Re: Dan Stillman's concerns about Extension Signing

2015-11-30 Thread Dan Stillman
:52 PM, Ehsan Akhgari wrote: That sounds like a good idea to me as well. On 2015-11-30 11:25 AM, Gavin Sharp wrote: That's one of the suggestions Dan Stillman makes in his post, and it seems like a fine idea to me. Gavin On Mon, Nov 30, 2015 at 11:15 AM, Jonathan Kew wrote: On 30/11/15 1

Re: Dan Stillman's concerns about Extension Signing

2015-11-30 Thread Dan Stillman
On 11/30/15 6:24 AM, Gijs Kruitbosch wrote: On 28/11/2015 19:42, Dan Stillman wrote: As for what, if anything, should block release without override, I'm happy to talk specifics, but we can't have a discussion about that without even agreeing on the point of the validator, Why do

Re: Dan Stillman's concerns about Extension Signing

2015-11-28 Thread Dan Stillman
On 11/28/15 8:28 PM, Mike Hoye wrote: To Ehsan's point that "malicious code here might look like this: console.log("success"); [and] It's impossible to tell by looking at the code whether that line prints a success message on the console, or something entirely different, such as running calc.ex

Re: Dan Stillman's concerns about Extension Signing

2015-11-28 Thread Dan Stillman
On 11/28/15 2:30 PM, Kartikaya Gupta wrote: So it seems to me that people are actually in general agreement about what the validator can and cannot do, but have different evaluations of the cost-benefit tradeoff. On the one hand we have the camp (let's say camp A) that believes the validator pro

Re: Dan Stillman's concerns about Extension Signing

2015-11-28 Thread Dan Stillman
On 11/28/15 5:06 AM, Gijs Kruitbosch wrote: On 27/11/2015 23:46, dstill...@zotero.org wrote: The issue here is that this new system -- specifically, an automated scanner sending extensions to manual review -- has been defended by Jorge's saying, from March when I first brought this up until yest

Re: Dan Stillman's concerns about Extension Signing

2015-11-28 Thread Dan Stillman
On 11/28/15 2:06 AM, Gavin Sharp wrote: The assumption that the validator must catch all malicious code for add-on signing to be beneficial is incorrect, and seems to be what's fueling most of this thread. Validation being a prerequisite for automatic signing is not primarily a security measure