World: r3wp
[Plugin-2] Browser Plugins
older newer | first last |
Graham 4-May-2006 [225] | say I have a farm of pcs running some seti like application and rebol using the browser plugin with lns to send the results back to a server. |
BrianH 4-May-2006 [226] | You can do a lot in those restrictions - look at Google. Beyond that, that's what the SDK would be for - not because of the source obscuring as much as so that the developer of scripts that can access your system could be tracked through your license. |
Graham 4-May-2006 [227] | I can't ... |
BrianH 4-May-2006 [228] | You can't afford the SDK? |
Graham 4-May-2006 [229x5] | I have the sdk/command. |
I want to use the browser to deliver full applications. | |
Say I have thin clients only? | |
ie. browser based clients. | |
with only a little flash ram for storage. | |
BrianH 4-May-2006 [234] | If the browser plugin is doing the distributed computing work, the result sets could be sent to the server under the restrictions I propose. |
Graham 4-May-2006 [235] | but if another library were doing the work? |
BrianH 4-May-2006 [236x3] | What we may need is a way to partially encap scripts: - Encrypt them using the SDK licensee's key in a way that can be decrypted by the plugin and traced to the licensee. - Decrypt them with RT's plugin rather than bundling them with native code. - Prompt when loading them the first time, perhaps with company info like IE does with ActiveX controls. - Give encapped scripts a sandbox directory like rebsite scripts. - Let these scripts do what they must, knowing that if they are malicious you know who to sue. |
Anonymous scripts shouldn't be able to do any more to your system than JavaScript in the browser can. | |
Browser plugin updates could do the equivalent of certificate revocation for malicious licensees too. | |
Anton 4-May-2006 [239] | I agree with Brian here. Opening doors should be done carefully. |
Henrik 4-May-2006 [240] | I'm just worried about the "evil" network access that Rebol can do in the background, which you can't see in the browser, but need sniffers to see. A method for showing network access needs to be really solid. |
Graham 4-May-2006 [241x4] | Henrik ..every application that you install has potentially the ability to do network access. |
I have no idea what my anti-virus products do. | |
but they constantly access the net, presumably looking for updates. | |
I don't think Rebol should be thought of any worse than a program written in C. | |
Henrik 4-May-2006 [245] | how do java applets do it? |
Graham 4-May-2006 [246] | No idea. |
PeterWood 4-May-2006 [247x2] | Basically, Java Applets and JavaScript have no access to local files. |
Java Applets can be digitally signed and you can grant "trusted applets" local access. I'm not sure how much this is used and whether people really grant trusted access. | |
Henrik 4-May-2006 [249] | it's used here a lot for online banking to fetch a locally stored key on disk |
PeterWood 4-May-2006 [250] | So Henrik, do you trust your bank to have access to your local files? |
Henrik 4-May-2006 [251x4] | most banks here use java for logging onto the bank |
I guess I do. It's cheaper than having to drive 7 km to pay some bills. :-) | |
there is another issue which is to the advantage of the applet: if it was not known as trustworthy, no one would use it. | |
peter, there is in fact one bank which issues color coded papercards instead of codes. it's also the only bank which is almost completely cross platform, since they don't use java. | |
PeterWood 4-May-2006 [255] | That's true. |
Henrik 4-May-2006 [256x2] | if there is a breach in bank security it's all over the news immediately |
but.. we're not all banks | |
PeterWood 4-May-2006 [258] | Personally, I'd be very cautious to allow any third-party to have "trusted access" to my machine. I'm the sort of person who turns off any type of automated updating. |
Henrik 4-May-2006 [259x2] | the problem is that turning such things off, automatically makes educating users on how to use a specific service, much more expensive |
a paradox is also that many of these services only work in IE, a notoriously insecure browser :-) | |
Allen 4-May-2006 [261] | I put a few of the usual suspects up.. http://www.rebolforces.com/plugin/rotate.htm http://www.rebolforces.com/plugin/reblox.htm http://www.rebolforces.com/plugin/psquares.htm |
BrianH 4-May-2006 [262] | Java applets and JavaScript scripts are usually only allowed to access their own server over the network. I think you can make that same restriction to REBOL using the secure native. |
Allen 4-May-2006 [263] | I note that if I browse from one page to the next (using links at bottom of each page) , the subsequent pages won't load .. |
Henrik 4-May-2006 [264x2] | allen, yeah, it's a known bug :-) |
brian, the only method to access something locally would be through cookies? | |
BrianH 4-May-2006 [266x3] | Without prompting the user, cookies and JavaScript. Perhaps REBOL could prompt for any additional files it needed to access using a standard file open dialog (by standard I mean native). |
Anything more would require a cryptographically signed script, traceable to your SDK license key, and thus to you. | |
I think that anonymous scripts shouldn't even get a sandbox directory. | |
Henrik 4-May-2006 [269] | and so, what about attempts to run it outside the browser? I'm thinking licensed scripts that someone figured out to download separately and tries to run it directly in REBOL/View. I'm not sure how much of an issue this is, but it's a first step towards reverse engineering. |
BrianH 4-May-2006 [270] | Anonymous script source should be just as visible as JavaScript source. SDK scripts can be encrypted, but traceable. Safety. |
Allen 4-May-2006 [271x2] | why not a sandbox for anonymous, Brian? as long as its is the only place, lock down no read or write outside it. Widgets, flash, google earth etc all allow state & cache in sandbox |
apple and konfabulator widgets would not be as numerous if signing was required for scripts | |
BrianH 4-May-2006 [273] | Henrik, if someone wants to run an anonymous browser script in /View they are welcome to try, but the browser integration won't be there so the script may not work. |
Henrik 4-May-2006 [274] | something else entirely: should there be a more REBOLish way to access the browser DOM tree? |
older newer | first last |