r3wp [groups: 83 posts: 189283]
  • Home
  • Script library
  • AltME Archive
  • Mailing list
  • Articles Index
  • Site search
 

World: r3wp

[Plugin-2] Browser Plugins

Volker
15-Jun-2006
[1137x2]
yes, and remembering such things. maybe asking on start to allow 
access to last session. if denied sandbox is cleared.
that is one extra click
BrianH
15-Jun-2006
[1139x2]
Volker, I agree that some graphics-heavy scripts could use local 
storage. Those scripts could easily be signed though.
There should also be a way to provide access to the browser's objects. 
The browser already caches those, and that cache is managed by code 
that the user is already trusting.
Volker
15-Jun-2006
[1141x2]
signing needs keys. then we need a free registry if we want all the 
newcomers to have fun.
and allowing access based on url is IMHO the most natural way.
BrianH
15-Jun-2006
[1143]
Actually, there is a lot that you can do even within those restrictions. 
Just look at Flash.
Volker
15-Jun-2006
[1144x3]
but there could be done more :)
speciallly when things start. later onecan optimize, but thefirst 
 protoype-bitmaps can be large.
and if you cancel "reuse last session" and check "forever" you are 
pretty much anonymous.
BrianH
15-Jun-2006
[1147]
Well then, the question you should consider when thinking about newbies 
is this: What would you let your worst enemy do with your computer? 
This is the web. We aren't talking about saints here - we are talking 
about people who use baner ads to install spyware.
Volker
15-Jun-2006
[1148]
I did ask. cant see doors for banner-adds nor spyware.
BrianH
15-Jun-2006
[1149]
Banner ads are on web pages. You can make banner ads with Flash, 
and that is less dangerous than the current plugin.
Volker
15-Jun-2006
[1150x2]
files are a risk to privacy if they cant be blocked. that reuse-question 
does this. and they can be prepared to be run, eg called *.exe and 
hoping the user some day clicks on them. so i suggest a wrapper, 
maybe store everything as rebol[]#{stuff} or in a single zip or something.
i thought we talk about local storage. what has that to do with banner-addds?
Pekr
15-Jun-2006
[1152]
wouldn't e.g. local storage limited to say 20 MB be sufficient "security"? 
Hmm, should read that Flash security doc first probably :-)
BrianH
15-Jun-2006
[1153x2]
As I've mentioned here before, there many nasty things you can do 
with the present plugin and I don't want to make suggestions on a 
web-public group. Go private if you want some ideas - I trust you 
not to misuse them.
I read the Flash security doc, and it has many good ideas. I'm still 
a little iffy about it providing cookies to anonymous scripts without 
providing a management interface - that's why I still use FlashBlock.
Pekr
15-Jun-2006
[1155]
how can cookie harm you?
BrianH
15-Jun-2006
[1156x2]
I mean Flash cookies - browser cookies do have a management interface.
Cookies can be used to track your movements, and can be used as persistent 
distributed storage.
Pekr
15-Jun-2006
[1158]
I trust you gurus for proper security concerns, however let's not 
forget us - the end users, where over complication does not work. 
Even Vista is being reduced in such regard - way too many obtrusive 
security requestors to users. In other words, - don't bother end 
user with questions he knows sh*t about their meaning anyway:-)
BrianH
15-Jun-2006
[1159]
Imagine if Google used the plugin for their ads - they would be able 
to store their whole database distributed amongst the computers of 
everyone on the internet. Would a security requestor be able to explain 
that to a newbie?
Pekr
15-Jun-2006
[1160]
no
BrianH
15-Jun-2006
[1161]
The advantage to cryptographic signing isn't just being able to track 
down an author, it also allows certificate revocation. With a free 
registry, revocation wouldn't matter - the bad guys would just register 
again.
Pekr
15-Jun-2006
[1162]
askiing user e.g. what you discussed here - "do you want your previous 
cache to be deleted?" would result to "What is cache?" in 99% and 
users would press "Yes" .... or "no" .... :-)
BrianH
15-Jun-2006
[1163]
This is why it would be best to use the browser cache for "let me 
store some graphics so I won't have to download them every time" 
situations. Other user settings are small in comparison, and can 
easily be stored in browser cookies or server side. Then, no security 
requestors necessary.
Pekr
15-Jun-2006
[1164x2]
then we need to investigate ways of how to better utilise do-browser 
...
are we able to get to such browser settings in some unified way, 
so the same script works in all browsers?
BrianH
15-Jun-2006
[1166x2]
You could write *-thru functions that used the browser to do the 
reading, with its cache.
read-thru, load-thru, etc., just like View uses for its sandbox.
Pekr
15-Jun-2006
[1168]
hmm, that needs to be part of our user code. Not sure Carl will want 
to have two different versions of mezzanines - View, and plug-in 
one ...
BrianH
15-Jun-2006
[1169]
There are two dlls here you know, the plugin calls the View dll. 
The browser-specific stuff is in the different plugin dlls.
Pekr
15-Jun-2006
[1170]
my understanding is that it is the C code, wrapper for the browser. 
It would have to call View dll with some packed-in rebol code then 
to "preconfigure/patch" some mezzanine code ...
BrianH
15-Jun-2006
[1171x3]
Sure. Not hard at all - I expect it must do something similar to 
mak do-browser available.
You could probably implement port schemes for cookies:// and cache:// 
right now using mezzanine code wrapped around do-browser that would 
do the trick quite nicely. Then, all you would need to do is assign 
cache:// to view-root and the existing functions would work.
Which brings to mind a question: What JavaScript types get converted 
to REBOL types when returned by do-browser?
Allen
15-Jun-2006
[1174x2]
Doesn't url based security limit the ability to do clientside mashups 
from multiple services?
One of the attractions for having a smart client in the browser means 
I can distribute tasks to it, instead of the server. But I url based 
security is a dampener on that. It's the reason why flash has stumbled, 
as javascript based mashups flourish
Volker
15-Jun-2006
[1176x3]
That limiting is the idea. Allowing someone to  mashup with some 
code from your bank -accaount is not the best idea. As feature yes, 
but unknown and as default?
Brian, where is the difference between a browser-cache and a selfmade 
one?
And i was discussing plugin2, not the way the sandbox works now.
BrianH
15-Jun-2006
[1179]
Allen, do you mean clientside mashups like these?:
- DDOS zombies
- Spam relays
- P2P relays
- Anonymous proxies

