TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Get Ready for New SameSite=None; Secure Cookie Settings

137 pointsby migueldemouraover 5 years ago

11 comments

danShumwayover 5 years ago
I&#x27;ve gone back and forth on this since it was first announced.<p>It&#x27;s a very tough pill to swallow and is absolutely going to break a lot of web content. There&#x27;s just no way around that. And there are very few things that are worth breaking the web over.<p>This is probably one of them. The security benefits of this change are very, very high. It&#x27;s fixing something that arguably was broken since the introduction of cookies.<p>I am, as a rule, fairly skeptical when Chrome&#x2F;Chromium devs say they&#x27;re going to break something for security. Usually I think they&#x27;re wrong, this time I think they&#x27;re right, and I&#x27;m grateful that they&#x27;ve pushed for the change.<p>Also to the Chromium team&#x27;s credit, they&#x27;re taking the lead on something that they are 100% going to get criticized about. There are going to be some very angry threads about how they did it wrong, and how a 2020 release is too soon. I don&#x27;t think the rollout has been perfect either, but... somebody has to do it. Once everything dies down, Firefox is going to implement the same changes, and no one will bat an eye because everyone will have already adjusted to Chrome. There&#x27;s very little upside to being the browser that makes these changes first, but one of the browsers needs to do it first.<p>A nontrivial portion of our privacy&#x2F;security problems on the web come from some fundamentally bad sandboxing; and frankly, cookies are badly sandboxed. This change makes the default at least a little better, and will immediately block a large number of CSRF attacks.<p>So, yeah. I get that it&#x27;s annoying, but I&#x27;m with Google on this one.
评论 #21340229 未加载
评论 #21340309 未加载
hirsinover 5 years ago
Not mentioned in the article, but critical for debugging and testing - Chrome has added a 2 minute grace period, where cookies set in that time period are still allowed on non-get requests even without a samesite policy. This is considered temporary and will be removed some day in the future.<p>If you test with Chrome 78, and your app works, you can&#x27;t know if it&#x27;ll work once the 2 minute grace period goes away. Please test your app using an old version of Chrome (76&#x2F;77) with the flags for this enabled.
评论 #21342273 未加载
Ajedi32over 5 years ago
This kills most Cross-Site Request Forgery vulnerabilities, since sites will now need to explicitly opt-in to allowing authentication cookies to be served in cross-site requests.<p>Of course, it&#x27;ll probably be a long time before enough browsers support this that you can actually rely on this behavior, and even once support is universal there&#x27;ll probably still be some sites doing dumb stuff like setting `SameSite=None` on authentication cookies without taking additional precuations, or allowing data to be modified with GET requests. But overall this is a huge win for security on the web.<p>Previous discussion from back when this was first announced: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19853090" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=19853090</a>
评论 #21341103 未加载
lioetersover 5 years ago
For anyone else wondering: the new default SameSite=Lax should (continue to) work fine for cookies with the &quot;Domain&quot; attribute, for sharing with subdomains.
评论 #21339664 未加载
throwaway07Ju19over 5 years ago
My website has one affiliate link to Amazon page and a PayPal Buy It Now button (implemented as a form). Chrome&#x27;s console message suggests I add &#x27;SameSite=None&#x27; and &#x27;Secure&#x27;. Any advice on where I would add those properties and if they are the right value for these type of links? I didn&#x27;t realize these type of links had anything to do with cookies.
评论 #21339707 未加载
评论 #21340271 未加载
评论 #21342261 未加载
jwilkover 5 years ago
Archived copy, which can be read without JS enabled:<p><a href="https:&#x2F;&#x2F;archive.is&#x2F;YOIND" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;YOIND</a>
评论 #21341448 未加载
will4274over 5 years ago
This change makes a mockery of Google&#x27;s commitment to a compatible web. There have been 5 SameSite drafts over two year. This change is strictly incompatible with two of the drafts that shipped in two different browsers (Chrome 66 and Safari 12). Users of LTS Linux distributions will find random websites broken because of this change. It&#x27;s a great idea on paper, but by shipping so many incompatible versions in the draft stage, Google has virtually ensured breakage for certain user agent - service combos. They should have held the change for another 18 months.
评论 #21339344 未加载
评论 #21338625 未加载
xchaoticover 5 years ago
What am I missing, what’s the point? Companies can still aggregate data about you by combining data from those separate cookies?
评论 #21338755 未加载
评论 #21337767 未加载
Bnshsysjabover 5 years ago
I find it ironic that Microsoft will be implementing it when the latest version is IS11 on a fully patched windows 7 host doesn’t support samesite.<p>I have no idea why the host OS is relevant, but the feature should never have been limited by it, and it’s a nasty move given it’s a security feature and not just some random shiny new button.
评论 #21341116 未加载
Animatsover 5 years ago
Why doesn&#x27;t this break Google tracking?
评论 #21337581 未加载
评论 #21337047 未加载
评论 #21340279 未加载
RaiseProfitsover 5 years ago
Why are cross site cookies allowed at all? Wouldn’t it make more sense to just disable them entirely?
评论 #21342324 未加载