-
Notifications
You must be signed in to change notification settings - Fork 10.3k
SameSite default value update #4655
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Let's reevaluate in 2.2. |
We should take a look to see if we can remove the cookie policy setting in the templates and get that done ASAP. We should separately look to see if all the major browsers support SameSite in an acceptable manner and consider changing the template (or library) to even use Strict. |
I am told Strict still causes problems with iPhone. |
Putting in Backlog while we wait for the state of common browsers to settle. In the meantime apps can set the policy themselves. |
iOS has implemented a much different policy than other browsers and that discourages us from making further investments here until they get it sorted out. |
I did some testing recently with the modified samesite=lax default policy being added to browsers (#12125). Most of our components worked OK, but I did not go back and test Safari/iOS. |
Closing as updates for 3.1 and 3.0 and 2.2 were released for new samesite changes google made |
According to hapijs/bell#355 (which I found as it links to aspnet/Security#1231) chrome > v65 has fixed their samesite behavior to be in line with other browsers. This should allow
SameSite.Strict
in a few cases again.I haven't tested this but I do think it's important to see if the default security can be increased again.
The text was updated successfully, but these errors were encountered: