- From: Ian Melven <imelven@mozilla.com>
- Date: Tue, 29 Jan 2013 09:16:51 -0800 (PST)
- To: Neil Matatall <neilm@twitter.com>
- Cc: public-webappsec <public-webappsec@w3.org>, Eric Rescorla <ekr@rtfm.com>
Hi,
that's the item i was waiting to comment on last teleconference :)
Within Mozilla, we recently discussed something along the same lines for report-uri to replace
our current same eTLD+1 restriction on sending reports. The suggestion was that reports could be
sent to any host a la the spec, but then potentially privacy or security sensitive information
would only be included if the report was going to a same eTLD+1 host.
would this be useful to site implementers ? or would this essentially be the same
as the current restriction because all the available info is desired ?
i've been meaning to bring this up on the list before today's call, but flu :(
cheers,
ian
----- Original Message -----
From: "Neil Matatall" <neilm@twitter.com>
To: "Eric Rescorla" <ekr@rtfm.com>
Cc: "public-webappsec" <public-webappsec@w3.org>
Sent: Monday, January 28, 2013 6:36:17 PM
Subject: Re: Agenda for January 29 Teleconference
Did this item drop off from last time? Or has there been some consensus?
22:37 - 22:39 Line #s in CSP reports only for same-origin, CORS?
- Neil
On Monday, January 28, 2013 at 6:01 PM, Eric Rescorla wrote:
DATE: Jan, 29 2013
TIME: 22:00-23:00 UTC (14:00-15:00 PST)
+1.617.761.6200 ; PIN 92794 ('WASWG') and #webappsec on irc.w3.org:6665
(Or VoIP via the Zakim SIP bridge: http://www.w3.org/2006/tools/wiki/Zakim-SIP )
22:00 - 22:03 Scribe Selection (Default -> Eric Rescorla)
22:03 - 22:05 Roll Call
22:05 - 22:06 Minutes Approval
22:07 - 22:08 Agenda Bashing
22:08 - 22:09 News: CSP 1.0 to CR
22:10 - 22:15 Review of open actions in tracker
22:15 - 22:30 Review raised+open issues, assign actions
22:30 - 22:35 default-src violation types
http://lists.w3.org/Archives/Public/public-webappsec/2013Jan/0036.html
22:35 - 22:40 CSP and HSTS
http://lists.w3.org/Archives/Public/public-webappsec/2013Jan/0034.html
22:40 - 22:45 Defaults for clipping and selectors
http://lists.w3.org/Archives/Public/public-webappsec/2013Jan/0045.html
22:45 - 22:57 UI Safety ISSUE 2
"The restriction to a single additional host source value was
based on the request of the Websec WG as part of moving this
feature to this document. This decision should be evaluated in the
context of CSP. For example, while standalone implementations of
X-Frame-Options may not have wanted to incur the complexity of
parsing potentially large lists of origins, CSP implementaions
must already be robust in their handling of such lists. The
inclusion of multiple origins may reveal details of the security
model of a resource that chooses to publish such a policy and
risks associated with this should be discussed in the Security
Considerations section if any change is made."
22:57 - 23:00 Move of testing repos to github
http://lists.w3.org/Archives/Public/public-webappsec/2013Jan/0044.html
Scribe Rotation. We go down the list in order. Please advise if you
cannot scribe for some reason, or if you are not listed here and
should be.
Adam Barth
Jeff Hodges
David Huang
Gopal Raghavan
Eric Rescorla <--
Jacob Rossi
Tanvi Vyas
Peleus Uhley
Dan Veditz
Ryan Ware
Jim O'Leary
Adam Bresee
Ian Melven
Received on Tuesday, 29 January 2013 17:17:19 UTC