Re: comments on draft-west-first-party-cookies-07

=JeffH <Jeff.Hodges@KingsMountain.com> Tue, 28 June 2016 01:52 UTC

Return-Path: <ietf-http-wg-request+bounce-httpbisa-archive-bis2juki=lists.ie@listhub.w3.org>
X-Original-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Delivered-To: ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 696CE12D51C for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 27 Jun 2016 18:52:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.447
X-Spam-Level:
X-Spam-Status: No, score=-8.447 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=kingsmountain.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bIXPAw55OhxG for <ietfarch-httpbisa-archive-bis2Juki@ietfa.amsl.com>; Mon, 27 Jun 2016 18:52:53 -0700 (PDT)
Received: from frink.w3.org (frink.w3.org [128.30.52.56]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EAC612D770 for <httpbisa-archive-bis2Juki@lists.ietf.org>; Mon, 27 Jun 2016 18:52:52 -0700 (PDT)
Received: from lists by frink.w3.org with local (Exim 4.80) (envelope-from <ietf-http-wg-request@listhub.w3.org>) id 1bHi94-0000iO-QS for ietf-http-wg-dist@listhub.w3.org; Tue, 28 Jun 2016 01:48:58 +0000
Resent-Date: Tue, 28 Jun 2016 01:48:58 +0000
Resent-Message-Id: <E1bHi94-0000iO-QS@frink.w3.org>
Received: from lisa.w3.org ([128.30.52.41]) by frink.w3.org with esmtps (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <Jeff.Hodges@kingsmountain.com>) id 1bHi8w-0000hY-8A for ietf-http-wg@listhub.w3.org; Tue, 28 Jun 2016 01:48:50 +0000
Received: from gproxy9-pub.mail.unifiedlayer.com ([69.89.20.122]) by lisa.w3.org with smtp (Exim 4.80) (envelope-from <Jeff.Hodges@kingsmountain.com>) id 1bHi8p-0006R3-RU for ietf-http-wg@w3.org; Tue, 28 Jun 2016 01:48:48 +0000
Received: (qmail 9609 invoked by uid 0); 28 Jun 2016 01:48:16 -0000
Received: from unknown (HELO cmgw3) (10.0.90.84) by gproxy9.mail.unifiedlayer.com with SMTP; 28 Jun 2016 01:48:16 -0000
Received: from box514.bluehost.com ([74.220.219.114]) by cmgw3 with id C1oB1t0082UhLwi011oE0A; Mon, 27 Jun 2016 19:48:16 -0600
X-Authority-Analysis: v=2.1 cv=KpLehwmN c=1 sm=1 tr=0 a=9W6Fsu4pMcyimqnCr1W0/w==:117 a=9W6Fsu4pMcyimqnCr1W0/w==:17 a=L9H7d07YOLsA:10 a=9cW_t1CCXrUA:10 a=s5jvgZ67dGcA:10 a=IkcTkHD0fZMA:10 a=XYUc-DgfXtMA:10 a=-GPFTR9Xtg4A:10 a=pD_ry4oyNxEA:10 a=1XWaLZrsAAAA:8 a=NEAV23lmAAAA:8 a=bt8Zh30PAAAA:8 a=48vgC7mUAAAA:8 a=ieNpE_y6AAAA:8 a=SSmOFEACAAAA:8 a=ekYV4lpRAAAA:8 a=M0mfmNG-mSvKdkogbmgA:9 a=jH7PhDgSJbPK_GCy:21 a=r6Q_2FzLFMSB--1A:21 a=miZKt3S9vrh5Vyi6:21 a=QEXdDO2ut3YA:10 a=L03L2QfmqWoA:10 a=4woHliteqwUA:10 a=nJcEw6yWrPvoIXZ49MH8:22 a=Bn2pgwyD2vrAyMmN8A2t:22 a=oiBpN-rYJXxenNlZAEox:22 a=w1C3t2QeGrPiZgrLijVG:22 a=lOZzU2MLX5qQKtuoMSD9:22 a=zjWhRoSqWz9hl55Hdlzg:22 a=mrCxpU6zTNQDHnudu_9Q:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type: MIME-Version:Date:Message-ID:Subject:From:To; bh=Xa7Xd2uKaqvSQXM/B2+AxgMgxepjgMuJsr2bktGBIHQ=; b=CY4VFcITYDJHEwEgnZI7/Mbqpr z4CiVAMXzJMyufrlAP9Z+df4NlFI23UtQRb+5J3/EJzLmlG/V1oOWz//wArItg/uzrLexMSM1H/ym nirsMaSe+ypgO1MLLwMWaH+QG;
Received: from [73.202.80.238] (port=56989 helo=[192.168.11.22]) by box514.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.86_2) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1bHi8J-00080R-9x for ietf-http-wg@w3.org; Mon, 27 Jun 2016 19:48:11 -0600
To: IETF HTTP <ietf-http-wg@w3.org>
From: =JeffH <Jeff.Hodges@KingsMountain.com>
Message-ID: <5771D758.2050503@KingsMountain.com>
Date: Mon, 27 Jun 2016 18:48:08 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 73.202.80.238 authed with jeff.hodges+kingsmountain.com}
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box514.bluehost.com
X-AntiAbuse: Original Domain - w3.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - KingsMountain.com
X-Source-IP: 73.202.80.238
X-Exim-ID: 1bHi8J-00080R-9x
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: ([192.168.11.22]) [73.202.80.238]:56989
X-Source-Auth: jeff.hodges+kingsmountain.com
X-Email-Count: 0
X-Source-Cap: a2luZ3Ntb3U7a2luZ3Ntb3U7Ym94NTE0LmJsdWVob3N0LmNvbQ==
Received-SPF: pass client-ip=69.89.20.122; envelope-from=Jeff.Hodges@kingsmountain.com; helo=gproxy9-pub.mail.unifiedlayer.com
X-W3C-Hub-Spam-Status: No, score=-7.0
X-W3C-Hub-Spam-Report: BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, W3C_IRA=-1, W3C_IRR=-3, W3C_WL=-1
X-W3C-Scan-Sig: lisa.w3.org 1bHi8p-0006R3-RU 0d9571eb3a5f3a6f1ef0bad1bd68f5ad
X-Original-To: ietf-http-wg@w3.org
Subject: Re: comments on draft-west-first-party-cookies-07
Archived-At: <http://www.w3.org/mid/5771D758.2050503@KingsMountain.com>
Resent-From: ietf-http-wg@w3.org
X-Mailing-List: <ietf-http-wg@w3.org> archive/latest/31804
X-Loop: ietf-http-wg@w3.org
Resent-Sender: ietf-http-wg-request@w3.org
Precedence: list
List-Id: <ietf-http-wg.w3.org>
List-Help: <http://www.w3.org/Mail/>
List-Post: <mailto:ietf-http-wg@w3.org>
List-Unsubscribe: <mailto:ietf-http-wg-request@w3.org?subject=unsubscribe>

Hi again,

Quoting Mike West <mkwst@google.com> [from the very end of Mike's
message, bringing this up to the front here..]
  >
  > I've made a number of changes in..

[1]
https://github.com/httpwg/http-extensions/commit/263db30abb6f0f0b5a0cc3c2c3424108b3c171bc

[2]
https://raw.githubusercontent.com/httpwg/http-extensions/master/draft-ietf-httpbis-cookie-same-site.md

[ and he also uploaded..

[3] https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site

..tho note that [2] contains edits not yet manifested in [3] ]

  > ..which I hope addresses the [below]. I'll make more changes to the
  > various algorithms in patches to HTML, Fetch, URL, et al.

Ok, I reviewed older mailing list discussions (eg [6], below), which i
hadn't earlier (sorry), and have some musings (below, at [4]) wrt the
interfaces between 6265bis, [FETCH], [HTML], RFC7230.


  > On Sat, Jun 18, 2016 at 12:21 AM, <jeff.hodges@kingsmountain.com>
  > wrote:
  >
[...]
  >>
  >> * RFC6265 does not wrap its algorithm variables in double quotes
  >> (as this draft is doing), and also hyphenates multi-word variable
  >> names (even ones that aren't ABNF rule names). Are you suggesting
  >> that 6265bis ought to adopt the style used in this draft (where alg
  >> varbs are quoted), or will the below proposed updates to 6265bis
  >> adopt RFC6265's present style?
  >>
  >> I advocate for the latter -- e.g., I suggest: s/"site for
  >> cookies"/site-for-cookies/g
  >>
  >
  > I'm used to W3C specs, where we can actually mark up variables in a
  > way that gives them semantic meaning. I'm happy to align this
  > document with IETF style; if hyphenated names are preferred, I'll
  > start adding hyphens.

yeah, I think we'll want to be minimally-invasive when doing rfc6265bis
and so adopting its style will lower impedance mismatch.

though, I notice that in [2], you substituted backquotes `...` for
double quotes around algorithm variables, cookie attrs, etc, and that
_might_ work if applied throughout 6265bis, we'd have to see what other
reviewers think (rfc-editor), etc.


