113

I know that a cookie with secure flag won't be sent via an unencrypted connection. I wonder how this works in-depth.

Who is responsible for determining whether the cookie will be sent or not?

76484
  • 8,498
  • 3
  • 19
  • 30
ted
  • 5,219
  • 7
  • 36
  • 63
  • Note: this "Secure" flag is only just _one_ layer in defense in depth - an attacker is _still_ able to _write_ to a "Secure" cookie if they can MITM, and this has the potential to lead to a session fixation attack - [this related thread](https://stackoverflow.com/questions/72641144/how-is-cookie-susceptible-to-mim-attack-when-it-is-using-secure-attribute-over-h/) asked how and I provided an in-depth answer on how this is done, plus how this may be mitigated (HSTS can work, but also a specific name prefix can be used together to fully mitigate this). – metatoaster Jun 13 '23 at 10:30

2 Answers2

101

The client sets this only for encrypted connections and this is defined in RFC 6265:

The Secure attribute limits the scope of the cookie to "secure" channels (where "secure" is defined by the user agent). When a cookie has the Secure attribute, the user agent will include the cookie in an HTTP request only if the request is transmitted over a secure channel (typically HTTP over Transport Layer Security (TLS) [RFC2818]).

Although seemingly useful for protecting cookies from active network attackers, the Secure attribute protects only the cookie's confidentiality. An active network attacker can overwrite Secure cookies from an insecure channel, disrupting their integrity (see Section 8.6 for more details).

Community
  • 1
  • 1
Cratylus
  • 52,998
  • 69
  • 209
  • 339
  • 4
    in case the client-side doesn't have cookie yet and they should be sent from server-side(e.g. logging in) will server-side be the one to decide to include cookie in response? – ted Dec 05 '12 at 21:57
  • 3
    Server initially sets cookies via "Set-Cookie headers" – Ivan May 25 '16 at 00:54
56

Just another word on the subject:

Omitting secure because your website example.com is fully https is not enough.

If your user is explicitly reaching http://example.com, they will be redirected to https://example.com but that's too late already; the first request contained the cookie.

ruffin
  • 16,507
  • 9
  • 88
  • 138
Alain Tiemblo
  • 36,099
  • 17
  • 121
  • 153