With Same-Site cookies defaulting to lax is CSRF dead? Discuss.
@buherator Never heard of it. Is it kerberos? an MSFT thing?
@freddy usually I would say yes.
Rarely we see it being explicitly disabled although they shouldn't have and it's old school broken.
Btw. feels like JWT via Authorization header is also a big CSRF killer, but not as big as SameSite.
There are also genius setups at certain companies, but CSRF is just part of the problem often... e.g. imagine setting a cookie to top level (parent) domain but also giving every laptop a tld name... now if that cookie is a SSO cookie🤦♂️🤦♂️
@acut3hack What do you mean by grace period? Lax allowing unsafe? https://www.ietf.org/archive/id/draft-ietf-httpbis-rfc6265bis-10.html#lax-allowing-unsafe.
That would mean, it's fixed by cookies set to "lax" explicitly rather than implicitly.