  >> * RFC6265 uses the terms host, server, domain in its algorithms,
  >> whereas this spec introduces the terms site, same site, top-level
  >> site, "site for cookies". This may cause impedance mismatches when
  >> attempting to merge this draft into 6265bis. Perhaps just something
  >> to be aware of and address at that time.
  >>
  >
  > Agreed. I suspect we'll want to move some of these definitions
  > elsewhere (HTML, Fetch, and/or URL, for instance).

ok, this intersects with musings (below at [4]) wrt the interfaces
between 6265bis, [FETCH], [HTML], RFC7230.


  >> * when comparing host names, or portions thereof, they ought to
  >> first be canonicalized per RFC6265 S 5.1.2, yes?
  >
  > Yes.

Ok, tho I do not see canonicalization added within [1] or [2] as yet
(there's indications where it might be added in my original comments, HTH)

[...]

  >>> 1.1. Goals
  >>
  >> might these be items that should be added into 6265bis' various
  >> "considerations" sections (as appropriate)?
  >
  > I think that's reasonable in the combined document, but in a
  > stand-alone document targeting a specific feature, it seems
  > reasonable to be explicit about that feature's raison d'etre right up
  > front.

agreed.  I am only suggesting that there ought to be a Note or something
on each (sub)section of -cookie-same-site (nee -first-party-cookies)
(and other cookie-patching I-Ds) that is intended to be material for
inclusion in 6265bis.


[...]
  >>> depth against attacks which require embedding an authenticated
  >>> request into an attacker-controlled context:
  >>>
  >>> 1. Timing attacks which yield cross-origin information leakage
  >>> (such as those detailed in [pixel-perfect]) can be substantially
  >>> mitigated by setting the "SameSite" attribute on authentication
  >>> cookies. The attacker will only be able to embed unauthenticated
  >>> resources, as embedding mechanisms such as "<iframe>" will yield
  >>> cross-site requests.
  >>>
  >>> 2. Cross-site script inclusion (XSSI) attacks are likewise
  >>> mitigated by setting the "SameSite" attribute on authentication
  >>> cookies. The attacker will not be able to include authenticated
  >>> resources via "<script>" or "<link>", as these embedding
  >>> mechanisms will likewise yield cross-site requests.
  >>
  >> do you actually mean `<script src="..." />` rather than
  >> `<script>...</script>` here?
  >>
  >
  > Yes, but I'm not sure it's valuable to make that distinction. I meant
  > to refer to "the <script> tag" here, as that's the mechanism by which
  > the request would be triggered.

from my perspective, after having been thrown into the websec deep-end
not terribly long ago, it is very helpful if specs can go a tad extra
distance to be explicit, rather than be implicit and rely upon the
reader intuitively realizing what is being implied.

perhaps writing it like..

    2. Cross-site script inclusion (XSSI) attacks are likewise
    mitigated by setting the "SameSite" attribute on authentication
    cookies. For example, an attacker will not be able to include
    authenticated resources via the "<script>" tag (with a "src"
    attribute) or the "<link>" tag (with a "href" attribute), as
    these embedding mechanisms will likewise yield cross-site
    requests.

..would work?



  >> 1.2. Examples
  >>>
  >>> Same-site cookies are set via the "SameSite" attribute in the
  >>> "Set-
  >>
  >> s/set/declared/ ?
  >>
  >
  > The header is called `Set-Cookie`. Given that, "set" seems like the
  > right verb here.

ok.



  >> > 2.  Terminology and notation
  >>
  >> is the intention that the terminology in this immediate section
  >> would be added to 6265bis' section 2.3 "Terminology" ?
  >>
  >
  > Yup. Or elsewhere, as noted above. I've talked a bit with Anne about
  > moving some things from here into HTML/URL/Fetch, and I think he's
  > amenable.

