diff --git a/docs/guidelines/web_security.md b/docs/guidelines/web_security.md index a4236ee..407354f 100644 --- a/docs/guidelines/web_security.md +++ b/docs/guidelines/web_security.md @@ -486,7 +486,7 @@ All cookies should be created such that their access is as limited as possible. - `Max-Age:` Sets a relative expiration date for a given cookie (not supported by IE <8) - `Domain:` Cookies should only be set with this if they need to be accessible on other domains, and should be set to the most restrictive domain possible - `Path:` Cookies should be set to the most restrictive path possible, but for most applications this will be set to the root directory -- `SameSite`: Forbid sending the cookie via cross-origin requests (such as from `` tags, etc.), as a strong [anti-CSRF measure](#csrf-prevention) +- `SameSite`: Forbid sending the cookie via cross-site requests (such as from `` tags, etc.), as a strong [anti-CSRF measure](#csrf-prevention) - `SameSite=Strict`: Only send the cookie when site is directly navigated to - `SameSite=Lax`: Send the cookie when navigating to your site from another site @@ -499,7 +499,7 @@ Set-Cookie: MOZSESSIONID=980e5da39d4b472b9f504cac9; Path=/; Secure; HttpOnly ```sh # Session identifier for all example.org sites that expires in 30 days using the __Secure- prefix -# This cookie is not sent cross-origin, but is sent when navigating to any Mozilla site from another site +# This cookie is not sent cross-site, but is sent when navigating to any Mozilla site from another site Set-Cookie: __Secure-MOZSESSIONID=7307d70a86bd4ab5a00499762; Max-Age=2592000; Domain=example.org; Path=/; Secure; HttpOnly; SameSite=Lax ``` @@ -510,7 +510,7 @@ Set-Cookie: __Host-ACCEPTEDTOS=true; Expires=Fri, 31 Dec 9999 23:59:59 GMT; Path ``` ```sh -# Session identifier used for a secure site, such as bugzilla.example.org. It isn't sent from cross-origin +# Session identifier used for a secure site, such as bugzilla.example.org. It isn't sent from cross-site # requests, nor is it sent when navigating to bugzilla.example.org from another site. Used in conjunction with # other anti-CSRF measures, this is a very strong way to defend your site against CSRF attacks. Set-Cookie: __Host-BMOSESSIONID=YnVnemlsbGE=; Max-Age=2592000; Path=/; Secure; HttpOnly; SameSite=Strict