I guess the end point being..I'm not sure SameSite should really be mentioned in the context of a CSRF solution (even with ubiquitous browser support), since lots and lots of sites have subdomains of lesser trust.
2
2
Which begs the question...why can’t we have SameOrigin cookies 😀. Get to work @mikewest 😛.
3
3
That is part of the HTTP state tokens proposal, fwiw. speakerdeck.com/mikewest/coo… and mikewest.github.io/http-stat…
2
1
9
Glancing at it I’m not sure it does. I basically want the ability for foo.bar.com and bar.com to be able to opt out of all the cookie setting/sharing shenanigans without requiring separate TLD+1s.
1
You can kinda get part way there if you ensure every single cookie is __host prefixed. That is doable but slightly annoying. Leaking cookies to some subdomains but not all subdomains is not really doable at all today.
1
1
The fundamental tension is that cookies and domains/subdomains have this “unfortunate history” that is best resolved by picking separate TLD+1s....but brand/product/everyone but security really hates that solution.
3
1
1
3
Related, white-labeled domains (eg support.brand.tld pointing to ZenDesk) could mean auth cookies flowing to the partner site.
The secure solve for cookie bleeding is to put the partner site behind a reverse proxy and strip off all cookies except those needed by the site.
2
1
The analogy that comes to mind is this is like telling folks not to use third party library code for dependencies because of the risks. It’s 2020 and nearly nobody writes/runs every bit of software associated with running their business. This should be doable.
1
2
It's more opting an entire sub-domain into a control group where the only cookies it gets are those that it sets and nothing more (except maybe whitelisted cookies?)
No idea how to make that happen without adding yet more craziness into the dumpster that is cookies.
Apr 26, 2020 · 4:55 PM UTC
2



