diff --git a/config/defaults.hjson b/config/defaults.hjson
index 47d3ed24f5228b87627a4e84757059d424e6c85d..880af802c85c6c5ace91824e737273f332d91671 100644
--- a/config/defaults.hjson
+++ b/config/defaults.hjson
@@ -98,6 +98,4 @@
   # Sets a response Access-Control-Allow-Origin CORS header
   # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Access-Control-Allow-Origin
   cors_origin: "*"
-  # Always send cache-control: private header for api responses, avoid problems with wrong caching.
-  disable_cache_control: true
 }
diff --git a/crates/api/src/lib.rs b/crates/api/src/lib.rs
index c41b2315ab2614d898598ca3e66ee0ed522afedf..faa74824ec34ef26057baa09701c064b94ccec64 100644
--- a/crates/api/src/lib.rs
+++ b/crates/api/src/lib.rs
@@ -15,7 +15,6 @@ use lemmy_utils::{
 };
 use std::io::Cursor;
 use totp_rs::{Secret, TOTP};
-use tracing::log::warn;
 
 pub mod comment;
 pub mod comment_report;
@@ -85,11 +84,6 @@ pub fn read_auth_token(req: &HttpRequest) -> Result<Option<String>, LemmyError>
   else if let Some(cookie) = &req.cookie(AUTH_COOKIE_NAME) {
     Ok(Some(cookie.value().to_string()))
   }
-  // Read old auth cookie
-  else if let Some(cookie) = &req.cookie("jwt") {
-    warn!("Falling back to jwt cookie");
-    Ok(Some(cookie.value().to_string()))
-  }
   // Otherwise, there's no auth
   else {
     Ok(None)
diff --git a/crates/api_common/src/utils.rs b/crates/api_common/src/utils.rs
index 3c57a36cdaa9ce3608f7a0548fb0f791be27eac6..0ea27f794c84072b9b681a8d16d8d535c3ea5596 100644
--- a/crates/api_common/src/utils.rs
+++ b/crates/api_common/src/utils.rs
@@ -43,7 +43,7 @@ use std::collections::HashSet;
 use tracing::warn;
 use url::{ParseError, Url};
 
-pub static AUTH_COOKIE_NAME: &str = "auth";
+pub static AUTH_COOKIE_NAME: &str = "jwt";
 
 #[tracing::instrument(skip_all)]
 pub async fn is_mod_or_admin(
diff --git a/crates/utils/src/settings/structs.rs b/crates/utils/src/settings/structs.rs
index ba247d7dbc09c7a34e951837597735b18dfde078..886cd71b683bdfa4983a3090d9ce49e0026d26d4 100644
--- a/crates/utils/src/settings/structs.rs
+++ b/crates/utils/src/settings/structs.rs
@@ -57,9 +57,6 @@ pub struct Settings {
   #[default(None)]
   #[doku(example = "*")]
   cors_origin: Option<String>,
-  /// Always send cache-control: private header for api responses, avoid problems with wrong caching.
-  #[default(None)]
-  pub disable_cache_control: Option<bool>,
 }
 
 impl Settings {
diff --git a/scripts/lint.sh b/scripts/lint.sh
index 6a9526dfc4e1ad9eac4abe09c2a818991cba3d49..924fba390e92d328c020b2d57333a7d7939ff9e6 100755
--- a/scripts/lint.sh
+++ b/scripts/lint.sh
@@ -5,7 +5,7 @@ CWD="$(cd -P -- "$(dirname -- "${BASH_SOURCE[0]}")" && pwd -P)"
 
 cd $CWD/../
 
-cargo clippy --workspace --fix --allow-staged --allow-dirty --tests --all-targets -- -D warnings
+cargo clippy --workspace --fix --allow-staged --allow-dirty --tests --all-targets --all-features -- -D warnings
 
 # Format rust files
 cargo +nightly fmt
diff --git a/src/session_middleware.rs b/src/session_middleware.rs
index bdecb98181a649f56e9e44e46ba0198b8e009cfe..f50e0eccd86669e6d23bd95b1b022fb2c8976246 100644
--- a/src/session_middleware.rs
+++ b/src/session_middleware.rs
@@ -11,7 +11,6 @@ use lemmy_api::{local_user_view_from_jwt, read_auth_token};
 use lemmy_api_common::context::LemmyContext;
 use reqwest::header::HeaderValue;
 use std::{future::ready, rc::Rc};
-use tracing::log::warn;
 
 #[derive(Clone)]
 pub struct SessionMiddleware {
@@ -72,11 +71,8 @@ where
         // TODO: this means it will be impossible to get any error message for invalid jwt. Need
         //       to add a separate endpoint for that.
         //       https://github.com/LemmyNet/lemmy/issues/3702
-        let local_user_view = local_user_view_from_jwt(jwt, &context).await;
-        if let Err(e) = &local_user_view {
-          warn!("Failed to handle user login: {e}");
-        }
-        if let Ok(local_user_view) = local_user_view {
+        let local_user_view = local_user_view_from_jwt(jwt, &context).await.ok();
+        if let Some(local_user_view) = local_user_view {
           req.extensions_mut().insert(local_user_view);
         }
       }
@@ -85,14 +81,11 @@ where
 
       // Add cache-control header. If user is authenticated, mark as private. Otherwise cache
       // up to one minute.
-
-      let disable_cache = context.settings().disable_cache_control.unwrap_or(false);
-      let cache_value = if jwt.is_some() || disable_cache {
+      let cache_value = if jwt.is_some() {
         "private"
       } else {
         "public, max-age=60"
       };
-
       res
         .headers_mut()
         .insert(CACHE_CONTROL, HeaderValue::from_static(cache_value));