Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support potentially trustworthy origins #2759

Merged
merged 2 commits into from Mar 13, 2024
Merged

Conversation

sbingler
Copy link
Collaborator

@sbingler sbingler commented Mar 12, 2024

Closes #2605

Rephrases the requirements for the Secure attribute to be slightly broader in order to support potentially trustworthy origin.

Currently the requirements specifically ask for a secure protocol, with this change they'll ask for a secure connection (as defined by the user agent). This allows UAs to support Secure cookie access on http://localhost

Copy link
Member

@mikewest mikewest left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a good change, thanks.

I don't think we have WPT in place for this (and I'm not entirely sure that we can?), but have you looked into the support for this change across browser engines? I'm generally in favor of landing it as long as it's reflecting (near) reality.

@sbingler
Copy link
Collaborator Author

No WPT that I can see.

According to #2605, Firefox fully supports localhost, Chrome supports Secure but not cookie prefixes, and Safari doesn't have support but does have an open bug.

@mikewest
Copy link
Member

Got it, thanks. If you're taking care of Chromium, and WebKit has an open bug, landing this seems reasonable. Thanks!

@sbingler sbingler merged commit 6379d6b into httpwg:main Mar 13, 2024
1 check passed
@sbingler sbingler deleted the SupportPotTrust branch March 13, 2024 14:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

[rfc6265bis] Inconsistent browser behavior with secure and prefix cookies (__Host- and __Secure-) on localhost
2 participants