Totally….this was parlty what came up in our internal discussion. __Host seems like the much more powerful means of constraining things.
2
3
I guess the end point being..I'm not sure SameSite should really be mentioned in the context of a CSRF solution (even with ubiquitous browser support), since lots and lots of sites have subdomains of lesser trust.
2
2
Which begs the question...why can’t we have SameOrigin cookies 😀. Get to work @mikewest 😛.
3
3
That is part of the HTTP state tokens proposal, fwiw. speakerdeck.com/mikewest/coo… and mikewest.github.io/http-stat…
2
1
9
Glancing at it I’m not sure it does. I basically want the ability for foo.bar.com and bar.com to be able to opt out of all the cookie setting/sharing shenanigans without requiring separate TLD+1s.
1
You can kinda get part way there if you ensure every single cookie is __host prefixed. That is doable but slightly annoying. Leaking cookies to some subdomains but not all subdomains is not really doable at all today.
1
1
The fundamental tension is that cookies and domains/subdomains have this “unfortunate history” that is best resolved by picking separate TLD+1s....but brand/product/everyone but security really hates that solution.
3
1
1
3
Related, white-labeled domains (eg support.brand.tld pointing to ZenDesk) could mean auth cookies flowing to the partner site.
The secure solve for cookie bleeding is to put the partner site behind a reverse proxy and strip off all cookies except those needed by the site.
2
1
Agree, but there are times when the Business requires a white-label service and refuses to put it behind an off-brand domain (eg brand-support.tld).
A policy against it only provides so much air cover...
Apr 26, 2020 · 1:08 PM UTC



