00:00
<MikeSmith>
hmm, word selection of Japanse text also works as expected in Firefox and Safari on macOS, so maybe macOS has this built in from ICU too (as Windows does)
00:01
<devsnek>
it is a reasonable thing to have
00:01
<devsnek>
i wish polm23 didn't mention v8BreakIterator
07:10
<annevk>
What's h2c?
09:11
<MikeSmith>
annevk: abbreviation for cleartext HTTP/2
09:11
<MikeSmith>
right?
09:12
<annevk>
I see, I guess there's nothing prohibiting that at the moment
09:14
<MikeSmith>
given that browsers support it, I guess it’s sort of moot anyway
09:14
<MikeSmith>
as far as fetch goes
09:14
<MikeSmith>
or anything else in frontend JavaScript code in browsers
09:15
<MikeSmith>
though I guess it could maybe be used in Node, with fetch
09:16
<MikeSmith>
if Node has support
09:16
<MikeSmith>
I think for server-server communication or backend stuff in general, cleartext HTTP2 has some use cases
09:17
<MikeSmith>
I enabled it in the (Jetty) backend for the HTML checker web service
09:19
<MikeSmith>
in the W3C deployment of the HTML checker, the TLS termination happens at another level anyway, so there’s no point in TLS-enabling the checker itself anyway
11:06
<annevk>
MikeSmith: pretty sure server-server also needs TLS to be secure
11:07
<MikeSmith>
really
11:07
<MikeSmith>
seems like in some situations that could just be overkill
11:08
<MikeSmith>
I mean in the case of the HTML checker, it is getting the requests from a load balancer, inside the W3C intranet
11:10
<MikeSmith>
to MITM that traffice, the attacker would need to already have breached the firewall and have access to internal network
11:13
<MikeSmith>
well and then there’s the fact that the cert name is for validator.w3.org, and the host name for both the load balancer and the individual checker instance is the same, so I don’t even know how I could have a separate cert for the checker
11:14
<MikeSmith>
I guess the load balancer just calls the checker instances by IP address
11:16
<MikeSmith>
anyway I suppose there’s still some way to deploy TLS on the checker instances too, in that network architecture. But if so I don’t know how
11:20
<annevk>
I’m pretty sure you should not rely on the network being secure, but you could prolly get by with self-signed certificates
11:50
<MikeSmith>
I can imagine that being the ideal thing to do in theory, but I wonder whether in practice most network admins ever seriously estimate that to be worth the added overhead enough to justify really doing it
11:56
<MikeSmith>
at that level to me it seems similar to trying to secure IPC communication between applications on your laptop, so that in case somebody ever steals your laptop, at least they won’t be able to eavesdrop on how any applications are your laptop are communicating with each other
12:16
<annevk>
MikeSmith: it might depend a bit on the scale of your network, but there were some high profile incidents around this
12:18
<MikeSmith>
OK
12:19
<MikeSmith>
well I basically have zero domain knowledge about this area anyway, so I’t just talking out of my hat
17:59
<Domenic>
I'm pretty sure a major part of the government hacks that Snowden leaked were using the fact that server-server was not secure.
17:59
<Domenic>
"SSL added and removed here" pointing to an intranet
18:00
<Domenic>
https://cdn57.androidauthority.net/wp-content/uploads/2014/06/SSL-Added-and-Removed-Here.jpg
18:01
<Domenic>
https://blog.encrypt.me/2013/11/05/ssl-added-and-removed-here-nsa-smiley/
19:43
<annevk>
Thanks for digging that up, that’s what I meant