So, which of these do you want a webbug written in REBOL or Flash 
to be able to do?
Graham
15-Jun-2006
[1180]
p2p relay
BrianH
15-Jun-2006
[1181x3]
Volker, the advantages to the browser cache are:
- There is already a management interface

- There are security restrictions as to what can be done with the 
content

- You can't count on data in the cache to stay there, it is a cache, 
not storage


We don't want persistent storage that can be used without permission, 
not without being able to track down the one using it. There are 
whole classes of data, the presence of which on your computer can 
get you arrested in the US and other countries, and you can't count 
on the assumption of innocence when the ones who find the data may 
not be technical enough to understand the difference. There are documented 
cases of people getting arrested for having someone else's child 
pornagraphy on their computers, and having their lives ruined as 
a result.
Graham, you want a p2p relay in a webbug?
Allen, Javascript has even more restrictions on its network abilities 
than Flash.
Anton
16-Jun-2006
[1184]
I think you guys ought to trust what BrianH is saying a little more. 
I throw all my support behind what Brian is saying here, and I also 
think there are a lot of things being repeated which have already 
been explained several times. I like the current direction the plugin 
seems to be heading.
Pekr
16-Jun-2006
[1185x2]
Security is cool to have, just please keep in mind one thing - let 
it be Rebol, not anything else. So, if I am able to store my stuff 
with Rebol, I want to be with plug-in, or it is not rebol for me 
anymore. Then I expect *-thru functions at least, to use browser 
cache at least. That thing I may regard as decided, as Anton says, 
we should support Brian with secure way.
Other thing, however, is - how far we go? Thinking in that manner, 
we can easily end up with conclusion, that we should use ONLY browser 
networking capabilities - once again - that is not rebol for anymore. 
On one hand, we would like browsers SSL to be used (imo only because 
rebol itself is badly missing here), on other hand - who wants to 
give-up rebol networking? I can understand it eventually makes sense 
security wise, as who wants your plug-in to open tcp listen port 
on your machine? I see it imediatelly as similar problem to local 
file storage (although eventually catched by firewall)