Links to discussion...?



  >>> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
  >>> NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
  >>> "OPTIONAL" in this document are to be interpreted as described in
  >>> [RFC2119].
  >>>
  >>> This specification uses the Augmented Backus-Naur Form (ABNF)
  >>> notation of [RFC5234].
  >>>
  >>> Two sequences of octets are said to case-insensitively match
  >>> each other if and only if they are equivalent under the
  >>> "i;ascii-casemap" collation defined in [RFC4790].
  >>>
  >>> The terms "active document", "ancestor browsing context",
  >>> "browsing context", "document", "WorkerGlobalScope", "sandboxed
  >>> origin browsing context flag", "parent browsing context", "the
  >>> worker's Documents", "nested browsing context", and "top-level
  >>> browsing context" are defined in [HTML].
  >>
  >> add to the above list:
  >>
  >>               Document, shared worker, dedicated worker
  >>
  >
  > Document was already in the list (though uncapitalized), I've added
  > the other two. Thanks!

I am suggesting adding the capitalized Document term, in addition to the
non-capitalized document term, since the former is distinct from the
latter IIUC, and both are used in -cookie-same-site, yes?



  >>> The term "request", as well as a request's "client", "current
  >>> url", "method", and "target browsing context", are defined in
  >>> [FETCH].
  >>
  >> suggest adding request's "initiator" to the list above since it is
  >> used in opening parag of next section
  >
  > Actually, I need to rename the thing I want to talk about here.
  > Fetch defines an "initiator" which isn't what I want. What I want is
  > the origin of the request's client.

Ok, and I see in [2], that you fixed up the  opening parag of next
section to not use "initiator"



  >> Are the below definitions & algorithms in S 2.1 et al slated to be
  >> inserted into 6265bis, e.g., in 6265bis S 5 "User Agent
  >> Requirements"?

?


  >> Also, before diving into same-/cross-site, document-based,
  >> worker-based requests and all, I suggest adding a section here
  >> defining the overall concept of site-for-cookies...
  >>
  >>
  >> 2.1 The Site-for-Cookies Concept
  >>
  >>    A request is the input to the HTML Fetch algorithm [FETCH].
  >>    Initiators of requests have an associated origin, which may
  >>    contain a host name. If so, then the host name contains a
  >>    registered domain, which is the top-most domain on which
  >>    the initiator server-side may set its cookies. Thus this
  >>    registered domain is the initiator's site-for-cookies,
  >>    which is used in determining whether a request is same-site
  >>    or not.

although the terminology in the above suggested parag is incorrect per
your feedback, if the above were to be edited appropriately and
incorporated, I think it'd help clarify this spec (and ultimately this
portion of the already-complex 6265bis).




  >>> 2.1. "Same-site" and "cross-site" Requests
  >>>
  >>> A request is "same-site" if its target's URI's origin's
  >>> registrable domain is an exact match for the request's
  >>> initiator's "site for cookies", and "cross-site" otherwise. To be
  >>> more precise, for a given request ("request"), the following
  >>> algorithm returns "same- site" or "cross-site":
  >>>
  >>> 1. If "request"'s client is "null", return "same-site".
  >>>
  >>> 2. Let "site" be "request"'s client's "site for cookies" (as
  >>> defined in the following sections).
  >>>
  >>> 3. Let "target" be the registrable domain of "request"'s current
  >>> url.
  >>>
  >>> 4. If "site" is an exact match for "target", return "same-site".
  >>>
  >>> 5. Return "cross-site".
  >>
  >>
  >> ISTM there's various issues with the above, below is a suggested
  >> overall revision.
  >>
  >> also, I wonder whether it is a good idea to have this particular
  >> definition to be characterized as an algorithm if they are not
  >> themselves actually incorporated within the normative 6265bis
  >> cookie-processing algorithms. Thus the below is not characterized
  >> as an algorithm...
  >>
  >
  > Thank you for this thoughtful reformulation. I think I'll take a
  > stab at moving these around out of this document first, and will try
  > to incorporate your feedback into those patches to the external
  > documents on which this relies.

by external docs, I take it you mean [FETCH] and [HTML] (and perhaps
[URL]), more down at [4]...



