I could be wrong, and would love to be corrected, but storing the CSRF
token in a session cookie doesn't seem problematic to me since the cookie
should only be readable by your origin.

It would only become a concern of you started allowing cross origin
requests with credentials.
On Apr 23, 2014 8:09 AM, "Anders Wegge" <awe...@gmail.com> wrote:

>  As I read the documentation for SignedCookieSessionFactory, the data
> stored in the session is not encrypted. So storing a CSRF token in the
> session Cookie is not a good option. Pyramid_beaker seem to have been
> deprecated with release 1.5, so which options are the best  for a site with
> very few actions requiring CSRF and other session data. My first thought is
> to pickle the session data, and storing them in a blob in the user
> database, but if there is something simpler and/or more elegangt available,
> I'd like to hear the alternatives.
>
>  --
> You received this message because you are subscribed to the Google Groups
> "pylons-discuss" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to pylons-discuss+unsubscr...@googlegroups.com.
> To post to this group, send email to pylons-discuss@googlegroups.com.
> Visit this group at http://groups.google.com/group/pylons-discuss.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"pylons-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to pylons-discuss+unsubscr...@googlegroups.com.
To post to this group, send email to pylons-discuss@googlegroups.com.
Visit this group at http://groups.google.com/group/pylons-discuss.
For more options, visit https://groups.google.com/d/optout.

Reply via email to