-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SameSite attribute handling needs to be clarified #87
Comments
Strong agreement that Strict should be permitted. I think it is clear in the explainer that we can't allow them (nor Lax) now. |
FWIW it looks like Chrome's implementation currently does not require |
Same confusion here as well. Here https://developers.google.com/privacy-sandbox/blog/chips-origin-trial#cookies_requirements It says: No where it says, same-site NONE is must for partitioned cookie |
That quote actually seems to support Chris actually. The SameSite=none is stated as should, not MUST (not that we are in RFC 2119 territory) and isn't in the list with the Secure requirement. I think that doc does it well, but I think the paragraph "Partitioned cookies should include SameSite=None attribute as well, to allow cookies to be sent in a third-party context in browsers that don't support cookie partitioning." means "Partitioned cookies may need to include the SameSite=None attribute as well, if that attribute was needed before third-party cookie deprecation". But I'm no devrel expert.
|
The SameSite attribute section seems like it was written at a time when only cross-site (A embeds B) Partitioned cookies were supported. Now that we support top-level / ABA Partitioned cookies we should update the section to clarify what happens when you set cookies with
SameSite=Strict; Partitioned
.We should also update the spec and write WPTs :)
@bvandersloot-mozilla FYI since Mozilla is prototyping this
cc @cfredric @DCtheTall
The text was updated successfully, but these errors were encountered: