What is the difference between signed and encrypted cookies in Rails?

Ruby on-RailsCookiesSession Cookies

Ruby on-Rails Problem Overview


The documentation of ActionDispatch::Cookies gives nearly identical descriptions for both signed cookies and encrypted cookies. It appears that both use secrets.secret_key_base to prevent client-side tampering. http://api.rubyonrails.org/classes/ActionDispatch/Cookies.html

Signed Cookies

> Sets a signed cookie, which prevents users from tampering with its value. > The cookie is signed by your app's secrets.secret_key_base value. > It can be read using the signed method cookies.signed[:name]

cookies.signed[:user_id] = current_user.id

Encrypted cookies

> Sets an encrypted cookie value before sending it to the client which > prevent users from reading and tampering with its value. > The cookie is signed by your app's secrets.secret_key_base value. > It can be read using the encrypted method cookies.encrypted[:name]

cookies.encrypted[:discount] = 45

My question is: What is the difference between the two?

When would you want to use one over the other?

Ruby on-Rails Solutions


Solution 1 - Ruby on-Rails

It's subtle, but the answer is in the documentation you provided. Signed cookies only guard against tampering, while encrypted cookies guard against reading and tampering.

More specifically, signed cookies call ActiveSupport::MessageVerifier to append a digest (generated using secret_key_base) to the cookie. If the value of the cookie is modified, the digest will no longer match, and without knowing the value of secret_key_base, the cookie cannot be signed. The value of the cookie is merely base64 encoded, however, and can be read by anyone.

Encrypted cookies called ActiveSupport::MessageEncryptor to actually encrypt the value of the cookie before generating the digest. Similar to signed cookies, if the value of cookie is modified the digest will no longer match, but additionally the value of the cookie cannot be decrypted without the secret_key_base.

As to when you'd use encrypted versus signed cookies, it comes down to the sensitivity of the information you're storing in the cookie. If all you want to protect against is someone modifying the cookie, then sign it - but if you also need to keep the data secret, encrypt it.

Solution 2 - Ruby on-Rails

Signed Cookies

Properties: Can be read by the client, server prevents tampering of the value.

Usage: read-only value for frontend (makes little sense with HttpOnly)

Typically just like an encrypted cookie, but because of design shortcomings, the client (browser) also need to access its value.

I can't think of a proper example... perhaps storing user data without a server-side storage, while guaranteeing its validity? (not very efficient though)

Encrypted cookies

Properties: A secret the client get, cannot read/write and will be returned to the server.

Usage: overcome stateless part of http, e.g. sessions (makes little sense without HttpOnly)

Summary

I'd say using signed cookies is always a poor architectural decision. But under extreme constrains (no server-side storage, no javascript in the browser) could be the only solution left.

Attributions

All content for this solution is sourced from the original question on Stackoverflow.

The content on this page is licensed under the Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.

Content TypeOriginal AuthorOriginal Content on Stackoverflow
QuestionSean HuberView Question on Stackoverflow
Solution 1 - Ruby on-RailsBrianView Answer on Stackoverflow
Solution 2 - Ruby on-RailsestaniView Answer on Stackoverflow