  >>> 3.1. Grammar
  >>>
  >>> Add "SameSite" to the list of accepted attributes in the
  >>> "Set-Cookie" header field's value by replacing the "cookie-av"
  >>> token definition in Section 4.1.1 of [RFC6265] with the following
  >>> ABNF grammar:
  >> >
  >> >    cookie-av      = expires-av / max-age-av / domain-av /
  >> >                     path-av / secure-av / httponly-av /
  >> >                     samesite-av / extension-av
  >> >    samesite-av    = "SameSite" / "SameSite=" samesite-value
  >>                         ^^^^^^^
  >>       this allows for a SameSite attr without a value?
  >>       is that actually used somewhere in the below algorithms?
  >
  > No, this is https://github.com/mikewest/internetdrafts/issues/11
  > <https://github.com/mikewest/internetdrafts/issues/11> :) which I'll
  > fix now that I finally got around to uploading a -00 draft with the
  > contents of the existing -07.

Ok, this fix in [2]..

      samesite-av    = "SameSite=" samesite-value
      samesite-value = "Strict" / "Lax"

..looks fine.



[...]
  >>> 4.1.  The "SameSite" attribute
  >>>
  >>>    The following attribute definition should be considered part of
  >>>    the the "Set-Cookie" algorithm as described in Section 5.2 of
  >>>    [RFC6265]: If the "attribute-name" case-insensitively matches the
  >>>    string "SameSite", the user agent MUST process the "cookie-av" as
  >>>    follows:
  >>>
  >>>    1. If "cookie-av"'s "attribute-value" is not a case-sensitive
  >>>       match for "Strict" or "Lax", ignore the "cookie-av".
  >>>
  >>>    2. Let "enforcement" be "Lax" if "cookie-av"'s "attribute-value"
  >>>       is a case-insensitive match for "Lax", and "Strict" otherwise.
  >>>
  >>>    3. Append an attribute to the "cookie-attribute-list" with an
  >>>       "attribute-name" of "SameSite" and an "attribute-value" of
  >>>       "enforcement".
  >>
  >> oh, so enforcement here is just a local algorithm variable? and
  >> step 3 is actually saying to use the value of enforcement as the
  >> attr-value for SameSite ? if so, perhaps ought to be clarified..
  >>
  >
  > I understand sections 5.2.* of RFC6265 to be accepting an
  > attribute-name and attribute-value string (see step 6 of that
  > document's 5.2). The attribute that's appended to
  > 'cookie-attribute-list' has its own attribute name and value.

understood, and...


  > I agree that this is a little confusing, and that we could make the
  > expected inputs/outputs clearer when we revise the document.

...nevermind, it's ok as-is now that I've re-reviewed RFC6265 sections
5.2.1 - 5.2.6.



[...]
  >> >    offer a robust defense against CSRF as a general category of
  >>>     attack:
  >> >
  >> >    1.  Attackers can still pop up new windows or trigger top-level
  >> >        navigations in order to create a "same-site" request (as
  >> >        described in section 2.1), which is only a speedbump along
  >> >        the road to exploitation.
  >> >
  >> >    2.  Features like "<link rel='prerender'>" [prerendering] can be
  >> >        exploited to create "same-site" requests without the risk
  >> >        of user detection.
  >> >
  >>>     When possible, developers should use a session management
  >>>     mechanism such as that described in Section 5.2 to mitigate the
  >>>     risk of CSRF more completely.
  >>
  >> "Strict" enforcement is not explicitly defined?
  >>
  >> hm, i guess it is defined in S 3.2 -- perhaps add a x-ref to that?
  >>
  >
  > Clarified this in the first sentence (followed by a link to 5.2).

ah, you clarified this in [2] -- looks fine.



  >>> 4.2.  Monkey-patching the Storage Model
  >>>
  >>> Note: There's got to be a better way to specify this. Until I
  >>> figure out what that is, monkey-patching!
  >>>
  >>> Alter Section 5.3 of [RFC6265] as follows:
  >>>
  >>> 1. Add "samesite-flag" to the list of fields stored for each
  >>> cookie.
  >>
  >> s/Add/Add (in the first paragraph)/ -- the list of fields is in the
  >> first parag of S 5.3
  >>
  >
  > Poked at this.

ah, you clarified this in [2] -- looks fine.



[...]

