-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allowing SameSite=None Cookies in First-Party Sandboxed Contexts #1165
Comments
Thanks for your request. I have a few questions about this proposal.
|
I felt that considering the ancestor chain could be more of an implementation detail so I chose to omit that (although that will likely be required for the Chromium implementation). If this value is set in a cross-site embed, allowing the embedded frame to access a SameSite=None cookie from its domain seems like it would allow a 3PC. I can add this to the specification if this detail is agreed upon, just wanted to keep it broad to start.
This directive will not apply to document cookies for the reasoning you mentioned. In sandboxed contexts,
Since the origin of the sandboxed document is opaque, I dont quite understand how adding a partitioned attribute would change this behavior since the context would still be considered cross-site for 3PC blocking regardless of the partitioned attribute. Not sure how CHIPS is implemented in Mozilla but I would additionally assume for the CHIPS part, if the |
I think we should discuss and specify the ancestor chain details, @aamuley maybe we could file an issue for that on the explainer? That's also my understanding of the partition key, but it would be great if we had tests for this. |
CHIPS cookies are allowed in cross-site contexts when 3PC is blocked, so I thought the |
Request for Mozilla Position on an Emerging Web Specification
@
-mention GitHub accounts): @aamuley @DCtheTallOther information
When third-party cookies (3PC) are blocked by Chrome and Firefox, contexts with the
Content-Security-Policy: sandbox
header or <iframe>sandbox
attribute are no longer able to useSameSite=None
cookies. The frame must include theallow-same-origin
value to use cookies, which relaxes many security protections including the opaque origin.We want to restore existing behavior and enable a frame to signal the browser to include
SameSite=None
cookies in first-party requests from sandboxed frames when 3PC restrictions are active with theallow-same-site-none-cookies
valueThe text was updated successfully, but these errors were encountered: