Part 2 of this answer explains it fairly well: https://stackoverflow.com/a/477578 Also, this was a nice read: https://web.archive.org/web/20180819014446/http://jaspan.com/improved_persistent_login_cookie_best_practice
It depends on your threat model, but the use of public computers in libraries, internet cafés or similar is probably the most relevant here, when arguing against activating "remember me". These days, shared computer use is declining I'd assume. With twtxt being a niche for more computer-affine folks, I'd reckon this threat is not that high up the list. On the hand, you want to bring yarnd to the average non-nerd user, so this threat might actually rank more important.
It's probably okay and safe enough to remove "remember me" entirely and just issue a long-lived session cookie and be done with that. Optionally, power users or the administrator could benefit from configurable cookie lifetime(s).
I'll check logging in etc tomorrow, time for bed lol 😴
EDIT: Okay, convo works properly now at least
126.0.1 🤣
126.0.1 🤣
127.0.1 (64-bit) tonight and tested and it worked just fine. Try upgrading and roll that commit back and see if it still repros? 🤔 I'm almost willing to bet this is a bug 🐛
127.0.1 (64-bit) tonight and tested and it worked just fine. Try upgrading and roll that commit back and see if it still repros? 🤔 I'm almost willing to bet this is a bug 🐛
* aa2f3ae9 - (HEAD -> main, origin/main) Workaround for this invalid Referer BS (6 seconds ago) <James Mills>
* aa2f3ae9 - (HEAD -> main, origin/main) Workaround for this invalid Referer BS (6 seconds ago) <James Mills>
>server {
listen 80;
server_name we.loveprivacy.club;
location / {
return 301 https://$host$request_uri;
#proxy_pass http://127.0.0.1:8000;
}
}
server {
listen 443 ssl http2;
server_name we.loveprivacy.club;
ssl_certificate /etc/letsencrypt/live/we.loveprivacy.club/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/we.loveprivacy.club/privkey.pem;
client_max_body_size 8M;
location / {
proxy_pass http://127.0.0.1:8000;
}
}
>
Referer is /post then consider that total bullshit, and ignore? 🤔
Referer is /post then consider that total bullshit, and ignore? 🤔
Referer header incorrectly?! 🤔
Referer header incorrectly?! 🤔
POST /post followed by a GET <from> where ever I was coming from. Hmmm 🧐
This is nuts 🌰
POST /post followed by a GET <from> where ever I was coming from. Hmmm 🧐
This is nuts 🌰
You can see here, at least, htmx knows what the current URL is:
HX-Current-URL: https://we.loveprivacy.club/conv/vcpt7gq
Referer: https://we.loveprivacy.club/post
But the freak'n browser is setting the wrong value for
Referer. There is simply no way to be on the /post endpoint normally anyway.
You can see here, at least, htmx knows what the current URL is:
HX-Current-URL: https://we.loveprivacy.club/conv/vcpt7gq
Referer: https://we.loveprivacy.club/post
But the freak'n browser is setting the wrong value for
Referer. There is simply no way to be on the /post endpoint normally anyway.
kept it in zone 2 pretty well
#running #treadmill
kept it in zone 2 pretty well
#running #treadmill
kept it in zone 2 pretty well
#running #treadmill
POST /post XHR (_that is being run by htmx_) should never, ever be Referer: .../post 🤦♂️
POST /post XHR (_that is being run by htmx_) should never, ever be Referer: .../post 🤦♂️
/post) on either the POST or the GET 🤔