CSRF protection for Django without cookies.
Перейти к файлу
Matt Molyneaux bb6ce72802 Make it slightly more obvious what `ANON_ALWAYS` is for (#26) 2018-01-17 13:28:26 -05:00
session_csrf Make it slightly more obvious what `ANON_ALWAYS` is for (#26) 2018-01-17 13:28:26 -05:00
.gitignore ignore build artifacts 2016-10-03 09:13:08 -04:00
.travis.yml Python 3 support (#36) 2016-10-05 08:26:39 -04:00
LICENSE csrf protection for django without cookies 2011-04-19 11:29:15 -07:00
MANIFEST.in csrf protection for django without cookies 2011-04-19 11:29:15 -07:00
README.rst Make it slightly more obvious what `ANON_ALWAYS` is for (#26) 2018-01-17 13:28:26 -05:00
contribute.json Add contribute.json file. 2015-03-02 11:04:57 -08:00
requirements.txt csrf protection for django without cookies 2011-04-19 11:29:15 -07:00
runtests.sh Make compatible with Django 1.10. Replace _get_new_csrf_key with _get_new_csrf_string, use Middleware Deprecation Mixin, fix urlpatterns 2016-09-30 15:25:00 +01:00
setup.cfg prepare for version 0.7.1 2016-10-05 08:31:04 -04:00
setup.py prepare for version 0.7.1 2016-10-05 08:31:04 -04:00

README.rst

What is this?
-------------

``django-session-csrf`` is an alternative implementation of Django's CSRF
protection that does not use cookies. Instead, it maintains the CSRF token on
the server using Django's session backend. The csrf token must still be
included in all POST requests (either with `csrfmiddlewaretoken` in the form or
with the `X-CSRFTOKEN` header).


Installation
------------

From PyPI::

    pip install django-session-csrf

From github::

    git clone git://github.com/mozilla/django-session-csrf.git

Replace ``django.core.context_processors.csrf`` with
``session_csrf.context_processor`` in your ``TEMPLATE_CONTEXT_PROCESSORS``::

    TEMPLATE_CONTEXT_PROCESSORS = (
        ...
        'session_csrf.context_processor',
        ...
    )

Replace ``django.middleware.csrf.CsrfViewMiddleware`` with
``session_csrf.CsrfMiddleware`` in your ``MIDDLEWARE_CLASSES``
and make sure it is listed after the AuthenticationMiddleware::

    MIDDLEWARE_CLASSES = (
        ...
        'django.contrib.auth.middleware.AuthenticationMiddleware',
        ...
        'session_csrf.CsrfMiddleware',
        ...
    )

Then we have to monkeypatch Django to fix the ``@csrf_protect`` decorator::

    import session_csrf
    session_csrf.monkeypatch()

Make sure that's in something like your root ``urls.py`` so the patch gets
applied before your views are imported.


Differences from Django
-----------------------

``django-session-csrf`` does not assign CSRF tokens to anonymous users because
we don't want to support a session for every anonymous user. Instead, views
that need anonymous forms can be decorated with ``@anonymous_csrf``::

    from session_csrf import anonymous_csrf

    @anonymous_csrf
    def login(request):
        ...

``anonymous_csrf`` uses the cache to give anonymous users a lightweight
session. It sends a cookie to uniquely identify the user and stores the CSRF
token in the cache.  It can be controlled through these settings:

    ``ANON_COOKIE``
        the name used for the anonymous user's cookie

        Default: ``anoncsrf``

    ``ANON_TIMEOUT``
        the cache timeout (in seconds) to use for the anonymous CSRF tokens

        Default: ``60 * 60 * 2  # 2 hours``

Note that by default Django uses local-memory caching, which will not
work with anonymous CSRF if there is more than one web server thread.
To use anonymous CSRF, you must configure a cache that's shared
between web server instances, such as Memcached.  See the `Django cache
documentation <https://docs.djangoproject.com/en/dev/topics/cache/>`_
for more information.


If you only want a view to have CSRF protection for logged-in users, you can
use the ``anonymous_csrf_exempt`` decorator. This could be useful if the
anonymous view is protected through a CAPTCHA, for example.

::

    from session_csrf import anonymous_csrf_exempt

    @anonymous_csrf_exempt
    def protected_in_another_way(request):
        ...


If you want all views to have CSRF protection for anonymous users as Django
does, use the following setting:

    ``ANON_ALWAYS``
        always provide CSRF protection for anonymous users

        Default: False


Why do I want this?
-------------------

1. Your site is on a subdomain with other sites that are not under your
   control, so cookies could come from anywhere.
2. You're worried about attackers using Flash to forge HTTP headers.
3. You're tired of requiring a Referer header.


Why don't I want this?
----------------------

1. Storing tokens in sessions means you have to hit your session store more
   often.
2. It's a little bit more work to CSRF-protect forms for anonymous users.