TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Secure HttpOnly Cookie and CSRF Token and ACL and Rate Limiter. Enough?

2 pointsby mike31frover 2 years ago
About authentification and authorization: Let's assume I have implemented secure HttpOnly cookie -based session management, with a CSRF token and let's assume there is no vulnerability in my ACL (authorization) system, and I have a rate limiter to avoid brute force attacks. What's the most likely vulnerability I may face when it comes to reading or updating data a user is not supposed to? And how should I fix it?

1 comment

joshxyzover 2 years ago
Hmmm most of it is covered by going through OWASP&#x27;s Authentication Cheatsheets.<p>In my mind: session invalidation, session locking to user agent or ip address. Really depends on how sensitive your user&#x27;s data is and how ahead you are on the business side of things for you to really have time to focus on security deeply.