we can close the issue for now, and see if there's further information later on Todd: I'll take care of it and reply on the list Extend getEntries to allow attribute filtering <plh> [15]getEntries [15] https://github.com/w3c/performance-timeline/pull/11#issuecomment-107695115 Ilya: Most of the attributes are timestamps, and getting entries based on them makes little sense plh: It would make sense to group based on initiatorType Ilya: we would also have fetchID that we would be able to filter by, which would also apply to server timing <scribe> ACTION: Ilya to update PR to use a type dictionary and mail the list for feedback before landing workerStart <plh> [16]Clarify "zero time" in Workers [16] https://github.com/w3c/resource-timing/issues/23 <Ilya> [17]rough proposal [17] https://lists.w3.org/Archives/Public/public-web-perf/2015Jun/0019.html Ilya: There's a proposal to move the start time to the time that the worker was first referenced from the page ... so that the workerStart for the same sharedWorker would be different for different referencing pages ... would appreciate some more feedback and more eyes on this secureConnectionStart should account for non-HTTPS secure transports Todd: Next item issue 14 - Resource timing should also account for secure non-HTTPS <Todd> [18]secureConnectionStart should account for non-HTTPS secure transports [18] https://github.com/w3c/resource-timing/issues/14 <Todd> [19]Convert HTTPS to secure transport to ensure it is recorded for secure transport [19] https://github.com/w3c/resource-timing/issues/15 Todd: Reworded the spec to account for that ... so we can close the issue Make secureConnectionStart a mandatory attribute <Todd> [20]Make secureConnectionStart a mandatory attribute [20] https://github.com/w3c/resource-timing/issues/16 Ilya: Any objections to making this attribute mandatory? plh: no objections from me yoav: no objections from me What value should secureConnectionStart have when using preexisting connection? <Todd> [21]What value should secureConnectionStart have when using preexisting connection? [21] https://github.com/w3c/resource-timing/issues/17 Todd: ConnectionStart says this: If a persistent connection [RFC7230] is used or the resource is retrieved from relevant application caches or local resources, this attribute MUST return value of domainLookupEnd. ... We could use the same language for secureConnectionStart. I'll take that upon myself Summary of Action Items [NEW] ACTION: Ilya to update PR to use a type dictionary and mail the list for feedback before landing [End of minutes]
Received on Thursday, 4 June 2015 13:10:12 UTC