-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Enforce same session link usage #105
Comments
django-sesame is primarily designed to provide secure authentication tokens using only state available in the database (vs. in the session). If you're using sessions and you're storing them on the server, you don't need the cryptography provided by django-sesame. You can generate a random token with secrets.token_urlsafe, store that token and its expiry date in the session, then check that you're getting the same token before the expiry date from the verification link. That doesn't work if you're storing sessions in cookies because they are signed but not encrypted, meaning that the user could decode the session and look up the token there, defeating the purpose. In that situation, you could create a random token and store it in the session, then use scoped tokens with Can you share your solution? I'm curious to see what it looks like. Depending on how much code and complexity it adds to the library, I may consider it. Specifically, I want to check if you've done it in a way that doesn't cause token generation to know about sessions or cookies. |
My implementation was an afterthought. I had already created the whole magic link flow and realized that it would be far too easy to leak out the url to someone that likely should not have it (thinking insecure email transit, sharing links etc - everything you have already mentioned) So my implementation, rather than just using session alone, it inverted the process. It added the Primary Key of the login link to the session and compared at use time. I am thinking this could be really easy for this repo to implement as it could be put behind a setting on both the generation and the use. The benefit to creating the code in the DB is purely for analytical purposes - who is completing the process and who is not. If you simply added the code to the session you would not have that data unless you stored it elsewhere. The one line of code I think you could add (and the most salient from my code) is:
Pretty dead simple on the generation side. The more questionable (for ease of implementation) code for the validation side is something along the lines of:
|
Clear - thank you. I think there's a valid use case here. This would require adding a new API or extending the current API because get_user takes a |
I have implemented a variation of django-sesame in my own code. One security enhancement that I implemented was the requierement that the link be used in the same browser session This meant that even if the link was leaked, the person receiving it must be on the same device that issued the request.
I suspect this as an option might be beneficial to enhance the security of this package.
The text was updated successfully, but these errors were encountered: