IRC Log for #openid on 2007-04-12
Timestamps are in UTC.
- [00:13:18] * KevinMarks (i=KevinMar@pdpc/supporter/active/kevinmarks) Quit (Read error: 110 (Connection timed out))
- [00:17:27] * KevinMarks (i=KevinMar@nat/google/x-77f405985c58bd2c) has joined #openid
- [00:34:40] * j3h (n=j3h@c-71-236-228-127.hsd1.or.comcast.net) Quit (Read error: 113 (No route to host))
- [01:04:20] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [01:07:13] * shigeta (n=shigeta@124.32.114.226) has joined #openid
- [01:21:27] * KevinMarks (i=KevinMar@nat/google/x-77f405985c58bd2c) Quit ("The computer fell asleep")
- [01:22:45] * elliottcable is now known as [e]brb
- [01:25:26] * [e]brb is now known as elliottcable
- [02:12:00] * elliottcable is now known as [e]brb
- [02:14:15] * bricas (n=bricas@CPE0011506c8049-CM0013711405ec.cpe.net.cable.rogers.com) Quit ("ChatZilla 0.9.78.1 [Firefox 2.0.0.3/0000000000]")
- [02:17:52] * stub (n=stub@ppp-58.8.3.131.revip2.asianet.co.th) has joined #openid
- [02:19:50] * [e]brb is now known as elliottcable
- [02:29:53] * wizard545 (n=jon@devtroop.com) has joined #openid
- [02:30:17] * wizard545 (n=jon@devtroop.com) has left #openid
- [03:51:56] * keturn (n=kevint@pdpc/supporter/sustaining/keturn) Quit ("Client exiting")
- [03:52:08] * keturn (n=kevint@pdpc/supporter/sustaining/keturn) has joined #openid
- [05:18:43] * fajro (n=fajro@OL104-24.fibertel.com.ar) has joined #openid
- [05:45:24] * Prometheus^ (n=Promethe@kone1.tmvvision.finnetcom.net) has joined #openid
- [05:49:10] * stub (n=stub@canonical/launchpad/stub) Quit ("Leaving.")
- [05:52:56] * KevinMarks (n=Snak@h-68-164-93-9.snvacaid.dynamic.covad.net) has joined #openid
- [07:11:29] * elliottcable is now known as [e]zZz
- [07:15:56] * m3nt0r^ (n=mail@p50901FAC.dip0.t-ipconnect.de) has joined #openid
- [07:32:21] * stub (n=stub@ppp-58.8.3.131.revip2.asianet.co.th) has joined #openid
- [07:32:45] * m3nt0r (n=mail@p50902ABA.dip0.t-ipconnect.de) Quit (Read error: 110 (Connection timed out))
- [08:09:45] * dUstBYTeR (n=_whatthi@c-67-162-28-30.hsd1.il.comcast.net) Quit ()
- [08:39:27] * fajro (n=fajro@OL104-24.fibertel.com.ar) Quit ("Ex-Chat")
- [09:21:04] * aconbere_ (n=aconbere@mail.geonerco.com) has joined #openid
- [09:21:37] * aconbere (n=aconbere@mail.geonerco.com) Quit (Read error: 104 (Connection reset by peer))
- [09:33:50] * _keturn (n=acapnoti@pdpc/supporter/sustaining/keturn) Quit (Read error: 110 (Connection timed out))
- [09:37:44] * chowells79 (n=chowells@c-71-236-228-127.hsd1.or.comcast.net) Quit (Read error: 110 (Connection timed out))
- [09:37:54] * rorek (n=sanedrag@c-71-236-228-127.hsd1.or.comcast.net) Quit (Read error: 110 (Connection timed out))
- [09:38:18] * mpg4 (n=mpg4@c-71-236-228-127.hsd1.or.comcast.net) Quit (Read error: 110 (Connection timed out))
- [09:54:28] * stub (n=stub@canonical/launchpad/stub) Quit (Read error: 110 (Connection timed out))
- [10:04:48] * rorek (n=sanedrag@c-71-236-228-127.hsd1.or.comcast.net) has joined #openid
- [10:04:52] * chowells79 (n=chowells@c-71-236-228-127.hsd1.or.comcast.net) has joined #openid
- [10:05:04] * _keturn (n=acapnoti@pdpc/supporter/sustaining/keturn) has joined #openid
- [10:17:56] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [10:21:54] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Read error: 104 (Connection reset by peer))
- [10:22:00] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [10:40:17] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Connection timed out)
- [10:44:17] * Pooky (n=pk@VDSL-130-13-149-38.PHNX.QWEST.NET) has left #openid
- [10:54:17] * rgl (n=Rui@84.90.10.107) has joined #openid
- [10:54:18] <rgl>
mooo
- [11:00:15] * shigeta (n=shigeta@124.32.114.226) Quit ("Leaving...")
- [11:01:39] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [11:11:09] * punter (n=punter@ipa159.37.91.tellas.gr) has joined #openid
- [11:11:12] * punter (n=punter@ipa159.37.91.tellas.gr) Quit (Client Quit)
- [11:19:47] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Read error: 110 (Connection timed out))
- [11:25:57] * bricas (n=bricas@h64-5-219-130.gtcust.grouptelecom.net) has joined #openid
- [11:37:12] * punter (n=punter@ipa159.37.91.tellas.gr) has joined #openid
- [11:37:24] <punter>
Is anyone here involved in making the openid spec?
- [11:52:28] * dUstBYTeR (n=_whatthi@c-67-162-28-30.hsd1.il.comcast.net) has joined #openid
- [12:31:24] * punter (n=punter@ipa159.37.91.tellas.gr) Quit ()
- [13:04:15] * bortzmeyer (i=bortzmey@batilda.nic.fr) has joined #openid
- [13:13:09] * stub (n=stub@ppp-58.8.9.192.revip2.asianet.co.th) has joined #openid
- [13:23:36] * cote (n=cote@adsl-71-145-192-9.dsl.austtx.sbcglobal.net) has joined #openid
- [14:00:06] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [14:16:22] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Read error: 110 (Connection timed out))
- [14:43:10] * stub (n=stub@canonical/launchpad/stub) Quit (Excess Flood)
- [14:44:04] * stub (n=stub@ppp-58.8.9.192.revip2.asianet.co.th) has joined #openid
- [15:01:43] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [15:14:46] * cote (n=cote@adsl-71-145-192-9.dsl.austtx.sbcglobal.net) Quit ()
- [15:20:17] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Read error: 110 (Connection timed out))
- [15:20:25] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) has joined #openid
- [15:26:06] * j3h (n=j3h@c-76-105-135-22.hsd1.or.comcast.net) has joined #openid
- [15:30:17] * tommorris (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit (Connection timed out)
- [15:32:50] * cote (n=cote@adsl-71-145-192-9.dsl.austtx.sbcglobal.net) has joined #openid
- [15:42:59] * bortzmeyer (i=bortzmey@batilda.nic.fr) has left #openid
- [15:55:08] * tommorris_ (n=tommorri@i-83-67-98-32.freedom2surf.net) Quit ()
- [16:17:39] * stub (n=stub@canonical/launchpad/stub) Quit (No route to host)
- [16:30:41] * KevinMarks (n=Snak@pdpc/supporter/active/kevinmarks) Quit ("off to work")
- [16:45:20] * cygnus (n=cygnus@www.cprogrammer.org) has joined #openid
- [16:47:00] * j3h (n=j3h@c-76-105-135-22.hsd1.or.comcast.net) Quit (Read error: 110 (Connection timed out))
- [17:09:26] * SvenDowideit (n=sven@twiki/developer/SvenDowideit) Quit (Read error: 110 (Connection timed out))
- [17:09:27] * sven_ (n=sven@78.98.77.83.cust.bluewin.ch) has joined #openid
- [17:32:29] * PatF (i=Patrick@nat/novell/x-7490c3a4dea4c2a6) has joined #openid
- [17:37:45] * j3h (n=j3h@c-71-236-228-127.hsd1.or.comcast.net) has joined #openid
- [17:53:13] * Prometheus^ (n=Promethe@kone1.tmvvision.finnetcom.net) Quit ()
- [17:56:13] * PatF (i=Patrick@nat/novell/x-7490c3a4dea4c2a6) Quit (Read error: 60 (Operation timed out))
- [18:15:13] * brianellin (n=brianell@c-71-236-228-127.hsd1.or.comcast.net) has joined #openid
- [18:19:16] * PatF (i=Patrick@nat/novell/x-6c8f2d288e112256) has joined #openid
- [19:01:54] * rgl (n=Rui@84.90.10.107) Quit ("Leaving")
- [19:10:47] * brianellin (n=brianell@c-71-236-228-127.hsd1.or.comcast.net) Quit ("Leaving")
