r3wp [groups: 83 posts: 189283]
  • Home
  • Script library
  • AltME Archive
  • Mailing list
  • Articles Index
  • Site search
 

World: r3wp

[Plugin-2] Browser Plugins

BrianH
15-Jun-2006
[1167]
read-thru, load-thru, etc., just like View uses for its sandbox.
Pekr
15-Jun-2006
[1168]
hmm, that needs to be part of our user code. Not sure Carl will want 
to have two different versions of mezzanines - View, and plug-in 
one ...
BrianH
15-Jun-2006
[1169]
There are two dlls here you know, the plugin calls the View dll. 
The browser-specific stuff is in the different plugin dlls.
Pekr
15-Jun-2006
[1170]
my understanding is that it is the C code, wrapper for the browser. 
It would have to call View dll with some packed-in rebol code then 
to "preconfigure/patch" some mezzanine code ...
BrianH
15-Jun-2006
[1171x3]
Sure. Not hard at all - I expect it must do something similar to 
mak do-browser available.
You could probably implement port schemes for cookies:// and cache:// 
right now using mezzanine code wrapped around do-browser that would 
do the trick quite nicely. Then, all you would need to do is assign 
cache:// to view-root and the existing functions would work.
Which brings to mind a question: What JavaScript types get converted 
to REBOL types when returned by do-browser?
Allen
15-Jun-2006
[1174x2]
Doesn't url based security limit the ability to do clientside mashups 
from multiple services?
One of the attractions for having a smart client in the browser means 
I can distribute tasks to it, instead of the server. But I url based 
security is a dampener on that. It's the reason why flash has stumbled, 
as javascript based mashups flourish
Volker
15-Jun-2006
[1176x3]
That limiting is the idea. Allowing someone to  mashup with some 
code from your bank -accaount is not the best idea. As feature yes, 
but unknown and as default?
Brian, where is the difference between a browser-cache and a selfmade 
one?
And i was discussing plugin2, not the way the sandbox works now.
BrianH
15-Jun-2006
[1179]
Allen, do you mean clientside mashups like these?:
- DDOS zombies
- Spam relays
- P2P relays
- Anonymous proxies

So, which of these do you want a webbug written in REBOL or Flash 
to be able to do?
Graham
15-Jun-2006
[1180]
p2p relay
BrianH
15-Jun-2006
[1181x3]
Volker, the advantages to the browser cache are:
- There is already a management interface

- There are security restrictions as to what can be done with the 
content

- You can't count on data in the cache to stay there, it is a cache, 
not storage


We don't want persistent storage that can be used without permission, 
not without being able to track down the one using it. There are 
whole classes of data, the presence of which on your computer can 
get you arrested in the US and other countries, and you can't count 
on the assumption of innocence when the ones who find the data may 
not be technical enough to understand the difference. There are documented 
cases of people getting arrested for having someone else's child 
pornagraphy on their computers, and having their lives ruined as 
a result.
Graham, you want a p2p relay in a webbug?
Allen, Javascript has even more restrictions on its network abilities 
than Flash.
Anton
16-Jun-2006
[1184]
I think you guys ought to trust what BrianH is saying a little more. 
I throw all my support behind what Brian is saying here, and I also 
think there are a lot of things being repeated which have already 
been explained several times. I like the current direction the plugin 
seems to be heading.
Pekr
16-Jun-2006
[1185x2]
Security is cool to have, just please keep in mind one thing - let 
it be Rebol, not anything else. So, if I am able to store my stuff 
with Rebol, I want to be with plug-in, or it is not rebol for me 
anymore. Then I expect *-thru functions at least, to use browser 
cache at least. That thing I may regard as decided, as Anton says, 
we should support Brian with secure way.
Other thing, however, is - how far we go? Thinking in that manner, 
we can easily end up with conclusion, that we should use ONLY browser 
networking capabilities - once again - that is not rebol for anymore. 
On one hand, we would like browsers SSL to be used (imo only because 
rebol itself is badly missing here), on other hand - who wants to 
give-up rebol networking? I can understand it eventually makes sense 
security wise, as who wants your plug-in to open tcp listen port 
on your machine? I see it imediatelly as similar problem to local 
file storage (although eventually catched by firewall)
Terry
16-Jun-2006
[1187]
although some storage for graphics-heavy things would be nice.

If you drop some flash you can have 10mb of storage without permission, 
and 100mb with.
Gabriele
16-Jun-2006
[1188]
I'm completely supporting Brian here too. REBOL is not popular enough 
to even remotely risking someone writing malware with it. All the 
anti-virus software in the world is just going to block REBOL if 
this happens.
[unknown: 9]
16-Jun-2006
[1189]
yup....
Sunanda
16-Jun-2006
[1190]
I'm late to the conersation, but I'm backing Brian too.

