Skip to content
This repository has been archived by the owner on Jan 24, 2019. It is now read-only.

Use of secure attribute in cookies #34

Merged
merged 2 commits into from
Nov 8, 2014
Merged

Conversation

jehiah
Copy link
Member

@jehiah jehiah commented Nov 8, 2014

I see at Line 191 of oauthproxy.go the question is raised of whether to use secure cookies if the X-Scheme is https (set the proxy header in nginx).

While this may be a good idea in the long run, in the short term, would it be better to decrease the chance of MITM attacks and set default of secure until a dynamic solution is implemented?

I understand this would cause incompatibility with those using this over HTTP only, though if they are I assume they have a very good reason and would be able to manually build it with the flag not set?

Would it be better to the increase the default security for the majority of deployments vs. compatibility in certain edge case uses.

@jehiah jehiah force-pushed the secure_cookies_34 branch from 5859214 to bc26835 Compare November 8, 2014 19:32
@jehiah
Copy link
Member

jehiah commented Nov 8, 2014

Thanks @LukeHandle for opening this issue and @ddidd (for the first version of this commit which i started with)

jehiah added a commit that referenced this pull request Nov 8, 2014
Use of secure attribute in cookies
@jehiah jehiah merged commit 7fae45a into bitly:master Nov 8, 2014
@jehiah jehiah deleted the secure_cookies_34 branch November 10, 2014 02:25
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Development

Successfully merging this pull request may close these issues.

1 participant