- [20:01:47] * bricas (n=bricas@h64-5-219-130.gtcust.grouptelecom.net) Quit ("ChatZilla 0.9.78.1 [Firefox 2.0.0.3/0000000000]")
- [20:02:28] * cygnus (n=cygnus@www.cprogrammer.org) has left #openid
- [20:19:32] * Brylie (n=brylie@CPE-75-81-108-73.kc.res.rr.com) has joined #openid
- [20:37:35] * KevinMarks (i=KevinMar@nat/google/x-2fda9a1993e8c10b) has joined #openid
- [20:51:28] * KevinMarks (i=KevinMar@nat/google/x-2fda9a1993e8c10b) Quit ("The computer fell asleep")
- [21:56:29] * Brylie (n=brylie@CPE-75-81-108-73.kc.res.rr.com) Quit (Remote closed the connection)
- [22:33:00] * KevinMarks (i=KevinMar@nat/google/x-f411ee104a73efe8) has joined #openid
- [22:39:01] * PatF (i=Patrick@nat/novell/x-6c8f2d288e112256) Quit (Read error: 110 (Connection timed out))
- [23:12:29] * pisi (n=pisi@212.47.220.110) has joined #openid
- [23:14:15] <pisi>
Hi. Without digging the docs or hacking something together: If the openid provider always knows without any information from the client who the client is and what kind of openid url should he/she use, can I have only a simple 'log in' link for those users ?
- [23:14:43] <pisi>
something like 'click here to log in via service X or specify any other openid here: [ ] and client login' ?
- [23:15:10] <pisi>
click login -> client login
- [23:15:21] <pisi>
(vice versa, it's late already)
- [23:17:14] <GabeW>
try restating your question with the standard terms: OP, RP, and browser ;)
- [23:17:23] <GabeW>
client is ambiguous
- [23:17:25] <GabeW>
;)
- [23:19:03] <gregh_>
BP? Browsing Party? :)
- [23:19:12] <GabeW>
he
- [23:21:07] <pisi>
umm. Anyway. I want to have a user experience like I described: 'Click here to log in with OP X or specify any openid and log in' The OP in question knows how to figure out an OpenID for the request without asking the user (as the request would go over HTTPS and would use client certificates that contain the user identity)
- [23:21:27] <GabeW>
the RP doesn't get to pick the OP
- [23:21:33] <GabeW>
the user picks the OP
- [23:21:43] <GabeW>
and tells the RP (via dereferencing their OpenID URI/XRI)
- [23:22:57] <pisi>
I'm not that fluent in openid jargon. But I'd like to avoid any user input.
- [23:23:10] <GabeW>
the user has to enter their openid
- [23:23:11] <GabeW>
to the RP
- [23:23:17] <GabeW>
thats the way it works
- [23:23:21] <pisi>
The idea here is that you either press a button OR enter any openid
- [23:23:37] <GabeW>
how would the user identify themselves in pressing a button?
- [23:23:45] <chowells79>
Well, if you're willing to supply a browser extension which will cause the browser to enter it for the user...
- [23:24:05] <GabeW>
and get the RPs of the world to agree to some sort of standard for a field to enter your openid in
- [23:24:07] <chowells79>
Sxip has browser extensions that try to do that.
- [23:24:15] <GabeW>
sxipper
- [23:24:19] <chowells79>
Yep
- [23:24:27] <GabeW>
(for the logs)
- [23:25:25] <pisi>
GabeW: I was hoping there would be a way to say 'I don't really know my openid right now but i know that this provider can figure it out'
- [23:25:32] <GabeW>
oh
- [23:25:33] <GabeW>
hmm
- [23:26:03] <chowells79>
Well, that's supposed to be in OpenID 2
- [23:26:07] <GabeW>
not really - but there are provisions to provide the identifier of only the OP
- [23:26:11] <chowells79>
I don't know if it got much testing.
