Description
Is your feature request related to a problem? Please describe.
Without session cookie compression, requests are unnecessarily large and even for a simple set of claims can reach the header size limits.
Describe the solution you'd like
Because of #79 and this default auth cookie compression was removed but I would like to humbly question was there enough testing done or security experts consulted to decide if this vulnerability is applicable to the .net implementation and this use case of session cookies? If yes, then aren't all Mvc5/Katana apps not have the same vulnerability?
Given the sign-in token is issued by a trusted token provider and signed, and therefore cannot be altered by the attacker as needed, couldn't you use one or all of the counter measures such obscuring the output size (using a padding mechanism) and obscuring the input size (by injecting randomly sized buffer at sign-in), etc. and still provide a safe implementation?
Additional context
Even if it's not enabled by default, if you can provide a proven and secure implementation that we can enable that will be very valuable.
Forcing a dependency on a backend storage just to store a simple set of claims, seems an overkill.