Hi Domenic,

If I understand correctly you're concerned about how cookies will behave 
along same-site host boundaries. This proposal does not alter that behavior.

A simple cookie `a=b` will currently not be sent to any host other than the 
one that originally set it. If a developer would like the cookie to be sent 
to other same-site hosts they need to use the `Domain` attribute e.x.: 
`a=b; Domain=example.com`. This will continue to be the case once/if this 
proposal is implemented.

> if the plan (per the explainer) is to no longer share cookies between 
different origins under the same site.
Origin-Bound Cookie is focused on adding the scheme & port components of 
the origin to cookies rather than tightening the existing host related 
rules. So while a simple cookie `a=b` can be considered origin bound, that 
restriction can continue to be loosened with the `Domain` attribute.

Maybe one day `Domain` could be deprecated/removed and cookies would be 
completely origin bound, but that's well out of the scope of this proposal.

On Thursday, May 26, 2022 at 2:10:49 PM UTC-4 Domenic Denicola wrote:

> On Thu, May 26, 2022 at 12:53 PM Steven Bingler <bing...@chromium.org> 
> wrote:
>
>> Contact emails
>>
>> bing...@chromium.org, miketa...@chromium.org
>>
>> Explainer
>>
>> https://github.com/sbingler/Origin-Bound-Cookies
>>
>> Specification
>>
>> Link 
>> <https://mikewest.github.io/cookie-incrementalism/draft-west-cookie-incrementalism.html#name-origin-bound-cookies>
>>
>> Summary
>>
>> Binds cookies to their setting origin (by default) such that they're only 
>> accessible by that origin. I.e., sent on a request or visible through 
>> `document.cookie`
>>
>> Cookies may ease the host and port binding restrictions through use of 
>> the `Domain` attribute but all cookies will be bound to their setting 
>> scheme.
>>
>>
>> Blink component
>>
>> Blink>Network 
>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ENetwork>
>>
>> Motivation
>>
>> Cookies are not secure by default. A simple cookie `Set-Cookie: foo=bar` 
>> can be accessed by any scheme or port regardless whichever set it 
>> originally. This can lead to users' data leaking to attackers or allowing 
>> attackers to alter users' state.
>>
>> By only sending cookies back to the origins that set them (binding them 
>> to the origins) we can protect cookies (by default) from untrusted origins.
>>
>>
>> Initial public proposal
>>
>> https://github.com/mikewest/scheming-cookies
>>
>> Search tags
>>
>> scheme bound cookies 
>> <https://chromestatus.com/features#tags:scheme%20bound%20cookies>, 
>> scheme-bound 
>> cookies <https://chromestatus.com/features#tags:scheme-bound%20cookies>, 
>> origin 
>> bound cookies 
>> <https://chromestatus.com/features#tags:origin%20bound%20cookies>, 
>> origin-bound 
>> cookies <https://chromestatus.com/features#tags:origin-bound%20cookies>, 
>> scheme 
>> bound cookie 
>> <https://chromestatus.com/features#tags:scheme%20bound%20cookie>, 
>> scheme-bound 
>> cookie <https://chromestatus.com/features#tags:scheme-bound%20cookie>, 
>> origin 
>> bound cookie 
>> <https://chromestatus.com/features#tags:origin%20bound%20cookie>, 
>> origin-bound 
>> cookie <https://chromestatus.com/features#tags:origin-bound%20cookie>, 
>> cookie <https://chromestatus.com/features#tags:cookie>, cookies 
>> <https://chromestatus.com/features#tags:cookies>
>>
>> TAG review
>>
>> None yet. Related: the review for a similar proposal 
>> <https://github.com/w3ctag/design-reviews/issues/483> was positive 
>> <https://github.com/w3ctag/design-reviews/issues/483#issuecomment-634767557>
>>
>> TAG review status
>>
>> Pending
>>
>> Risks
>>
>> Interoperability and Compatibility
>>
>> As this change explicitly prevents cookies from being accessible between 
>> schemes and ports (without use of the `Domain` attribute), any sites 
>> relying on that behavior will experience breakage.
>>
>> Initial metrics show that of cookies sent by Chrome in the 7 days leading 
>> to May 23th 2022:
>>
>>    - 
>>    
>>    0.39% are between schemes
>>    - 
>>    
>>    0.09% are between port values
>>    
>>
>> It’s difficult to convert these metrics into expected breakages as not 
>> every cookie that is sent between schemes or ports is needed in that 
>> context. However this does give an idea of the upper bound of breakage. 
>> Because of the high potential impact, we will be proceeding carefully 
>> during an eventual launch, if given LGTMs to ship.
>>
>
> What about cookies that are shared between subdomains (i.e. different 
> origins under the same site)? That seems likely to be much higher than 
> this, e.g. cookies shared between https://www.example.com and 
> https://example.com. So it is hard to believe the above numbers represent 
> a sort of upper bound, if the plan (per the explainer) is to no longer 
> share cookies between different origins under the same site.
>  
>
>>
>>
>> Gecko: No signal
>>
>>
>> WebKit: No signal
>>
>> Web developers: No signals
>>
>> Other signals:
>>
>> WebView application risks
>>
>> Yes, any WebView applications that access cookies across origins may 
>> potentially be affected.
>>
>>
>> Debuggability
>>
>> Devtools will be updated to support viewing and editing the new scheme 
>> and port components.
>>
>> Is this feature fully tested by web-platform-tests 
>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>> ?
>>
>> Not currently, but web platform tests will be added before launch.
>>
>> Flag name
>>
>> No flags yet.
>>
>> Requires code in //chrome?
>>
>> False
>>
>> Tracking bug
>>
>> https://crbug.com/1170548
>>
>> Launch bug
>>
>> https://crbug.com/1170557
>>
>> Estimated milestones
>>
>> No milestones specified
>>
>>
>> Link to entry on the Chrome Platform Status
>>
>> https://chromestatus.com/feature/4945698250293248
>>
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8ddc0664-bbf4-4af5-806f-cec7e5f84ae0n%40chromium.org
>>  
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8ddc0664-bbf4-4af5-806f-cec7e5f84ae0n%40chromium.org?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/9c153646-c813-4100-aa68-4e2887281135n%40chromium.org.

Reply via email to