- From: Adam Barth <w3c@adambarth.com>
- Date: Mon, 23 Feb 2009 12:29:47 -0800
- To: Eran Hammer-Lahav <eran@hueniverse.com>
- Cc: Breno de Medeiros <breno@google.com>, Ben Laurie <benl@google.com>, Mark Nottingham <mnot@mnot.net>, "www-talk@w3.org" <www-talk@w3.org>
On Mon, Feb 23, 2009 at 12:04 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> And I am already aware of one effort looking to add a trust layer to
> host-meta.
This seems heavy handed for dealing with very simple threats.
> Your suggestion of competing solutions fails simple test. It is
> easier to make the use of host-meta more restrictive (perhaps as you
> suggested) than invent a completely new one.
It's easier to build a secure metadata store by designing the store
with security in mind instead of trying to patch an existing insecure
store.
> Nothing in host-meta prevents you from implementing these restrictions
> (content type, redirections).
Let's imagine I have the following API for interacting with the host-meta store:
String getHostMetaValue(URL resource_url, String host_meta_key)
As an application programmer, its my job to use this API (i.e.,
host-meta) to implement, say, default charsets. I make the following
API call:
var default_charset =
getHostMetaValue("http://tinyurl.com/preview.php", "Default-Charset");
Sadly, I can't use this API for this application because I'll get
hacked by redirects.
> By itself, host-meta includes no sensitive
> information or anything that can pose a threat. That will come from
> applications using it as a facility, just like they use HTTP.
So host-meta can wash its hands of all security concerns?
> We view standards architecture in a very different way. I want to create
> building blocks and only standardize where there is an overwhelming value in
> posing restrictions.
The end result will be that people who care about security won't use
host-meta. We'll invent our own secure-meta that makes it easy to
store meta-data securely.
Adam
Received on Monday, 23 February 2009 20:30:26 UTC