Replies: 2 comments 1 reply
-
Principle: there should be enough headers to avoid a replay attack. All signatures contain a timestamp, so that means that we should at the very least sign
That would avoid the same signature being used by an app to make multiple requests. |
Beta Was this translation helpful? Give feedback.
-
Section §7.2.2 Signature Replay, considers nonces to avoid signature replay attacks. In the initial demo I put together recently the client signs requests before receiving a 401 in order to avoid one round trip to the server. But how would that work with nonces? I think all I need is for each resource to keep a log of the past n minutes of requests, where n is the |
Beta Was this translation helpful? Give feedback.
-
The HTTPSig spec allows any number of headers to be signed. One very useful discussion to be had will be which are the most important headers that need to be signed, which create problems, ....
Latest spec to check is https://github.com/bblfish/authentication-panel/blob/sigUpdate/proposals/HttpSignature.md
Beta Was this translation helpful? Give feedback.
All reactions