  >>>  1. If the "cookie-attribute-list" contains an attribute with an
  >>>     "attribute-name" of "SameSite", set the cookie's "samesite-flag"
  >>>     to "attribute-value" ("Strict" or "Lax"). Otherwise, set the
  >>>     cookie's "samesite-flag" to "None".
  >>>
  >>>  2. If the cookie's "samesite-flag" is not "None", and the request
  >>>     which generated the cookie's client's "site for cookies"..
  >>
  >> the term "cookie's client('s)" is used only here (and also isn't
  >> defined in RFC6265) -- what is it's definition?
  >>
  >
  > It's actually referring to "request's client" from FETCH.
  > "request-which-generated-the-cookie's client". This would, I'm sure,
  > be simpler in German. :)

[4] ah. thx. Some thoughts wrt [FETCH], [HTML], RFC7230, RFC7231, and..

[5]  Clarify the hooks into RFC6265 #221
https://github.com/whatwg/fetch/pull/221/commits/5a324a891c42d42de09a01e03c3a063b9a4f882b 



[6] Re: Defining First and Third Party Cookies
https://lists.w3.org/Archives/Public/ietf-http-wg/2016JanMar/0249.html

..and I'm (also) wondering about how to appropriately divide
responsibilities between -cookie-same-site/6265bis and [FETCH]+[HTML].

Not all HTTP clients implement [FETCH]+[HTML], correct?  Yet such HTTP
clients may employ cookies, yes?

So maybe the correct thing to do is to further enhance [FETCH]+[HTML]
similarly to how you did in [5], and to keep -cookie-same-site/6265bis
as free of [FETCH]+[HTML] particulars as possible..?

And perhaps have some language (as approp) in -cookie-same-site/6265bis
saying something like "user agents implementing [FETCH]+[HTML] ought to
do such-and-such, otherwise do this-and-this..." ?

also, 6265bis will also need to be updated to adopt RFC7230 terminology
e.g. request-uri seems to now be "target URI".


[...]

  >> > 5.  Authoring Considerations
  >>
  >> this section is intended to be added to 6265bis?
  >>
  >
  > That's up to the group. I think it makes sense to describe how we
  > intend for developers to actually use this thing.

by "developers" here, you mean "webapp developers, aka 'authors'", yes?

  > It certainly makes
  > sense in the context of this document, and I think it probably also
  > makes sense as a new section in 6265bis that describes authoring
  > considerations with this and other attributes.

agreed.


[...]

  >>> 5.3.  Mashups and Widgets

[...]



  >> >
  >> > 6.1.  Server-controlled
  >> >
  >>
  >>>   of certain kinds of attacks that the server is worried about.
  >>>   The user is not involved in this decision. Moreover, a number of
  >>>   side- channels exist which could allow a server to link distinct
  >>>   requests even in the absence of cookies.
  >>
  >> you mean to say "..could allow a third-party server to link
  >> distinct top-level navigation requests to first-party servers, even
  >> in the absence of cookies." ?
  >>
  >
  > "top-level navigation" is too limiting. Servers receive channel
  > ID/token binding data for any request, for instance, not just
  > navigational requests.

Ok...

  >>>                                Connection and/or socket pooling,
  >>>    Token Binding, and Channel ID all offer explicit methods of
  >>>    identification that servers could take advantage of.
  >>
  >> I'm not sure the above sentence is applicable to the third-party
  >> cookie discussion in RFC6265 S 7.1. My understanding is that Token
  >> Binding and ChannelID present server-specific identifiers and
  >> cannot be used by a third-party server to track the UA's top-level
  >> navigation requests to various first-party servers.
  >>
  >
  > Both these mechanism send origin-specific data to a server as part
  > of a request. They have similar properties to cookies, in that they
  > can be used to correlate requests in a top-level or nested or
  > subresource context. They're not only sent along with top-level
  > requests, and their privacy concerns aren't limited to those
  > top-level contexts (e.g. `google.com` in a frame gets a channel ID as
  > part of the TLS handshake. The same ID, in fact, that it receives in
  > a top-level context).

Ok, thx, I think I now more get (at least some of) the subtleties.  will
have to think about this in the context of the token-binding specs...


[...]
  >>
  >> end

HTH,

=JeffH


[FETCH] https://fetch.spec.whatwg.org/

[HTML] https://html.spec.whatwg.org/