OWASP Double Submit cookie doesn’t mention whether the token should be generated server or client side. However, it does so for the Synchronizer token pattern.
Using non-signed tokens, there's no difference between generating the token server or client side, since both:
can generate a cryptographical random value (Client side with the Web Crypto API)
set the token in a non-HttpOnly cookie
How should this be resolved?
The Double Submit Cookie section should state more specifically that the token can be generated both server and client side for non-signed tokens, but only server-side for signed token, thus eliminating confusion.
What is missing or needs to be updated?
OWASP Double Submit cookie doesn’t mention whether the token should be generated server or client side. However, it does so for the Synchronizer token pattern.
This has historically created many doubts:
Using non-signed tokens, there's no difference between generating the token server or client side, since both:
HttpOnly
cookieHow should this be resolved?
The Double Submit Cookie section should state more specifically that the token can be generated both server and client side for non-signed tokens, but only server-side for signed token, thus eliminating confusion.