Skip to content

XSRF protection filter #245

@mattklein123

Description

@mattklein123

cc @heston

Ideally, Envoy would handle the full XSRF lifecycle:

  1. Send a cookie containing a cryptographic hash (XSRF token) on GET requests.

  2. On PUT/POST/DELETE requests, Envoy would inspect various parts of the request looking for the token (XSRF_TOKEN header, encoded form body, json body).

  3. Envoy would validate the token (hash is valid, not expired).

  4. If valid, the request is passed to the origin.

  5. If invalid, Envoy would send a 406 status.

We'd also need a way to opt-in/opt-out of xsrf protection for certain endpoints.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementFeature requests. Not bugs or questions.stalestalebot believes this issue/PR has not been touched recently

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions