-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SameSite=Lax
by default.
#373
Comments
Assigning @dbaron and myself because I'd like each of us to talk to colleagues on our teams with the relevant domain expertise. |
Gecko: Intent to implement: Cookie SameSite=lax by default and SameSite=none only if secure https://groups.google.com/forum/#!msg/mozilla.dev.platform/nx2uP0CzA9k/BNVPWDHsAQAJ |
Blink: Intent to implement an ship: Cookies with SameSite by default Note that SameSite=None is currently treated as Strict in iOS / MacOS. I have argued that I don't think we can reasonably ship this in blink as a result (don't want to force developers to rely on UA sniffing). If the CFNetwork fix (rdar://problem/42290578) got back-ported to iOS 12 then that would probably address my concern. Alternately, a different design using a new token (instead of SameSite) could address the adoption concern, but it seems that would probably be a real shame to stick the web with. @hober this is the issue I mentioned at the CSSWG meeting last week. |
I'm curious if @bakulf has any interesting feedback from prototyping in Gecko (I also can't tell from the bug what the state of the pref being enabled is). |
SameSite=Lax by default has been a topic of a couple of dom-security meetings. Currently, this feature is disabled by default, but we have strong interests in enabling in nightly, and maybe in release too. We asked Mark Goodwin to follow this topic, but after that, I don't know what has happened. |
Chrome is looking at enabling this on pre-Stable channels soon. https://www.chromestatus.com/feature/5088147346030592 |
Guten TAG,
I'm requesting a TAG review of:
.tentative
WPT shortly.Further details (optional):
TL;DR: We're proposing treating cookies as
SameSite=Lax
by defaul. Developers would be able to opt-into the status quo by explicitly assertingSameSite=None
, but to do so, they'll also need to ensure that their cookies won't be delivered over non-secure transport by asserting theSecure
attribute. The specification (paginated) spells out the proposal in a bit more detail.We'd prefer the TAG provide feedback as (please select one):
Thanks!
The text was updated successfully, but these errors were encountered: