We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OWASP recommends that authn session cookies are HttpOnly unless otherwise needed. https://www.owasp.org/index.php/HttpOnly
Do you think this is a good idea?
The text was updated successfully, but these errors were encountered:
9 dec 2015 kl. 19:59 skrev Benjamin Goering notifications@github.com: OWASP recommends that authn session cookies are HttpOnly unless otherwise needed. https://www.owasp.org/index.php/HttpOnly Do you think this is a good idea?
9 dec 2015 kl. 19:59 skrev Benjamin Goering notifications@github.com:
Sounds reasonable ! I’ll put in on the to-do list.
— Roland 'Look, that's why there's rules, understand? So that you think before you break ’em.’ - Terry Pratchett
Sorry, something went wrong.
FWIW, I did this by adding the following to my UserAuthnMethod
UserAuthnMethod
import Cookie def create_cookie(self, *args, **kwargs): """ Like super().create_cookie, but adds HttpOnly https://www.owasp.org/index.php/HttpOnly """ header, value = \ super(PasswordAuthnModule, self).create_cookie(*args, **kwargs) cookie = Cookie.SimpleCookie(value) cookie[self.srv.cookie_name]['httponly'] = True http_only_value = str(cookie) return (header, http_only_value)
This has been already done on master.
No branches or pull requests
OWASP recommends that authn session cookies are HttpOnly unless otherwise needed.
https://www.owasp.org/index.php/HttpOnly
Do you think this is a good idea?
The text was updated successfully, but these errors were encountered: