-
Notifications
You must be signed in to change notification settings - Fork 191
Reevaluate behavior when cookie parsing fails #515
Comments
Note: because cookies are domain specific you would only see this kind of cross app contamination on a dev machine (e.g. localhost). |
Now that you mention it - you could also see cookie contamination when your web app is part of a compound site behind a layer 7 network load balancer |
Or similarly on IIS with vdirs |
I am in favor of changing this behavior. I am experiencing an empty cookie collection as a result of cookies that are created from a 3rd party web site that we use regularly within our company. If the 3rd party web site is run I loose the ability to get any cookies in our web site. |
just a note: I see the cookie contamination in other environments - not just localhost. |
Moving this to Backlog as we will be in RC2 ask mode very soon. If you feel strongly about this issue, please ping me. |
This is a pretty big issue for us. We have a large domain with many applications some third party like the one that is crashing the cookie parser. In our case we are using a cookie to authentication tokens and not having it available reliably means we can’t authenticate our web api calls. |
Please share sample (redacted where needed) cookie headers containing a mix of valid and invalid values you've observed. I'll see how forgiving we can make the parser. In the case of |
I sent fiddler loges to the support agent SR number 115121713508104 which he used to reproduce the problem hopefully they should still be attached. My need would be if cookie2 is bad we should still get cookie1 and cookie3 -- In a perfect world you would return me what you could for cookie2 maybe just the raw string value. |
Thanks @riegelj, I was able to retrieve your sample and successfully parse it with my changes. I still skipped the invalid value though. Having spaces in the value is a whole new flavor of invalid... |
Roger that, Thanks! |
Related to issue #390 but this topic is more about what the behavior should be when you're in this state.
I ended up with request cookies like the following for http://localhost:5000/:
and I was mystified about what to do when antiforgery wasn't working. At some point in my otherwise squeeky-clean past, I was hacking on something that added
ipt={"v":{"L":3},"pt":{"d":3},"ct":{},"_t":44,"_v":"2"};
to my cookie store, and it effectively 'poisoned' local development for me with anything that relies on cookies in our stack.What happens when you get into this state is that there's no indication that the cookie header was consider invalid, the cookie collection is empty, and no exception is thrown.
The text was updated successfully, but these errors were encountered: