- From: Brad Porter <brad@tellme.com>
- Date: Mon, 12 Feb 2007 13:59:22 -0800
- To: Chuck Wade <Chuck@Interisle.net>
- Cc: public-wsc-wg@w3.org
- Message-ID: <45D0E33A.8090409@tellme.com>
Even though you said "Ah" and "Except" in a few places, I think we agree
on all the points below. The only difference below is I do include the
Mac menu bar in "window chrome" given I consider it part of the OS
window manager and therefore it meets the definition I provided.
The piece we're missing is the definition of browser. Here's my proposal...
browser -- any combination of services that together provide an
interactive user experience by performing HTTP and HTTPS fetching,
markup parsing, and output formatting of content to a user.
Given this definition, I'm not sure it matters where which piece is
performing which function.
--Brad
Chuck Wade wrote:
> Brad Porter wrote:
>>
>> These are a good set of questions to use to test the two definitions
>> I suggested:
>>
>>> window chrome -- visual elements used by Desktop browsers or the OS
>>> window manager to surround the web page
>>>
>>> browser-controlled presentation elements -- any user interface
>>> presentation controlled explicitly by the browser and not under
>>> direct web page control
>>
>> Tests below...
>>
>> Chuck Wade wrote:
>>> Brad, et al,
>>>
>>> [snip...]
>>>
>>> 2. What about the menu bar? Here we need to be careful that we don't
>>> get caught up in the OS wars.
>> The menu bar is "window chrome". Window chrome is a type of
>> "browser-controlled presentation element".
> Ah, but if you use a Mac, the menu bar is OS chrome. Even the
> application menu elements are under the control of the Mac OS.
> Different strokes for different folks.
>>>
>>> 3. Speaking of the OS wars, should we at least consider the
>>> relationship of the OS to the browser? After all, the more
>>> complete trust relationship is User => OS => Browser => Web.
>> I think the user trust relationship is still with the browser, but
>> the browser has a dependency on the OS.
>>
>> Historically, the user has not expected the OS to make any statements
>> about network resources and HTTP has been at a layer slightly above
>> the OS consideration.
> This distinction is getting blurred, and perhaps we should also
> consider what the optimal assignment of responsibilities should be.
> For one thing, the certificate trust stores have been moving into the
> OS realm, and user management of certs and password vaults is
> increasingly moving out of the browser. To cite one example, the
> popularity of RoboForm as a means for managing passwords and forms
> autofill across multiple browsers on the same OS is shifting the focus
> of user trust to other system modules besides the browser.
>>> Let's
>>> be real, the interaction between the OS and the browser has been a
>>> contentious issue of the past, and it's likely to remain so in the
>>> future.
>> Historically, the OS has largely punted and left security context
>> presentation information for network resources to the application.
>> This seems to be changing to some extent with Windows Vista.
> And also with new versions of the Mac OS and new Linux distros. I
> brought this point up because it seems that there are some fundamental
> shifts taking place in what parts of the system manage presentation of
> security context.
>>> Would we be putting our heads in the sand if we ignore
>>> this issue? It is the OS that controls the display in the first
>>> place, and OS vendors already leverage this point of control
>>> within the browser context to their own advantage, but also to the
>>> advantage of users.
>> I think it is a fair question to ask who is responsible for
>> presenting security context information -- the browser or the OS. We
>> may need a definition of browser to complete this mix. As OSes begin
>> to incorporate more HTTP and XML rendering into their core
>> capabilities, they become browsers.
>> However, I think much of our security context consideration may be
>> able to remain agnostic to whether the browsing functionality comes
>> from the OS or an application.
> I completely agree. However, I think WSC may have to expand it's focus
> if we are to avoid irrelevance in a changing environment.
>
> By the way, the browser can also be embedded in other applications. As
> an example, you've been able to use Adobe Acrobat as a browser within
> a pdf document context for a long time. I've done major web research
> entirely within Acrobat at times. This capability will probably show
> up in the next version of Microsoft Office (and it's also part of
> IBM's Notes). We also see examples of Mozilla's Gecko engine,
> Konqueror, and Apple's Safari embedded within other application
> contexts providing full Web browsing capabilities, but within a
> different user context. Sometimes the users don't even realize they're
> browsing (e.g., Apple's iTunes Music Store).
>>> 4. Should there be standard conventions for how to display the state
>>> of browser content controls within the default window frame
>>> "chrome" areas? (e.g., popups currently blocked) Can we keep this
>>> from leading to another round of toolbar mania?
>> I think that is what the group is trying to do. I'm not convinced
>> that it should be withing "window chrome", but certainly we're trying
>> to standardize how that information is presented in the
>> "browser-controlled presentation elements."
> There may also be important connections to define between the
> indicators and buttons that are in the "window chrome" with
> "browser-controlled presentation elements" that extend the browser's
> ability to interact with the user.
>>>
>>> 5. Can any of this be made understandable to users? Aside, I contend
>>> that users will make the effort to understand and become facile
>>> with what matters to them and their browsing experience, but not
>>> necessarily what browser vendors or Web site content developers
>>> think should matter to users.
>> That is clearly the core problem we're trying to solve.
> Yep.
>>>
>>> 6. Is there a way to factor out a lot of the confusing knobs, dials,
>>> and indicators, and get to some simple "idiot-proofed" controls
>>> (analogous to "idiot lights" on an automobile dashboard). Here's
>>> where the "safe browsing" mode could come into play--a
>>> comprehensible mode that eliminates a lot of the clutter, but
>>> establishes confidence in the user that they can reasonably
>>> determine whether or not to trust what's in front of their face.
>> "Safe browsing" mode is one potential model for representing security
>> context information, but not the only one. I also refer to my
>> earlier post, where it appears that the only thing we may really need
>> to safeguard is the submission of data. Having an entire browser
>> mode dedicated to making sure that a form submit is secure seems
>> perhaps overkill.
> For the most part I agree with you, and with the points you made in
> your earlier post. I referenced the "safe browser mode" to help
> illustrate the point about reducing complexity. However, I do think
> there are some issues of trust that relate only to the presentation of
> information, not just the submission of information. For example, a
> phraudster might try to convince victims that their 401k accounts had
> been wiped out as a prelude to getting them to call a telephone number
> where the nice person will take all their information to "fix" the
> problem. In general, as people become more reliant on the information
> they receive through their browsers, the ability to gain confidence in
> the veracity of both the source and the content will become
> increasingly important.
>>>
>>> 7. Where do we draw the distinction between browser controls (whether
>>> or not within the chrome) and controls associated with other
>>> content presentation tools within the same Web page? (e.g.,
>>> Acrobat, Flash, RealMedia, QuickTime, WM.) How would users like
>>> for these controls to be presented? Should we care?
>> The important point which you make above is that the user needs to
>> establish trust to the browser clearly. Therefore the browser needs
>> to clearly differentiate the "browser-controlled presentation
>> elements" from any other presentation elements displayed by the web
>> page or any plugin.
> Except that most browsers don't do this today, nor do they provide the
> user with an ability to ascertain what content presentation tools are
> controlling the display of information on their screens. While
> seamless integration of various content presentation tools can be
> useful, it can also be a source of some troubling vulnerabilities.
>>
>> --Brad
>>
> ...Chuck
Received on Monday, 12 February 2007 21:59:31 UTC