- [23:26:17] <GabeW>
chowells79: yes, but you are still providing an identifier
- [23:26:22] <GabeW>
(of the OP, in that case)
- [23:27:07] <pisi>
chowells79: can you point me to some reading and some python code maybe ?
- [23:27:08] <chowells79>
That sounds to me like saying "but i know that this provider can figure it out"
- [23:27:34] <GabeW>
python, YAY!
- [23:27:40] <GabeW>
yah, chowells79 and crew have written python
- [23:27:42] <GabeW>
libs
- [23:27:57] <chowells79>
It's been a while since I've gone through the lib code. I'm assuming it's in there somewhere.
- [23:27:57] <GabeW>
chowells79: yes, it does, but I'm not sure how thats a "button press"
- [23:28:08] <GabeW>
you guys just released 2.0.0 code, right?
- [23:28:13] <chowells79>
Yep
- [23:28:24] <GabeW>
rightoues
- [23:28:26] <chowells79>
http://www.openidenabled.com/openid/libraries/python/python-openid-2-0-0-rc-1
- [23:28:26] <GabeW>
righteous
- [23:28:33] <chowells79>
Looks like it's officially RC status..
- [23:29:08] <pisi>
(For the record: I'm talking about https://ideelabor.ee/openid and national eID that automagically encodes the RealIdentity (not just some random url) of every request to the SSL site into the certificate
- [23:29:16] <GabeW>
wow
- [23:30:03] <pisi>
So my idea is to bring people closer to openid, with security. Anything extra one would have to do would be a no go at this stage as an average person just doesn't understand the technology
- [23:30:23] <chowells79>
People are still used to entering *something* in a text box.
- [23:30:36] <pisi>
they know their pin1 and want to enter the pin1 when they register to whateverforum or whateversite. And then later on they want to log back on
- [23:30:47] <pisi>
chowells79: not really. with eID you don't need it.
- [23:31:07] <pisi>
you just click a button like this one: http://digidoc.sk.ee/entry_splash.html
- [23:31:07] <chowells79>
Err... Then everyone has to install something.
- [23:31:23] <pisi>
chowells79: that's out of the scope of openid problem.
- [23:32:00] <chowells79>
I suppose so.
- [23:33:34] <chowells79>
But... What you're asking is beyond the basic ability of a browser.
- [23:33:47] <pisi>
smart cards ?
- [23:34:05] <chowells79>
Unless the smart card contains a custom browser... No help.
- [23:34:18] <pisi>
I don't really get you now..
- [23:34:28] <pisi>
smart cards don't need browsers.
- [23:34:51] <chowells79>
Browsers, without some extra software, just don't automatically know that they need to put a special value into some form element and automatically submit it.
- [23:35:36] <chowells79>
When you come across a web site that contains an openid login field, that's what the browser will have to do, in your scenario.
- [23:36:14] <pisi>
well, I was hoping that the openid infrastructure can be directed to say instead of 'dereference this url and talk to that server' 'talk to that server and get the openid' in a reply of 'successfully authenticated as XXX'
- [23:36:40] <chowells79>
It can.
- [23:36:45] <chowells79>
But that's not what I'm talking about.
- [23:37:25] <chowells79>
I'm talking about, when you go to http://www.jyte.com/ and click "sign in with OpenID"...
- [23:37:39] <chowells79>
It gives you a big text box, and a submit button.
- [23:37:55] <chowells79>
If you're not willing to type *something* into that box, you need the browser to do it for you.
- [23:38:06] <chowells79>
And that's not something browsers do, without extensions.
- [23:38:36] <pisi>
Maybe you've misunderstood me then. If a site wants to use the eID generated openid, it will include a link (besides a casual openid entry field, like on jyte.com) AND in small letters below it (or press this link to talk to http://ideelabor.ee/openid that will provide your openid automagically)
- [23:39:12] <pisi>
why so? because everybody in Estonia automatically has an URL already.
