On Wed, Jun 25, 2025 at 4:18 AM Vladimir Levin <vmp...@chromium.org> wrote:

>
>
> On Thursday, June 19, 2025 at 9:48:37 AM UTC-4 Yoav Weiss wrote:
>
> Contact emailsyoavwe...@chromium.org
>
> Explainer
> This will add the cookie name prefix `__Http-`.
> Cookies that would start with that prefix would only be able to be set
> using the `Set-Cookie` HTTP header and will have to have an `httpOnly`
> attribute.
>
> Adding that prefix to the cookie name will give site operators the
> guarantee that any such cookie they see was set by their server, and not be
> a malicious/compromised script.
>
> There are still ongoing discussions
> <https://github.com/httpwg/http-extensions/issues/3111#issuecomment-2986560222>
> about the exact spelling of a combination of this prefix with the `__Host-`
> prefix. I'd like this intent to cover both, but I'm not planning to ship
> the `__HostHttp` variant until the dust settles on the desired spelling.
>
> Specificationhttps://github.com/httpwg/http-extensions/pull/3110
>
> Summary
>
> There are cases where it's important to distinguish on the server side
> between cookies that were set by the server and ones that were set by the
> client. One such case is cookies that are normally always set by the
> server, unless some unexpected code (an XSS exploit, a malicious extension,
> a commit from a confused developer, etc.) happens to set them on the
> client. This proposal adds a signal that would enable servers to make such
> a distinction. More specifically, it defines the __Http and __HostHttp
> prefixes, that make sure that a cookie is not set on the client side using
> script.
>
>
> What is the behavior if one attempts to set an `__Http`-prefixed cookie
> from script with this feature? Does it silently fail, or is there an error
> that is thrown?
>

Similar to existing prefixes
<https://github.com/web-platform-tests/wpt/blob/master/cookies/resources/cookie-helper.sub.js#L76>,
when setting a cookie using `document.cookie`, the only way to know it
failed is observing (on the server) it is not present in relevant requests.
Setting such a cookie through the CookieStore API results in a Promise
rejection
<https://github.com/web-platform-tests/wpt/blob/master/cookie-store/cookieStore_special_names.https.any.js#L39>
.


>
>
> Blink componentInternals>Network>Cookies
> <https://issues.chromium.org/issues?q=customfield1222907:%22Internals%3ENetwork%3ECookies%22>
>
> TAG reviewNone, as the TAG doesn't typically review HTTP features.
>
> TAG review statusNot applicable
>
> Risks
>
>
> Interoperability and Compatibility
>
> No particular compat issues, as we don't expect this prefix to already
> exist in the wild.
>
> In terms of interop, Mozilla and Apple folks are heavily involved in the
> discussions and haven't raised any concerns.
>
>
> I agree that the chance of there being __Http named cookies is very low,
> but I've been wrong about things like this before :) Do you have any
> metrics/code searches/etc to validate that this is safe from compat
> perspective?
>

I don't have any metrics, and GH search seems to ignore the _ and - parts
when searching for `__Http-`..
I agree there's a non-zero change that someone added such a prefix to a
cookie (without it being httpOnly), but I think having a Finch flag to be
able to turn the feature off in case that turns out to be the case is
sufficient.


>
>
>
>
> *Gecko*: No signal (https://github.com/mozilla/standards-positions/issues/
> 1256)
>
> *WebKit*: No signal (https://github.com/WebKit/
> standards-positions/issues/518)
>
> *Web developers*: Positive (https://lists.w3.org/
> Archives/Public/ietf-http-wg/2025JanMar/0146.html)
>
> *Other signals*:
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that
> it has potentially high risk for Android WebView-based applications?
>
> None
>
>
> Debuggability
>
> None
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac,
> Linux, ChromeOS, Android, and Android WebView)?Yes
>
> Is this feature fully tested by web-platform-tests
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?Yes
> https://chromium-review.googlesource.com/c/chromium/
> src/+/6638647/15/third_party/blink/web_tests/external/wpt/
> cookies/prefix/__Http.https.html
> https://chromium-review.googlesource.com/c/chromium/
> src/+/6650996/2/third_party/blink/web_tests/external/wpt/
> cookies/prefix/__HostHttp.https.html
>
> Flag name on about://flagsNone
>
> Finch feature namePrefixCookieHttp, PrefixCookieHostHttp
>
> Rollout planWill ship enabled for all users
>
> Requires code in //chrome?False
>
> Tracking bughttps://issues.chromium.org/issues/426096760
>
> Estimated milestonesShipping on desktop140Shipping on Android140Shipping
> on WebView140
>
> Anticipated spec changes
>
> Open questions about a feature may be a source of future web compat or
> interop issues. Please list open issues (e.g. links to known github issues
> in the project for the feature specification) whose resolution may
> introduce web compat/interop risk (e.g., changing to naming or structure of
> the API in a non-backward-compatible way).
> None
>
> Link to entry on the Chrome Platform Statushttps://chromestatus.com/
> feature/5170139586363392?gate=5174068239925248
>
> This intent message was generated by Chrome Platform Status
> <https://chromestatus.com/>.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohS%2BRtDnZ9x5izwv8_4xUBOxZrzBd2L8Eh_Cn58dPvd9Ayw%40mail.gmail.com.

Reply via email to