The Needs Review Queue Bot → tested this issue. It either no longer applies to Drupal core, or fails the Drupal core commit checks. Therefore, this issue status is now "Needs work".
Apart from a re-roll or rebase, this issue may need more work to address feedback in the issue or MR comments. To progress an issue, incorporate this feedback as part of the process of updating the issue. This helps other contributors to know what is outstanding.
Consult the Drupal Contributor Guide → to find step-by-step guides for working with issues.
- 🇫🇷France prudloff Lille
If I understand how this attack works correctly, I think setting SameSite=Lax or Strict on cookies mitigates BREACH attacks.
I could not find a lot of information about this but it is mentioned here: https://www.sjoerdlangkemper.nl/2016/11/07/current-state-of-breach-attack/
Since 📌 Set SameSite on session cookies Fixed , Drupal now uses SameSite=Lax by default so we might not need a specific protection against BREACH anymore.Also FWIW, here is what we implemented on our servers: we don't compress responses that have
Cache-Control: private
.
The reasoning is that:- A response that contains sensitive data should already have
Cache-Control: private
(because we don't want our reverse proxy to cache it). - This basically only disables compression for logged-in users or some very specific uncacheable pages which is an acceptable tradeoff for us.
But it would not be a good universal solution, for example if most of your users are logged-in.
- A response that contains sensitive data should already have