- From: Anusha Muley <notifications@github.com>
- Date: Wed, 16 Oct 2024 08:13:48 -0700
- To: w3ctag/design-reviews <design-reviews@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
- Message-ID: <w3ctag/design-reviews/issues/1004@github.com>
こんにちは TAG-さん! I'm requesting a TAG review for allowing `SameSite=None` cookies in first-party sandboxed contexts in browsers with third-party cookie (3PC) restrictions. In order to prevent malicious attacks from untrusted content, servers can include a `Content-Security-Policy: sandbox` HTTP header or sandbox attribute on an embedded iframe. This policy results in the browser treating the frame as an opaque origin, and requests originating from it cannot include `SameSite=Strict/Lax` cookies. However, for the purposes of 3PC blocking, the opaque origin also causes the browser to treat same-site subresource embeds on the top-level as cross-site, so `SameSite=None` cookies are also excluded from requests. To preserve legacy behavior and mitigate future breakage due to 3PC blocking, we would like to introduce a method for servers to indicate to the browser that they wish a sandboxed context to include first-party `SameSite=None` cookies in requests using a `Content-Security-Policy` or HTML `iframe` sandboxing value: `'allow-same-site-none-cookies'`. - Explainer (minimally containing user needs and example code): https://github.com/explainers-by-googlers/csp-sandbox-allow-same-site-none-cookies/blob/main/README.md - User research: N/A - Security and Privacy self-review: https://github.com/explainers-by-googlers/csp-sandbox-allow-same-site-none-cookies/blob/main/tag_self_review.md - GitHub repo: https://github.com/explainers-by-googlers/csp-sandbox-allow-same-site-none-cookies - Primary contacts (and their relationship to the specification): - Anusha Muley (@aamuley, Google Chrome, author) - Dylan Cutler (@DCtheTall, Google Chrome, author) - Organization/project driving the design: Google Chrome - External status/issue trackers for this feature (publicly visible, e.g. Chrome Status): https://chromestatus.com/feature/5090336588955648 Further details: - [X] I have reviewed the TAG's [Web Platform Design Principles](https://www.w3.org/TR/design-principles/) - The group where the incubation/design work on this is being done (or is intended to be done in the future): Web Application Security WG - The group where standardization of this work is intended to be done ("unknown" if not known): unknown - Existing major pieces of multi-implementer review or discussion of this design: - Initial Proposal Issue: https://github.com/w3c/webappsec-csp/issues/664 - TPAC discussion: https://pad.w3.org/p/WebAppSec_2024-09-26#L505 - Major unresolved issues with or opposition to this design: None so far - This work is being funded by: Google -- Reply to this email directly or view it on GitHub: https://github.com/w3ctag/design-reviews/issues/1004 You are receiving this because you are subscribed to this thread. Message ID: <w3ctag/design-reviews/issues/1004@github.com>
Received on Wednesday, 16 October 2024 15:13:51 UTC