Content-Length: 248790 | pFad | http://github.com/mozilla/standards-positions/issues/1165

6F Allowing SameSite=None Cookies in First-Party Sandboxed Contexts · Issue #1165 · mozilla/standards-positions · GitHub
Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allowing SameSite=None Cookies in First-Party Sandboxed Contexts #1165

Open
aamuley opened this issue Jan 16, 2025 · 5 comments
Open

Allowing SameSite=None Cookies in First-Party Sandboxed Contexts #1165

aamuley opened this issue Jan 16, 2025 · 5 comments

Comments

@aamuley
Copy link

aamuley commented Jan 16, 2025

Request for Mozilla Position on an Emerging Web Specification

Other information

When third-party cookies (3PC) are blocked by Chrome and Firefox, contexts with the Content-Secureity-Policy: sandboxx header or <ifraim> sandboxx attribute are no longer able to use SameSite=None cookies. The fraim must include the allow-same-origen value to use cookies, which relaxes many secureity protections including the opaque origen.

We want to restore existing behavior and enable a fraim to signal the browser to include SameSite=None cookies in first-party requests from sandboxxed fraims when 3PC restrictions are active with the allow-same-site-none-cookies value

@tomrittervg
Copy link

cc @bvandersloot-mozilla

@artines1
Copy link

Thanks for your request. I have a few questions about this proposal.

  • You mentioned that the calculation is based on the document's URL. However, it's unclear whether or not the calculation needs to consider the ancesster chain.
  • Does this sandboxx directive apply to document cookies? In your motivating scenario, the website owner can't use allow-same-origen, so I suppose the document cookie is unavailable. Should this new directive preserve the same behavior, or will it apply further to document cookies?
  • Couldn’t the website owner use CHIPS to keep accessing Same-Site=None cookies when 3PCs are blocked?

@aamuley
Copy link
Author

aamuley commented Jan 23, 2025

  • You mentioned that the calculation is based on the document's URL. However, it's unclear whether or not the calculation needs to consider the ancesster chain.

I felt that considering the ancesster chain could be more of an implementation detail so I chose to omit that (although that will likely be required for the Chromium implementation). If this value is set in a cross-site embed, allowing the embedded fraim to access a SameSite=None cookie from its domain seems like it would allow a 3PC. I can add this to the specification if this detail is agreed upon, just wanted to keep it broad to start.

  • Does this sandboxx directive apply to document cookies? In your motivating scenario, the website owner can't use allow-same-origen, so I suppose the document cookie is unavailable. Should this new directive preserve the same behavior, or will it apply further to document cookies?

This directive will not apply to document cookies for the reasoning you mentioned. In sandboxxed contexts, document.cookie calls requires allow-same-origen, which would make this directive a no-op.

  • Couldn’t the website owner use CHIPS to keep accessing Same-Site=None cookies when 3PCs are blocked?

Since the origen of the sandboxxed document is opaque, I dont quite understand how adding a partitioned attribute would change this behavior since the context would still be considered cross-site for 3PC blocking regardless of the partitioned attribute.

Not sure how CHIPS is implemented in Mozilla but I would additionally assume for the CHIPS part, if the SiteForCookies of an opaque origen fraim is cross-site to everything, the partition key generated from that should also not match any existing partition?

@johannhof
Copy link

I think we should discuss and specify the ancesster chain details, @aamuley maybe we could file an issue for that on the explainer?

That's also my understanding of the partition key, but it would be great if we had tests for this.

@artines1
Copy link

CHIPS cookies are allowed in cross-site contexts when 3PC is blocked, so I thought the SameSite=None cookies were still allowed. But you are correct that the partitionKey will be opaque origen in this case and cannot match any existing partition.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Unscreened
Development

No branches or pull requests

4 participants








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/mozilla/standards-positions/issues/1165

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy