--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DcxMFdZGgNRvy2je8GiSLFOV2ROax6%3DX0RiUsH2VYSNgQ%40mail.gmail.com.
This is very exciting! Any thoughts on extending this to other storage mechanisms, such as localStorage or IndexedDB? It seems like a good end state that in the end non-secure pages can only store state (whether in cookies or not) for the duration of a session.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
Something that might be interesting is a modification to the redirect loop logic: if we find ourselves in redirect loop and one of the sites in the loop is one we've partially deleted cookies for, we could delete the rest of the cookies and see if that breaks the loop. Perhaps it would be better to ask for user permission first.
I like the idea of having "branch date - N days" as the cut-off, rather than "now - N days". It would make the clustering of breakages around release dates even more pronounced, hopefully increasing the chances for developers to figure out why their users were complaining that their site was broken.
This is very exciting! Any thoughts on extending this to other storage mechanisms, such as localStorage or IndexedDB? It seems like a good end state that in the end non-secure pages can only store state (whether in cookies or not) for the duration of a session.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/847422ac-7dd2-48c7-8beb-30d9751a1884%40chromium.org.
Could a malicious party take advantage of this to delete a user's cookies by having http:// resources pointing to a third party? Or are cookies nowadays always marked secure and would not be affected?
---mike
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DeXP9nkb1%3DNoqugZD%2BEpSyASB7TCGYGv9X14awhs8vVew%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/e22f30af-ba30-47c2-89d0-e2c9f58542a3%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaDwM%3DTLHXNpkgpiz%3D7e8LpDoFc5e5xCnb%2BqFmfs5bRWbw%40mail.gmail.com.
I don't think I understand your suggestion. The current proposal looks at the delta between a cookie's creation date and today: if the cookie was created on April 1st, 2017, and I try to use it nonsecurely today, it's deleted because it's more than a year old. Is your suggestion that we'd stop looking at the age of the cookie, and instead delete any cookie older than March 20th, 2017 (when M65 was released?). I guess that might be reasonable. I'm not sure if it's easier or harder for developers to debug, but it might be simpler to message in a console error?
On Fri, Apr 6, 2018 at 6:13 PM Mike West <mk...@chromium.org> wrote:Hey, Daniel!On Fri, Apr 6, 2018 at 6:06 PM Daniel Bratell <bra...@opera.com> wrote:Could a malicious party take advantage of this to delete a user's cookies by having http:// resources pointing to a third party? Or are cookies nowadays always marked secure and would not be affected?Yes, this is a risk.Only something like ~7% of cookies are marked as `Secure` (meaning that they can't be read or written to from non-secure connections). Some larger percentage of cookies are covered with strong HSTS configurations that prevent anyone from loading an origin to which a given cookie might be sent over HTTP, malicious or not. It's certainly possible that sites which are still reachable over HTTP could be affected by this intent. Of course, it's also true that those cookies would be available to network attackers, which is exactly what this intent aims to mitigate.At the end of the day, developers have clear options: they can adding the `Secure` attribute to cookies they wish to protect, and/or they can configure a strong HSTS policy to protect their sites more generally. I'd be quite happy if we could encourage either to be adopted more widely.
Could we mitigate that risk to non-suspecting (but non-HSTS) secure origins by marking those cookies as `secure` instead of deleting them? (as you pointed out in your GH explainer)
I suspect that if we want to encourage the adoption of `secure` or HSTS, it'd have to be more explicit (e.g. perform the same to cookies that don't satisfy either, which is another option you pointed out in your explainer). Seems orthogonal to the risk that Daniel pointed out.
I don't think I understand your suggestion. The current proposal looks at the delta between a cookie's creation date and today: if the cookie was created on April 1st, 2017, and I try to use it nonsecurely today, it's deleted because it's more than a year old. Is your suggestion that we'd stop looking at the age of the cookie, and instead delete any cookie older than March 20th, 2017 (when M65 was released?). I guess that might be reasonable. I'm not sure if it's easier or harder for developers to debug, but it might be simpler to message in a console error?Sorry, I wasn't very clear. I did indeed mean expire based on the date of the cookie. I suggested using the branch date rather than the release date because release dates are harder to pin down. I guess the counter argument is that having a bunch of cookies that are almost exactly a year old all vanish at once is easier to understand than when cookies that are 58 weeks old vanish.
I'm still not following the proposal. Sorry! Can you make it a little more concrete? For example, M66 branched on March 1st. 2018, How would we use that date to determine whether or not a cookie would be allowed through or not? Do we say "M66 does not support cookies with a creation date prior to March 1st, 2017"? I think that might be interesting, actually, as it would give us a pretty clear way of communicating a schedule to developers.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAC_ixdx1dJs7k4KEgckHOZTNPxa2q-ow0czu9K_NBrTwHHXfOQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/op.zg64qnoprbppqq%40cicero2.linkoping.osa.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEjMiGbC3GAOoE3KcoZ%2B9V1eWoVmi7GFV%3DKXVn%2BzJpwzvQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOqqYVF1SEsLZ96ymbSH6EvEhiVdgu%2BXXr9dh9A5dwjz7nkBdA%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAC_ixdx1dJs7k4KEgckHOZTNPxa2q-ow0czu9K_NBrTwHHXfOQ%40mail.gmail.com.
--/* Opera Software, Linköping, Sweden: CEST (UTC+2) */
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/op.zg64qnoprbppqq%40cicero2.linkoping.osa.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEjMiGbC3GAOoE3KcoZ%2B9V1eWoVmi7GFV%3DKXVn%2BzJpwzvQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAC_ixdx1dJs7k4KEgckHOZTNPxa2q-ow0czu9K_NBrTwHHXfOQ%40mail.gmail.com.
--/* Opera Software, Linköping, Sweden: CEST (UTC+2) */
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/op.zg64qnoprbppqq%40cicero2.linkoping.osa.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEjMiGbC3GAOoE3KcoZ%2B9V1eWoVmi7GFV%3DKXVn%2BzJpwzvQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOqqYVF1SEsLZ96ymbSH6EvEhiVdgu%2BXXr9dh9A5dwjz7nkBdA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/0bc721eb-9aeb-4f7e-8a13-020ef33c1a5c%40chromium.org.