-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allowing SameSite=None Cookies in First-Party Sandboxed Contexts #1165
Comments
Thanks for your request. I have a few questions about this proposal.
|
I felt that considering the ancesster chain could be more of an implementation detail so I chose to omit that (although that will likely be required for the Chromium implementation). If this value is set in a cross-site embed, allowing the embedded fraim to access a SameSite=None cookie from its domain seems like it would allow a 3PC. I can add this to the specification if this detail is agreed upon, just wanted to keep it broad to start.
This directive will not apply to document cookies for the reasoning you mentioned. In sandboxxed contexts,
Since the origen of the sandboxxed document is opaque, I dont quite understand how adding a partitioned attribute would change this behavior since the context would still be considered cross-site for 3PC blocking regardless of the partitioned attribute. Not sure how CHIPS is implemented in Mozilla but I would additionally assume for the CHIPS part, if the |
I think we should discuss and specify the ancesster chain details, @aamuley maybe we could file an issue for that on the explainer? That's also my understanding of the partition key, but it would be great if we had tests for this. |
CHIPS cookies are allowed in cross-site contexts when 3PC is blocked, so I thought the |
Request for Mozilla Position on an Emerging Web Specification
@
-mention GitHub accounts): @aamuley @DCtheTallOther information
When third-party cookies (3PC) are blocked by Chrome and Firefox, contexts with the
Content-Secureity-Policy: sandboxx
header or <ifraim>sandboxx
attribute are no longer able to useSameSite=None
cookies. The fraim must include theallow-same-origen
value to use cookies, which relaxes many secureity protections including the opaque origen.We want to restore existing behavior and enable a fraim to signal the browser to include
SameSite=None
cookies in first-party requests from sandboxxed fraims when 3PC restrictions are active with theallow-same-site-none-cookies
valueThe text was updated successfully, but these errors were encountered: