Skip to content

Enable Auth Cookie Compression #13649

Closed
Closed
@rasitha1

Description

@rasitha1

Is your feature request related to a problem? Please describe.

Without session cookie compression, requests are unnecessarily large and even for a simple set of claims can reach the header size limits.

Describe the solution you'd like

Because of #79 and this default auth cookie compression was removed but I would like to humbly question was there enough testing done or security experts consulted to decide if this vulnerability is applicable to the .net implementation and this use case of session cookies? If yes, then aren't all Mvc5/Katana apps not have the same vulnerability?

Given the sign-in token is issued by a trusted token provider and signed, and therefore cannot be altered by the attacker as needed, couldn't you use one or all of the counter measures such obscuring the output size (using a padding mechanism) and obscuring the input size (by injecting randomly sized buffer at sign-in), etc. and still provide a safe implementation?

Additional context

Even if it's not enabled by default, if you can provide a proven and secure implementation that we can enable that will be very valuable.

Forcing a dependency on a backend storage just to store a simple set of claims, seems an overkill.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area-authIncludes: Authn, Authz, OAuth, OIDC, Bearer

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions