Contact emails
chl...@chromium.org, morl...@chromium.org, mk...@chromium.org
Explainer
https://tools.ietf.org/html/draft-west-cookie-incrementalism-00
https://web.dev/samesite-cookies-explained
Design doc/Spec
See spec changes proposed in explainer.
Summary
Deprecate and remove the use of cookies with the SameSite=None attribute but without the Secure attribute. Any cookie that requests SameSite=None but is not marked Secure will be rejected.
Motivation
Cookies delivered over plaintext channels may be cataloged or modified by network attackers. Requiring secure transport for cookies intended for cross-site usage reduces this risk, and encourages entities that produce embeddable content to migrate to HTTPS.
The use of non-Secure cookies facilitates pervasive monitoring, a widespread attack on users’ privacy. This change will mitigate the risks presented by pervasive monitoring by curtailing the use of non-Secure third-party cookies. Third-party cookies are widely used for tracking and may contain sensitive data that pertains to user identity. Cookies with SameSite=None are specifically marked for use in third-party contexts. By requiring SameSite=None cookies to be Secure, users are protected by default from attacks on their identifying data that may compromise their privacy.
In addition, non-secure embeds are a risk to users’ privacy and security. The use of non-secure embeds degrades users’ security and user experience on first-party sites by hampering first-party upgrades to secure transport because of limitations imposed on mixed content. The use of HTTPS protects users and sites, and the presence of mixed embedded content downgrades its security benefits. Requiring Secure for SameSite=None cookies will increase the security of the web by encouraging embeddable content producers to migrate to HTTPS.
Interoperability and Compatibility Risk
Some sites relying on third-party cookies may break temporarily until developers add “Secure” to any “SameSite=None” cookies they set. If a third-party service is not delivered over HTTPS, it will have to migrate to secure transport in order to use third-party cookies.
Cookies intended for use solely in first-party contexts (which have no need to be marked “SameSite=None”) will not be affected.
Edge: No signals
Firefox: In development
Safari: No signals
Web / Framework developers: Neutral to positive
Alternative implementation suggestion for web developers
Add “Secure” to any “SameSite=None” cookies (and migrate to HTTPS if necessary).
A temporary enterprise policy escape hatch will be added to allow enterprise admins to opt-in to the legacy SameSite behavior (i.e. the status quo SameSite behavior from before “SameSite by default cookies” or this change).
Usage information from UseCounter
Adoption of SameSite=None is still ramping up, but currently UseCounter indicates that insecure SameSite=None cookies appear on 19% of PageVisits. This figure has been growing rapidly.
Data from HTTP Archive also shows some usage of SameSite=None without Secure. (We will update the thread with more current data once it is available, since HTTP Archive data lags by about 3 weeks.)
Debuggability
DevTools shows the SameSite and Secure attributes for stored cookies under Application>Storage>Cookies. Cookies that are blocked from being set will not appear here. Cookies blocked from being sent will appear here but will be absent from the request headers shown in the Network tab. DevTools console messaging for cookies blocked, either due to “SameSite by default cookies” or the proposed change, is available behind the flag #cookie-deprecation-messages.
Is this feature fully tested by web-platform-tests?
WPTs are merged upstream. With the addition of “SameSite by default cookies” and this change to the set of features enabled with --enable-experimental-web-platform-features, there is now WPT coverage for this feature by default (without a virtual test suite).
Link to entry on the feature dashboard
https://www.chromestatus.com/feature/5633521622188032
Requesting approval to remove too?
Yes; the removal is currently implemented behind the flag #cookies-without-same-site-must-be-secure. Target milestone for removal is M80.
Data from HTTP Archive also shows some usage of SameSite=None without Secure. (We will update the thread with more current data once it is available, since HTTP Archive data lags by about 3 weeks.)
Debuggability
DevTools shows the SameSite and Secure attributes for stored cookies under Application>Storage>Cookies. Cookies that are blocked from being set will not appear here. Cookies blocked from being sent will appear here but will be absent from the request headers shown in the Network tab. DevTools console messaging for cookies blocked, either due to “SameSite by default cookies” or the proposed change, is available behind the flag #cookie-deprecation-messages.
Is this feature fully tested by web-platform-tests?
WPTs are merged upstream. With the addition of “SameSite by default cookies” and this change to the set of features enabled with --enable-experimental-web-platform-features, there is now WPT coverage for this feature by default (without a virtual test suite).
Link to entry on the feature dashboard
https://www.chromestatus.com/feature/5633521622188032
Requesting approval to remove too?
Yes; the removal is currently implemented behind the flag #cookies-without-same-site-must-be-secure. Target milestone for removal is M80.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAE24OxzwBG3mTvZfY%3DY3mPbdRUNwukweawGhZ5GOnXw7LQNxAA%40mail.gmail.com.
Yes, CookieInsecureAndSameSiteNone is the relevant UseCounter. I was looking at the stats on UMA, where it seems the numbers are a tad lower than on the chromestatus view.We are hoping to get a better sense of what kinds of requests carry SameSite=None but insecure cookies when the next batch of HTTP Archive data comes out by manually looking at some of the URLs.Based on UseCounter UKM data, it looks like the top 100 sites account for 9% of page visits with insecure SameSite=None cookies in a third party context, so there's a pretty diverse set of sites. Interestingly, the vast majority of these page visits are to https origins (top level site).
To unsubscribe from this group and stop receiving emails from it, send an email to blin...@chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAE24Oxzn1b0owbG8-AxN8DrYbJe913DfAq8tS9wAz_8iXXerFQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAE24Oxx3Qvco90AYkRfy1ov-WUgebARKmAKBLa6xsTb8mojyvg%40mail.gmail.com.
LGTM3
/Daniel
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEgEEF5TcrU2arBvjiXb4%3DivO-KxXX-sAkemxpZynzOL7w%40mail.gmail.com.