This seems like the right question.

-Ekr

On Thu, Apr 14, 2016 at 9:17 AM, Kyle Huey <m...@kylehuey.com> wrote:

> Why should we be the ones to take the web compat hit on this?
>
> - Kyle
> On Apr 14, 2016 1:55 AM, "Chris Peterson" <cpeter...@mozilla.com> wrote:
>
> > Summary: Treat cookies set over non-secure HTTP as session cookies
> >
> > Exactly one year ago today (!), Henri Sivonen proposed [1] treating
> > cookies without the `secure` flag as session cookies.
> >
> > PROS:
> >
> > * Security: login cookies set over non-secure HTTP can be sniffed and
> > replayed. Clearing those cookies at the end of the browser session would
> > force the user to log in again next time, reducing the window of
> > opportunity for an attacker to replay the login cookie. To avoid this,
> > login-requiring sites should use HTTPS for at least their login page that
> > set the login cookie.
> >
> > * Privacy: most ad networks still use non-secure HTTP. Content sites that
> > use these ad networks are prevented from deploying HTTPS themselves
> because
> > of HTTP/HTTPS mixed content breakage. Clearing user-tracking cookies set
> > over non-secure HTTP at the end of every browser session would be a
> strong
> > motivator for ad networks to upgrade to HTTPS, which would unblock
> content
> > sites' HTTPS rollouts.
> >
> > However, my testing of Henri's original proposal shows that too few sites
> > set the `secure` cookie flag for this to be practical. Even sites that
> > primarily use HTTPS, like google.com, omit the `secure` flag for many
> > cookies set over HTTPS.
> >
> > Instead, I propose treating all cookies set over non-secure HTTP as
> > session cookies, regardless of whether they have the `secure` flag.
> Cookies
> > set over HTTPS would be treated as "secure so far" and allowed to persist
> > beyond the current browser session. This approach could be tightened so
> any
> > "secure so far" cookies later sent over non-secure HTTP could be
> downgraded
> > to session cookies. Note that Firefox's session restore will persist
> > "session" cookies between browser restarts for the tabs that had been
> open.
> > (This is "eternal session" feature/bug 530594.)
> >
> > To test my proposal, I loaded the home pages of the Alexa Top 25 News
> > sites [2]. These 25 pages set over 1300 cookies! Fewer than 200 were set
> > over HTTPS and only 7 had the `secure` flag. About 900 were third-party
> > cookies. Treating non-secure cookies as session cookies means that over
> > 1100 cookies would be cleared at the end of the browser session!
> >
> > CONS:
> >
> > * Sites that allow users to configure preferences without logging into an
> > account would forget the users' preferences if they are not using HTTPS.
> > For example, companies that have regional sites would forget the user's
> > selected region at the end of the browser session.
> >
> > * Ad networks' opt-out cookies (for what they're worth) set over
> > non-secure HTTP would be forgotten at the end of the browser session.
> >
> > Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1160368
> >
> > Link to standard: N/A
> >
> > Platform coverage: All platforms
> >
> > Estimated or target release: Firefox 49
> >
> > Preference behind which this will be implemented:
> > network.cookie.lifetime.httpSessionOnly
> >
> > Do other browser engines implement this? No
> >
> > [1]
> >
> https://groups.google.com/d/msg/mozilla.dev.platform/xaGffxAM-hs/aVgYuS3QA2MJ
> > [2] http://www.alexa.com/topsites/category/Top/News
> > _______________________________________________
> > dev-platform mailing list
> > dev-platform@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-platform
> >
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to