- [23:39:21] <pisi>
it is a mailto: url but still an URL.
- [23:39:39] <chowells79>
Well, if you think the subset of openID-enabled sites that eID users will care about will all implement that solution...
- [23:39:43] <chowells79>
(I don't, by the way)
- [23:39:49] <pisi>
every request done with eID contains that URL.
- [23:39:51] <chowells79>
It can be done with OpenID 2
- [23:40:16] <pisi>
chowells79: can you point me to some reading please ?
- [23:40:46] <chowells79>
Give me a couple minuutes...
- [23:40:54] <pisi>
chowells79: I bet it might be hard to believe that almost every site wants security and not all can use SSL to get rid of passwords.
- [23:41:09] <pisi>
and as 90% of Estonians have eID cards..
- [23:41:57] <chowells79>
I'm just saying... You're restricting this to working only with eID sites. And if that's the case, why bother with OpenID?
- [23:42:03] <pisi>
I guess we still rule as biggest percentual smartcard rollout. no passwords, no usernames either (if you don't want) just pure security and a PIN.
- [23:42:17] <GabeW>
you should be rolling out an OP with smartcards
- [23:42:28] <GabeW>
the problem you have is that you don't want your users to have to know about OpenID
- [23:42:35] <GabeW>
but you want them to take advantage of the openid network of RPs
- [23:42:46] <pisi>
those who want to know about it already know or will know
- [23:42:50] <pisi>
those who don't ...
- [23:43:02] <GabeW>
i understand what you are trying to do pisi
- [23:43:27] <pisi>
basically the key issue here is that openid is THE technology currently that allows one important thing: the ability to jump onto the eID wagon without having to have a spare IP/port pair to run your ssl host.
- [23:43:56] <GabeW>
yah, so I get it
- [23:43:59] <pisi>
you still get the 'just have to remember my pin' usability AND you get the new shiny fancy openid
- [23:44:11] <pisi>
what opens up a heap of other possibilities
- [23:44:17] <GabeW>
i don't have a quick answer
- [23:44:21] <GabeW>
but its an interesting issue
- [23:44:22] <chowells79>
Ok... Here's some documentation on the identifier_select feature: http://openid.net/specs/openid-authentication-2_0-11.html
- [23:44:29] <chowells79>
Well, that's the full OpenID 2 spec
- [23:44:42] <chowells79>
But search for the text "identifier_select"
- [23:44:48] <GabeW>
in some sense, the choice of openid provider doesn't matter - so long as they know how to interact with the smart card, right?
- [23:45:33] <chowells79>
Actually, come to think of it.. That won't work with mailto: urls, as they can't be resolved to content that provides proof of ownership.
- [23:45:39] <pisi>
GabeW: that's not that simple. smart card interaction, in the best case, is as simple as reading SSL_CLIENT_CERT in your cgi program
- [23:45:39] * bricas (n=bricas@CPE0011506c8049-CM0013711405ec.cpe.net.cable.rogers.com) has joined #openid
- [23:45:46] <pisi>
PKI is about infrastructure mostly
- [23:45:57] <GabeW>
i gotta run - but this is interesting
- [23:46:04] <GabeW>
this channel is logged
- [23:46:30] <pisi>
http://ideelabor.ee/opensource/wiki/OpenID (Estonian only, sorry)
- [23:46:55] <chowells79>
Sorry, I'm pitifully monolingual (aka, American).
- [23:47:02] <GabeW>
chowells79++
- [23:47:08] <pisi>
my example: I automagically get an e-mail address from the state for official notices and stuff like that: martin.paljak@eesti.ee
- [23:47:43] <pisi>
http://ideelabor.ee/openid/<put the mailto url here, or if you don't want mailto put foaf-style mbox_sha1sum here)
- [23:47:50] <chowells79>
Oh, cool.
- [23:47:53] <chowells79>
Then it will work.
- [23:47:59] <pisi>
this way you get anonymous openids
- [23:48:25] <pisi>
anonymous for random sites. openid provider with SSL always knows who you REALLY are and what's your mailto: URL
- [23:48:46] <chowells79>
Assuming the ID url is, in fact something like http://ideelabor.ee/openid/mailto:martin.paljak@eesti.ee
- [23:48:49] <pisi>
you can (not yet, TBD) select the profile used for a specific site.
