We take every reasonable effort to make Octopus Deploy secure against known vulnerabilities, mainly related to browser vulnerabilities. One such browser vulnerability is Cross-Site Request Forgery (CSRF).
What is CSRF?
Using a CSRF attack a malicious actor could potentially simulate requests to the Octopus Server on behalf of an authenticated user. For more information about CSRF refer to the following:
Does Octopus Deploy prevent CSRF attacks?
Yes. The Octopus HTTP API is protected from CSRF attacks out of the box by requiring an anti-forgery token using a combination of the Synchronizer Token Pattern and the Encrypted Token Pattern. If you are using any tools provided by Octopus Deploy, including the Web Portal, and Client SDK, this is all done for you automatically and transparently.
Headers, cookies, and HttpOnly
Upon authenticating your client, Octopus Server sends two cookies back to the browser via HTTP Headers:
HttpOnly=true- this is an encrypted session token which can be used by the Octopus Server to identify the authenticated user who is making the HTTP Request.
HttpOnly=false- this cookie contains the encrypted synchronizer token which should be sent as a special header as part of every authenticated HTTP request. The anti-forgery cookie is configured as
After authenticating, your HTTP request should contain these headers to prove the identity and origin of the HTTP request:
- Cookies header containing the
X-Octopus-Csrf-Token header- this header contains the encrypted synchronizer token which proves the request is legitimate
If you are using any tools provided by Octopus Deploy, including the Web Portal, and Client SDK, this is all done for you automatically and transparently.
If certain HTTP requests are not correctly formed you may see an error message like this either in your web browser or when trying to use the Octopus REST API directly:
A required anti-forgery token was not supplied or was invalid.
Octopus also logs a warning like this to your Octopus Server logs:
It looks like we just prevented a cross-site request forgery (CSRF) attempt on your Octopus Server: The required anti-forgery token was not supplied or was invalid.
Using the Octopus Web Portal
If you see this kind of error message when using the Octopus Web Portal in your browser, please try the following steps:
- Sign out of the Octopus Web Portal.
- Sign back in to the Octopus Web Portal.
- If this doesn’t work, please try clearing the cookies from your browser and trying again.
- After signing in, you should see two cookies from the Octopus Server - the authentication cookie and the anti-forgery cookie. See the next section on troubleshooting cookie problems.
- If this doesn’t work please get ask us for help - see below.
Troubleshooting problems with cookies
Octopus requires two cookies when using a web browser: the authentication cookie and the anti-forgery cookie. Check in your browser and make sure both cookies are available. Either one of these cookies can be missing for quite a number of reasons:
- Your web browser does not support cookies. Configure your browser to accept cookies from your Octopus Server. You may need to ask your systems administrator for help with this.
- The time is incorrect on your computer, or the time is incorrect on the Octopus Server. This can cause your authentication cookies to expire and become unusable. Correct the time and configure your computers to automatically synchronize their time from a time server.
- You are using Chrome and have not configured your Octopus Server to use HTTPS. Chrome has started to consider web sites served over
http://as unsafe and will refuse to accept cookies from those unsafe sites. Configure your Octopus Server to use HTTPS instead of HTTP. Learn more about Chrome and the move toward a more secure web.
- You have a network device between your browser and your Octopus Server which is stripping cookies it doesn’t trust, or is modifying cookies and setting
HttpOnly=true. The anti-forgery cookie is configured as
- You are hosting Octopus Server on the same domain as other applications. One of the other applications may be issuing a malformed cookie causing the Octopus authentication cookies to be misinterpreted. Move Octopus Server to a different domain to isolate it from the other applications, or stop the other applications from issuing malformed cookies. See this GitHub Issue for more details.
Using the Octopus REST API with raw HTTP
Contact Octopus support
If none of these troubleshooting steps work, please get in contact with our support team and send along the following details (feel free to ignore points if they don’t apply):
a. Which browser and version are you using? (Help > About in your browser is the best place to get this information).
b. Does the same thing happen with other browsers, like Internet Explorer, Google Chrome, Firefox?
c. Does the same thing happen for other people/users?
d. Does the same thing happen when you access Octopus Deploy over another network, like from home or over your cellular network?
e. Does the same thing happen if you use InPrivate/Incognito mode in your browser?
f. Does the same thing happen after clearing all browser data for the Octopus Server (including cookies, history, local data, stored credentials)?
g. Have you used any other versions of Octopus Deploy in this browser before?
h. Do you have other web applications hosted on the same server?
i. Do you have other web applications hosted on the same domain? (for example:
j. Do you have any intermediary network devices (like proxies or web application firewalls) which may be stripping custom HTTP headers or cookies from your requests?
k. Please record the problem occurring in your web browser and send the recording to us for analysis. Please record the following steps: Sign out of Octopus Deploy, sign back in again, and then try to do the action that fails.
Help us continuously improve
Please let us know if you have any feedback about this page.
Page updated on Sunday, January 1, 2023