Skip to content

Disable cookie auth #60

@graft

Description

@graft

Etna::Auth currently accepts cookies as a valid way to present your token. While Janus token cookies are marked with secure: true and same-site: strict, they are still vulnerable to CSRF attacks (i.e., they will be posted automatically with any request to an etna service).

We may instead completely disable cookie-based authentication and reform all JS clients to add Authorization headers to requests. Most other clients (e.g. Etna::Client or MetisClient) already don't use cookies, so this avenue should only involve some JS changes. However, clients in Timur, Janus and Metis (e.g. anything using fetch) will all have to change to reflect this amendment.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions