Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Standardizing Security Semantics for Cross-Site Cookies #806

Open
DCtheTall opened this issue May 24, 2023 · 3 comments
Open

Standardizing Security Semantics for Cross-Site Cookies #806

DCtheTall opened this issue May 24, 2023 · 3 comments

Comments

@DCtheTall
Copy link

Request for Mozilla Position on an Emerging Web Specification

Other information

This document proposes to standardize the security semantics of cross-site cookies when third-party cookie blocking is enabled. The main points we would like to make standard behavior are:

  • Block third-party cookies from being written or read by same-site embeds with cross-site ancestors (aka ABA embeds) unless the embed is granted storage access.
  • Block cookies in first-party subresource requests that were redirects from third-party URLs.
  • Allows cookies to be sent in top-level POST navigation requests to continue supporting prevalent use cases like 3D-Secure.

Since this behavior causes third-party cookie blocking to be stricter in Gecko than the current state (particularly for ABA embeds) we can work with you to minimize the compat impact.

@dveditz
Copy link
Member

dveditz commented May 25, 2023

A bit of a nitpick, but what "standard" are we supposed to have a position on? There's a link to an explainer, but this looks very "pre-standard" and I'm not sure our standards position process is intended for discussions that are in that stage.

@zcorpan
Copy link
Member

zcorpan commented May 29, 2023

I'm not sure our standards position process is intended for discussions that are in that stage.

I've filed #808

@johannhof
Copy link

Hey Dan, that's a fair point. We're aiming to pick this up as a WG Note for WebAppSec and would appreciate your early input to the explainer, but I understand if this issue is not actionable for deriving a position on at the moment. We'll get back to you when there's been some progress.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Unscreened
Development

No branches or pull requests

4 participants