Skip to content

Conversation

Aven-dev
Copy link

Solving issue: https://feedback.secondlife.com/web-bugs/p/search-asks-me-to-accept-cookies-each-time-i-launch-client

Chrome 114 added a security measure for Windows systems that prevents malware from stealing cookie or session information, by maintaining a file lock on the corresponding database files.

This security measure is not good for applications like SecondLife that spawn multiple Dullahan processes per instance per profile. Cookies are not remembered between Dullahan sessions, prompting users with cookie walls and logged out sessions every single time.

This pull request disables that security measure by default, to restore it to pre-Chrome 114 behavior, and adds to option to restore the security measure by setting disable_cookie_database_locking = false in the CEF settings.

@Aven-dev Aven-dev marked this pull request as draft June 24, 2025 13:07
…he original intend to have it as a function that was also missing from the initial commit.
@Aven-dev
Copy link
Author

@callumlinden I'm only able to build this project against CEF 112 on Windows, but my current viewer Firestorm uses CEF 118. Building against any other version leads to override signature mismatches. Is this project now being maintained elsewhere?

If so, LockProfileCookieDatabase needs to be added to disable-features in order to fix the reported issue (as I tried with this PR), or viewers needs to close the Dullahan instance that gets opened for the user's profile (not the "undefined" one) right after login. After spawning in-world I didn't observe the PID of that instance doing any file operations with ProcMon, so it should be safe to.

@toastercup toastercup requested review from Geenz, callumlinden and a team July 24, 2025 22:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant