TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Improving privacy and security on the web

121 pointsby migueldemouraabout 6 years ago

10 comments

tptacekabout 6 years ago
Wow, if this works, this is basically the end of CSRF. Essentially: CSRF relies on an HTTP POST to VICTIM.COM triggered by HTML on EVIL.COM, and that request carrying cookies. Today, even though SameSite exists, the default --- SameSite=None --- maintains that longstanding status quo. But after the change, the Chrome default will be SameSite=Lax, and while EVIL.COM will still be able to trigger POSTs to VICTIM.COM, those requests will no longer carry cookies.<p>To get the cookies to work from EVIL.COM, VICTIM.COM&#x27;s developers will have to explicitly set SameSite=None on their session cookies. Which nobody will do, because nobody sets SameSite at all today.<p>Better still: 99 out of 100 CSRF exploits (maybe 999 out of 1000) target endpoints for which SameSite=None isn&#x27;t needed; they&#x27;re cookies nobody ever uses cross-site to begin with. There are only limited cases where anyone needs the behavior to change, and those cases don&#x27;t track the most sensitive cookies.<p>As a vulnerability researcher for whom exploitable bugs mostly exist to spark joy: good riddance to CSRF. It was a dumb bug class, and never, ever fun to exploit.
评论 #19855476 未加载
评论 #19866807 未加载
评论 #19855813 未加载
niftichabout 6 years ago
This is a continuation of a long arc of convergent work [1][2][3][4][5] by various people over several years; I&#x27;ve been following along [6].<p>The innovation of this proposal is to work towards the crossdomain cookie transmission being less insecure-by-default, by eventually making the current, limitless behavior opt-in.<p>This shifts the incentive of developers: presumably those whose sites require crossdomain acceptance of cookies will modify their sites accordingly, while those whose sites don&#x27;t, or those who haven&#x27;t thought about the issue will see fewer incidences of the most egregious POST-based CSRF.<p>[1] <a href="https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;publication&#x2F;atlantis-robust-extensible-execution-environments-for-web-applications&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.microsoft.com&#x2F;en-us&#x2F;research&#x2F;publication&#x2F;atlanti...</a> [2] <a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=795346" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=795346</a> [3] <a href="https:&#x2F;&#x2F;github.com&#x2F;mozmark&#x2F;SameDomain-cookies&#x2F;blob&#x2F;master&#x2F;samedomain.txt" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mozmark&#x2F;SameDomain-cookies&#x2F;blob&#x2F;master&#x2F;sa...</a> [4] <a href="http:&#x2F;&#x2F;homakov.blogspot.com&#x2F;2013&#x2F;02&#x2F;rethinking-cookies-originonly.html" rel="nofollow">http:&#x2F;&#x2F;homakov.blogspot.com&#x2F;2013&#x2F;02&#x2F;rethinking-cookies-origi...</a> [5] <a href="https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-west-first-party-cookies-07" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-west-first-party-cookies-0...</a> [6] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13689697#13691022" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13689697#13691022</a>
akerstenabout 6 years ago
This is great - the `SameSite=lax` attribute is arguably how cookies should have worked in the first place, and I&#x27;m quite pleased that it&#x27;s an existing RFC and not a proprietary change being done just in Chrome. Hopefully other browsers follow suit.<p>What worries me is the vague commitment to stop browser fingerprinting - not a lot of detail there and I&#x27;m fearful that useful features might be getting crippled. I don&#x27;t think I&#x27;m as convinced that browser fingerprinting is as big of an issue as CSRF (prevented by the cookie changes here). Time will tell I suppose.
评论 #19862066 未加载
Ajedi32about 6 years ago
Interesting. So apparently Chrome is going to stop sending cookies in cross-site requests unless they&#x27;re created with `CrossOrigin=None` and the page is loaded over HTTPS?
评论 #19853376 未加载
driverdanabout 6 years ago
The easiest way to improve cookie privacy is to block 3rd party cookies by default. Adding new polices is not the right solution. 3rd party cookies are completely unnecessary.
评论 #19857021 未加载
评论 #19856847 未加载
34r45sdgabout 6 years ago
Is this another way for Google to prevent you from clearing their cookies via the &#x27;Clear Cookies&#x27; option?<p>Its a step in the right direction with enforcing SameSite cookie scoping, but we must be cautious that Google doesn&#x27;t use this to force you to always be logged in. Google has a long way to go to rebuild trust after that last browser login debacle. I don&#x27;t trust em.
评论 #19854697 未加载
评论 #19855166 未加载
评论 #19854172 未加载
fenwick67about 6 years ago
Why do cross-domain requests need cookies at all? Honest question, why couldn&#x27;t we just stop sending them ever?
评论 #19857303 未加载
sempron64about 6 years ago
Is there a timeline for this change?
techntokeabout 6 years ago
Really disappointed in you Google for not addressing fingerprinting much sooner.
评论 #19854295 未加载
评论 #19856092 未加载
zzzzzzqzzzzzzabout 6 years ago
Not that any step towards additional privacy protections isn&#x27;t a good thing, same for security. But Google has got to be one of the major contributors to the erosion of privacy.<p>How about chrome nagging to have you sign in? How about their very own ad networks?
评论 #19854660 未加载