-
-
Notifications
You must be signed in to change notification settings - Fork 964
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Duplicate continuity cookies cause requests to fail #2121
Comments
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See ory/kratos#2121 See ory-corp/cloud#1786
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See ory/kratos#2121 See ory-corp/cloud#1786
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See #2121 See ory-corp/cloud#1786
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See #2121 See ory-corp/cloud#1786
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See #2121 See ory-corp/cloud#1786
I was able to reproduce this by changing the cookie's signature to something else which means, probably, that the signature will cause a mismatch. In this case, I am consistently able to reproduce this issue. |
This would then also explain why, when two cookies are given, and the first one is always a dud, the error does not go away on a retry. That is because the cookie is never updated when there is a cookie match, but a signature mismatch. |
Resolves several reports related to incorrect handling of invalid continuity issues. Closes #2121 Closes ory-corp/cloud#1786 Closes #2016 Potentially #2108
Resolves several reports related to incorrect handling of invalid continuity issues. Closes #2121 Closes ory-corp/cloud#1786 Closes #2016 Potentially #2108
Resolves several reports related to incorrect handling of invalid continuity issues. Closes #2121 Closes ory-corp/cloud#1786 Closes #2016 Potentially #2108
Resolves an issue where, when multiple CSRF cookies are set, a random one would be used to verify the CSRF token. Now, regardless of how many conflicting CSRF cookies exist, if one of them is valid, the request will pass and clean up the cookie store. See ory#2121 See ory-corp/cloud#1786
Resolves several reports related to incorrect handling of invalid continuity issues. Closes ory#2121 Closes ory-corp/cloud#1786 Closes ory#2016 Potentially ory#2108
As experienced multiple times by @amorevino and just captured by @sashatalalasha
Google callback request:
Google callback response headers:
redirects to error page with error:
The text was updated successfully, but these errors were encountered: