>
> On Thu, Sep 8, 2016 at 1:28 PM, Anne van Kesteren <annevk@annevk.nl
> <mailto:annevk@annevk.nl>> wrote:
>
> On Thu, Sep 8, 2016 at 1:16 PM, Artur Janc <aaj@google.com
> <mailto:aaj@google.com>> wrote:
> > An attacker with an XSS can set any cookie they want to make the
> exfiltrated
> > data visible across the whole top-level domain, so they're not
> bound by
> > flags on any existing cookies.
>
> That depends on whether or not we offer ways to restrict cookie APIs.
> (I think there's a proposal for that somewhere.)
>
Yes. Mike West wrote draft-ietf-httpbis-cookie-alone
https://tools.ietf.org/html/draft-ietf-httpbis-cookie-alone-01 which
updates RFC6265 by removing a non-secure origin's ability to set cookies
with a secure flag, and to overwrite cookies whose secure flag is set.
This deprecation improves the isolation between HTTP and HTTPS origins,
and reduces the risk of malicious interference.
There are a few vectors that need to be accounted for like cookie
forcing in addition to normal set-cookie calls that overwrite secure
cookies.
- Jim