The Future of Cookies 🍪
…in Web Standards
This session is part of an ongoing conversation in
Privacy CG, IETF HTTP WG, and more.
We won’t find all the solutions today, so let’s keep discussing it.
Background: Specifications
Cookie Innovation in Browsers
SameSite Cookies
1 Firefox is attempting to ship “Lax” by default but runs into compat issues with Chrome, see https://github.com/httpwg/http-extensions/issues/2104
SameSite Cookies
Challenges:
Partitioned Cookies (CHIPS)
Challenges:
Blocking cross-site cookies & SAA
Challenges:
Discussion Topics
Cookie Layering
Cookie Layering
Goals for a new architecture?
Rough Idea: Division of labor
HTML (document.cookie)
Fetch
Cookies RFC
“Cookie” Concept
“Cookie Store” Concept
Clear Site Data
Defines overridable defaults for header generation / Set-Cookie handling for basic UAs (curl, wget).
Division of labor
IETF:
WHATWG Fetch & HTML
Align on semantics of cross-site cookie blocking
Align on semantics of cross-site cookie blocking
1 When SameSite is unspecified, Chromium currently uses "Lax-Allowing-Unsafe" enforcement to account for some site compatibility issues.
Specific scenarios that need alignment
Scenario 1: Same-site with top-level document, but has one or more cross-site ancestors
Options:
Specific scenarios that need alignment
Scenario 2: Cross-site to same-site embedded requests
Options:
Specific scenarios that need alignment
Scenario 3: Top-level cross-site POST requests
Options:
Specific scenarios that need alignment
Scenario 4: Extensions (is this out of scope for W3C?)
Options:
Current behavior in Chrome when third-party cookies are blocked
Open Discussion