Eyes Above The Waves

Robert O'Callahan. Christian. Repatriate Kiwi. Hacker.

Sunday 28 August 2005

SVG Interoperation

We're going to be shipping SVG support in Firefox 1.5. Opera is already shipping some SVG support in Opera 8. It would be very helpful to know how well these two SVG implementations interoperate. We already know they cover slightly different subsets of SVG 1.1 but for the set of SVG features they both claim to implement, it would be very useful to see if there are many bugs that occur in one browser but not in the other --- it would give us, at least, a chance to fix some of those bugs on our side so authors targeting multiple browsers get better results.

Any volunteers? There are a number of SVG tests out there on the Web. This work should be relatively easy to do. Even just doing a few tests would be helpful. The more that gets tested, the better.


Dan V. P. Christiansen
The CVS HEAD of the Safari WebKit also has some preliminary SVG support. It might be a good idea to include that in comparisons as well :)
Jeff Schiller
This is really just to make sure you beat Opera's implementation, isn't it? hehe.
Here are Opera 8 test results: http://blog.codedread.com/archives/2005/06/21/opera-8-svg-tiny-test-results/
Here are Deer Park (Alpha 2) test results:
Here are the top 10 things I'd like fixed with Opera: http://blog.codedread.com/archives/2005/07/07/top-10-things-to-fix-for-operas-svg-tiny-implementation/
Hope it helps,
Have you seen this test page:
The first SVG demo on http://www.opera.com/features/svg/index.dml doesn't work in Mo, but does in Opera...
Just one small datapoint: I've recently designed a company logo in inkscape. The firefox nightly displayed it perfectly well.
Liss Sterling
Apologies if this is a repeat. Got message saying that my post failed. Anyway, I was upset to find the following email in my box today from our government IT dept. Can you shed any light on the 'Firefox vulnerabilities' it refers to?
From: Bobo, Gary R
Sent: Monday, August 29, 2005 3:19 PM
Subject: FW: Foxfire Browser
Importance: High
If you are using the Mozilla Foxfire Browser, it MUST be remove from your system.
See message below.
Gary Bobo
From: Carmody, Nadine R AMRDEC/WareOnEarth On Behalf Of AMRDEC Information Assurance
Sent: Friday, August 26, 2005 2:12 PM
To: Elliott, Herndon R AMRDEC; Lee, Norma J AMRDEC; Bobo, Gary R; Brown, Eric L AMRDEC/UAH; Clark, Roger B AMRDEC; Craig, William (SED); Dupere, Jeff A AMRDEC; Hoover, Kyle (SED); Jenkins, Phil N; Jones, David C AMRDEC; Kerbo, Ronald J AMRDEC; Lewis, Tim (SED); Maurer, Chris RDEC; Reed, Fred (SED); SED Information Assurance; Shishido, Roy AMRDEC; Smith, Robert (SED); Tedrow, Allen (Contractor - LMIT)
Subject: FW: Foxfire Browser
Importance: High
Mozilla Foxfire Browser can no longer be utilized on the Redstone Domain per LCIRT message below.
Nadine Carmody
From: LCIRT-R, GARRISON [mailto:lcirt-r@redstone.army.mil]
Sent: Friday, August 26, 2005 2:03 PM
Subject: FW: Foxfire Browser
The LCIRT has identified serious security issues with the Foxfire browser. For this reason, we will be removing it from all of the computers on the Redstone Domain. We apologize for this inconvenience in advance for those of you who use it, but the integrity of our network must take precedence. We are also sending copies of this message to the Redstone IA community so that they can begin the same process for non-DOIM managed networks. Internet Explorer and Netscape will not be affected by this action.
Jack Padley
Acting Redstone Garrison DOIM
Robert O'Callahan
They don't say what the "serious security issues" are, so who can say anything about it? I believe the latest Firefox (1.0.6) is secure against all publically disclosed vulnerabilities.
mozilla foxfire
Well, I find 1.0.6 version secure and stable.