The plugin arena is not the desktop arena, and extra special rules 
must apply.
Volker
16-Jun-2006
[1191]
agreed. after all, if they want more, they can download the real 
app. but can have a quick first view by plugin.
JoshM
16-Jun-2006
[1192x5]
Wow, good discussion.
Regarding security: we are on the same page. We haven't finalized 
the final security plan (we're hoping to get a draft plan doc up 
soon)....but a key component of the overall plan is something we're 
calling "Trusted Scripts", which is an infrastructure for signing 
scripts to enable licensing, rsponsibility (who made this script), 
lower security settings (again, for signed scripts only), and /Pro 
features.
Default security model: Yes, this will be tight. Completely agreed 
here.
The cookie/cache idea is interesting. Need to think on that one a 
bit.
Here's a few components of Trusted Scripts (this is only a draft 
-- open for feedback):
	* Default security model is tight -- how tight is TBD.

 * Developers that want to take advantage of Trusted Scripts, i.e. 
 to lower security for a production app, first must buy a license.key 
 from RT.

 * license.key unlocks  "features" and "permissions". Features are 
 things like encryption within the script. Permissions include file 
 sandbox, domain restrictions, dll loading permissions, etc.

 * license.key will contain contact info, so we can track down the 
 author of a malicious signed script if necessary.
Volker
16-Jun-2006
[1197]
Sounds in line with sdk: features for money. and you get some identity-check 
by money, good too. But you need something for the user to know what 
he is going to use. with url that is simple: stuff on this page. 
with signing its quite obfuscated. Shall i allow everything which 
RT gives a thumb up? Or are certicitates hardwired to domains?
JoshM
16-Jun-2006
[1198]
Volker, good point. We may also provide a certificate verification 
dialog, i.e. "Joe Shmo from company XYZ produced this verified REBOL 
script. Would you like to allow it to run?" or something to that 
effect....I'm not positive here....just tossing ideas out there.
Henrik
16-Jun-2006
[1199]
who provides verification?
JoshM
16-Jun-2006
[1200]
REBOL Technologies.
Henrik
16-Jun-2006
[1201]
do they have time and resources to sift through thousands of expertly 
crafted scripts per day? (just being positive about a future scenario 
:-))
JoshM
16-Jun-2006
[1202x2]
We would not be verifying the script itself, we would be verifying 
the publisher. If the publisher signs a malicous script, we have 
detailed contact info to track him down.
That is the model used today in Authenticode and other code-signing 
technologies.
james_nak
16-Jun-2006
[1204]
http://www.rebol.com/plugin/web-plugin-install.htmlJosh, it that 
URL really supposed to auto load the plug-in? I'm getting an error 
when it actually tries to install it.
JoshM
16-Jun-2006
[1205x2]
We're, uh, working on that now :)
Are you running FireFox?
james_nak
16-Jun-2006
[1207]
Great. Thought it was me. Yes, FF
JoshM
16-Jun-2006
[1208]
Yes, we're looking into that now.
james_nak
16-Jun-2006
[1209x2]
No problem. Thanks.
Actually, pg-2 is not working in IE either. However, it seems to 
go farther; I see a box where the app should  appear but no app.
JoshM
16-Jun-2006
[1211]
james, in IE, do you see the information bar at the top of the page 
requesing your permission to install the plugin?
james_nak
16-Jun-2006
[1212]
In IE no. FF, yes, but install fails.
JoshM
16-Jun-2006
[1213]
We are pleased to announce a new release of REBOL/Plugin. This release 
includes several new features, including:

 * Multiple instance support -- you can now have up to 5 instances 
 within one IE process.

 * Automatic updating -- after this release, backwards-compatible 
 updates will come automatically with user consent (no uninstall required).
	* Smooth install for FireFox and Mozilla.org-based browsers

 *Now compatible with Opera and all Mozilla browsers compatible with 
 npruntime. 
	*do-browser now functions in Mozilla.
james_nak
16-Jun-2006
[1214]
It might be me. Let me uninstall first. I did this in FF but not 
IE. Hold on...
JoshM
16-Jun-2006
[1215x2]
To install the new plugin, please follow the steps listed at http://www.rebol.com/plugin/install.html.
Note: You MUST remove previous versions of the plugin before installing 
the new plugin. Please follow the steps in the above install guide.


Also, FireFox/Mozilla users: You MUST add rebol.com to your list 
of approved software installation web sites. Again, please follow 
the steps in the above install guide.