Contact emails
j...@chromium.org, est...@chromium.org, mk...@chromium.org
Spec
https://tools.ietf.org/html/draft-west-cookie-prefixes
https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone
Link to a tag review or a description about why the tag review process is being skipped.
Summary
Cookie prefixes place a set of restrictions upon the names which may be used for cookies with specific properties. In a nutshell: `__Secure-*` cookies have to have the `Secure` flag, and `__Host-*` cookies have to have `Path=/`, can't have `Domain`, and might require `Secure` (depending on the setter).
Strict secure cookies adds restrictions on cookies marked with the 'Secure' attribute. Currently, Secure cookies cannot be accessed by insecure (e.g. HTTP) origins. However, insecure origins can still add Secure cookies, delete them, or indirectly evict them. This feature modifies the cookie jar so that insecure origins cannot in any way touch Secure cookies. This does leave a carve out for cookie eviction, which still may cause the deletion of Secure cookies, but only after all non-Secure cookies are evicted.
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Yes.
Debuggability
Neither of these features changes anything about how cookies and networking are debuggable today.
Interoperability and Compatibility Risk
Describe the degree of interoperability and compatibility risk you believe this change poses. If this is a brand new feature, please characterize how much we might regret shipping this new feature because we might want to change or remove it in the future. If you don’t have a launch tracking bug or row in the feature dashboard, include in this email links to relevant specs, standards discussions, or documentation about support for the feature in other browsers. Please be thorough here if compatibility risk has changed since your intent to implement.
Prefixes presents very minimal compatibility risk. While technically adding these prefixes could interfere with already existing cookies, our metrics have seen no cookies with these prexfixes in the wild.
Strict secure cookies present a bit more of a risk as they change the behavior of already existing cookies. However, of cookies that are set, fewer than 00.02% are secure cookies set by an insecure scheme. Thus, while we do risk some compatibility issues, they seem likely to be minimal.
OWP launch tracking bug
Entry on the feature dashboard
Why did we switch to __ from $$ ?
Why did we switch to __ from $$ ?
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
As I just mentioned on the Prefixes thread, we plan a slow rollout of Strict Secure (it's implemented behind a Finch Flag). Although the numbers indicate that it should be safe, we want to make sure there are no surprise breakages, and we also want a kill switch if necessary.
OWP launch tracking bug
Entry on the feature dashboard
On Tue, Dec 8, 2015 at 2:22 PM Joel Weinberger <j...@chromium.org> wrote:Contact emails
j...@chromium.org, est...@chromium.org, mk...@chromium.org
Spec
https://tools.ietf.org/html/draft-west-cookie-prefixes
https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone
Link to a tag review or a description about why the tag review process is being skipped.
Summary
Cookie prefixes place a set of restrictions upon the names which may be used for cookies with specific properties. In a nutshell: `__Secure-*` cookies have to have the `Secure` flag, and `__Host-*` cookies have to have `Path=/`, can't have `Domain`, and might require `Secure` (depending on the setter).
Strict secure cookies adds restrictions on cookies marked with the 'Secure' attribute. Currently, Secure cookies cannot be accessed by insecure (e.g. HTTP) origins. However, insecure origins can still add Secure cookies, delete them, or indirectly evict them. This feature modifies the cookie jar so that insecure origins cannot in any way touch Secure cookies. This does leave a carve out for cookie eviction, which still may cause the deletion of Secure cookies, but only after all non-Secure cookies are evicted.
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Yes.
Debuggability
Neither of these features changes anything about how cookies and networking are debuggable today.
Interoperability and Compatibility Risk
Describe the degree of interoperability and compatibility risk you believe this change poses. If this is a brand new feature, please characterize how much we might regret shipping this new feature because we might want to change or remove it in the future. If you don’t have a launch tracking bug or row in the feature dashboard, include in this email links to relevant specs, standards discussions, or documentation about support for the feature in other browsers. Please be thorough here if compatibility risk has changed since your intent to implement.
Prefixes presents very minimal compatibility risk. While technically adding these prefixes could interfere with already existing cookies, our metrics have seen no cookies with these prexfixes in the wild.
Strict secure cookies present a bit more of a risk as they change the behavior of already existing cookies. However, of cookies that are set, fewer than 00.02% are secure cookies set by an insecure scheme. Thus, while we do risk some compatibility issues, they seem likely to be minimal.
Does this mean that 0.02% of existing cookies currently set by insecure domains will now have changed (and broken I think) semantics? Or 0.002%?
Do you know of examples, or specific sites we could reach out to?
e wanted to give a heads up that we're planning on rolling out Strict Secure Cookies to all of stable shortly