Ensure session cookies are secure

While HSTS should take care of most of this, setting cookies to be
secure, and only applied on same site helps to improve situations where
for whatever reason, downgrade attacks are still a thing.

This patch adds the `sameSite` and `secure` to the session cookie and
this way prevent all accidents where a browser may doesn't support HSTS
or HSTS is intentionally dropped.

Reference:
https://www.npmjs.com/package/express-session#cookiesecure

Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
This commit is contained in:
Sheogorath 2020-06-08 15:11:17 +02:00 committed by Dexter Chua
parent fb77878143
commit 8406f75bb7

View file

@ -182,7 +182,8 @@ app.use(session({
rolling: true, // reset maxAge on every response rolling: true, // reset maxAge on every response
cookie: { cookie: {
maxAge: config.sessionLife, maxAge: config.sessionLife,
sameSite: 'strict' sameSite: 'strict',
secure: config.useSSL || config.protocolUseSSL || false
}, },
store: sessionStore store: sessionStore
})) }))