- [23:49:01] <pisi>
yes, that's me
- [23:49:08] <chowells79>
(Not that the user ever *knows* that they have that url, but it's what's reported)
- [23:49:08] <_keturn>
pisi: oh, hey there. Thanks for your message the other day. Sounds like you're working on some cool stuff.
- [23:49:13] <pisi>
or, if you check martin.paljak.pri.ee you get the one I use in real life currently
- [23:49:26] <chowells79>
Oh, that resolves?
- [23:49:39] <pisi>
chowells79: sure it does.
- [23:49:52] <chowells79>
Do all eIDs resolve in the same way?
- [23:50:06] <pisi>
chowells79: all 1000000 or so
- [23:50:13] <chowells79>
That's a very cool system.
- [23:50:23] <pisi>
I bet it is
- [23:50:36] <chowells79>
Were you involved in the development at all, or just coming in to do the openid part?
- [23:51:06] <pisi>
I'm pretty deeply involved with estonian eID. and opensc-project.org
- [23:51:19] <chowells79>
Cool. Then I can say "nice job" to you. :)
- [23:51:28] <GabeW>
oooh
- [23:51:31] <GabeW>
opensc-project.org
- [23:51:48] <GabeW>
nice
- [23:52:08] <pisi>
I also provide software for 3 platforms (windows/firefox, mac, linux-whateverx) whereas current official rollout is only for windows.
- [23:52:14] <chowells79>
So, for sites that are willing to put in an extra "log in with eID" link, you can have that utilize OpenID relatively transparently.
- [23:52:15] <GabeW>
i used to be at visa and smartcards is/are/were all the rage
- [23:52:30] <pisi>
(software for eID and browser integration, pkcs11 mostly and some stuff on apple as well)
- [23:52:49] <pisi>
chowells79: all sites in Estonia want to have 'log in with eID'
- [23:53:29] <pisi>
and most sites don't have any other means but openid - as random joe just doesn't have ssl capabilities
- [23:53:41] <chowells79>
If those sites support openid fully, it's trivial to add that link.
- [23:54:01] <chowells79>
That link is nothing more than a shortcut to perform a particular openid request.
- [23:54:04] <pisi>
and random joe should not even get my full identity - like gender, name etc
- [23:54:09] <pisi>
ok.
- [23:54:31] <chowells79>
Look into the identifier_select stuff.
- [23:54:47] <pisi>
chowells79: now, the fun part for openid crowd - By providing example code, all sites enabling eID login will naturally support whatever openid available :)
- [23:54:50] <chowells79>
It's basically a way to tell an OP that it may choose the identifier that gets returned.
- [23:55:06] <chowells79>
Which is exactly what you want.
- [23:56:23] <pisi>
If all goes well and openid gets some more traction it won't be impossible to make estonia into an 'openid contry' where everybody would get something like 'eesti.ee/id/martin.paljak'
- [23:57:16] <chowells79>
Wow. My browser setting on this computer don't agree with opensc-project.org. :)
- [23:57:33] <pisi>
chowells79: ?
- [23:57:36] <chowells79>
The latest news box overflows, and gets clipped.
- [23:57:50] <chowells79>
I think it's something to do with my default font sizes and screen resolution.
- [23:58:13] <pisi>
yeah. what ar you using ? I guess obody has the time or interest to deal with website.
- [23:58:21] <chowells79>
I'm using firefox..
- [23:58:27] <chowells79>
Well, Iceweasel.
- [23:58:38] <chowells79>
Bah, stupid debian/mozilla disagreement
- [23:59:11] <chowells79>
My display resolution is really high, so I have default font sizes up somewhat to account for that.
- [23:59:12] <pisi>
I remember it had some ugly elements with safari/20" whereas it looks nice on smaller screens
- [23:59:38] <chowells79>
I bet the box is sized in pixels, or something.
- [23:59:45] <chowells79>
So it overflows because my fonts are bigger.
These logs were automatically created by OpenIDlogbot on
chat.freenode.net
using a modified version of the Java IRC LogBot.