Feature #13499
openConsider using cookie prefixes
0%
Description
Wt should take a look at supporting the __Host and __Secure cookie prefixes. While they are similar to setting the Domain, and Secure fields respectively, they offer slightly more protection.
This addresses some concerns of RFC-6265.
Host: this is similar to setting
Domain, but not completely identical. Only an emptyDomainwill exhibit the same behavior as the__Hostprefix. The differentiating part is the way subdomains are handled.
In the case ofDomain, subdomains are able to overwrite cookies with the same name. In case a subdomain is compromised, this can also compromise the other domains.
The__Hostprefix does NOT allow this. This binds the cookie to the specific subdomain, and does not allow manipulation from other subdomains or the main domain.Secure: this is similar to setting
Secure, but not completely identical. In caseSecureis set, only an HTTPS connection is able to set the cookie. However, in case a subdomain was compromised,
they can set a cookie in HTTP without this flag. The cookie can then still be sent to an HTTPS connection on a subdomain of the same domain. Or, the cookie can be overwritten by an insecure subdomain.
The__Secureprefix does NOT allow this. If this prefix is found,Secureis enforced. So no insecure channel can write to a secure channel's cookies.
Updated by Romain Mardulyn 8 months ago
- Status changed from New to InProgress
- Assignee set to Romain Mardulyn
Updated by Romain Mardulyn 8 months ago
- Status changed from InProgress to Review
- Assignee deleted (
Romain Mardulyn)
Updated by Matthias Van Ceulebroeck 3 months ago
- Target version changed from 4.12.0 to 4.14.0