Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve session expiration #391

Closed
beaugunderson opened this issue Feb 27, 2015 · 6 comments · Fixed by #392
Closed

Improve session expiration #391

beaugunderson opened this issue Feb 27, 2015 · 6 comments · Fixed by #392

Comments

@beaugunderson
Copy link
Contributor

Currently a new COOKIE_SECRET is chosen each time the server starts, invalidating all previous sessions. From discussions with @wasade it seems that this invalidation can be a barrier to deployment (it logs everyone out and that's undesirable).

One way to solve this is to move COOKIE_SECRET to the configuration file. This would allow sessions (which are just persisted in secure cookies) to persist across server restarts. The COOKIE_SECRET in the configuration could be changed manually if session invalidation is ever desired.

If this is an acceptable change I'm happy to write a pull request. :)

@wasade
Copy link
Member

wasade commented Feb 27, 2015

👍, thanks @beaugunderson!

cc @squirrelo @antgonza @josenavas @ElDeveloper @adamrp, this approach may be of interest on qiita

@ElDeveloper
Copy link
Member

Yes, I like this idea a lot!

On (Feb-27-15|15:49), Daniel McDonald wrote:

👍, thanks @beaugunderson!

cc @qiita-dev, this approach may be of interest


Reply to this email directly or view it on GitHub:
#391 (comment)

@squirrelo
Copy link
Contributor

I'm cool with it.

@adamrp
Copy link
Contributor

adamrp commented Feb 28, 2015

Makes good sense to me. Security wise, what circumstances would warrant a
cookie secret change?
On Feb 27, 2015 5:17 PM, "Joshua Shorenstein" notifications@github.com
wrote:

I'm cool with it.


Reply to this email directly or view it on GitHub
#391 (comment)
.

beaugunderson added a commit to OpenHumans/american-gut-web that referenced this issue Mar 1, 2015
@beaugunderson
Copy link
Contributor Author

@adamrp If you found a vulnerability that enabled session highjacking that would be an excellent reason to invalidate all existing sessions. :)

@beaugunderson
Copy link
Contributor Author

OK, a simple pull request for this is at #392.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants