X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/2fa7f5f66bbf42d4365c18d386e827ee98c5f890..d86b9290daac133a1e3d13458903cc70424fbacf:/doc/bugs/login_problem.mdwn diff --git a/doc/bugs/login_problem.mdwn b/doc/bugs/login_problem.mdwn index 1a9e7650e..14e3fb325 100644 --- a/doc/bugs/login_problem.mdwn +++ b/doc/bugs/login_problem.mdwn @@ -8,8 +8,46 @@ It doesn't seem limited to any login method; email and password have both been said not to work. (Openid too, but could be openid provider problem there.) -I have not managed to reproduce the problem myself. --[[Joey]] +I have not managed to reproduce the problem myself, using firefox, +firefox-esr, or chromium. --[[Joey]] > Otto Kekäläinen described to me a problem where email login to post a > comment seemed to work; it displayed the comment edit form; but posting -> the form went back to the login page. Cookie problem? --[[Joey]] +> the form went back to the login page. Cookie problem? +> +> Ok, to reproduce the problem: Log into joeyh.name using https. The email +> login link is a http link. The session cookie was set https-only. +> --[[Joey]] +> +> The reason the edit form is able to be displayed is that emailauth +> sets up a session, in getsession(), and that $session is used for the +> remainder of that cgi call. But, a cookie for that session is not stored +> in the browser in this case. Ikiwiki *does* send a session cookie, but +> the browser seems to not let an existing https-only session cookie be +> replaced by a new session cookie that can be used with http. (If the +> emailed link, generated on https is opened in a different browser, this +> problem doesn't happen.) There may have been a browser behavior change +> here? +> +> So what to do about this? Sites with the problem have `redirect_to_https: 0` +> and the cgiurl is http not https. So when emailauth generates the url +> with `cgiurl_abs`, it's a http url, even if the user got to that point +> using https. +> +> I suppose that emailauth could look at `$ENV{HTTPS}` same as +> printheader() does, to detect this case, and rewrite the cgiurl as a +> https url. Or, printheader() could just not set "-secure" on the cookie, +> but that does degrade security as MITM can then steal the cookie you're +> using on a https site. +> +> Of course, the easy workaround, increasingly a good idea anyway, is to +> enable `redirect_to_https`.. --[[Joey]] + +> One of the users also reported a problem with password reset, and +> indeed, passwordauth is another caller of `cgiurl_abs`. (The only other +> caller, notifyemail, is probably fine.) The emailed password reset link +> also should be https if the user was using https. So, let's add a +> `cgiurl_abs_samescheme` that both can use. --[[Joey]] + +[[fixed|done]].. At least I hope that was the thing actually preventing most +of the people from logging in. --[[Joey]]