-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test Server should keep track of nonce #13
Comments
I looked at the code today after seeing the korben post, wondered a little time about the treatment of nonces, was about to send a mail to [email protected] then saw this already has an issue. So posting here instead. Could you also provide a clean treatment for nonces ? I don't feel it's an easy task. Server Side Additional note (my current view of the problem ): It seems to me that bitauth is just (not) implementing a nonce mechanism over standard Elliptic Curve Cryptography authentification. It seems to me it doesn't implement "perfect forward secrecy", so that for me : |
Why don't we forget having the client pick the nonces?
Maybe I'm missing something, but it seems like we could get away without having to remember anything for longer than a session (just issue a new random number), and it avoids the possibility of someone intercepting a previous signature for a higher nonce and using that to login. |
@snakecharmer1024 It's almost a month since I looked to bitauth, so I may have not understood you. |
@darkblue346 Ok I think I see what you mean. Like this?
Is that roughly what you mean? This stuff is challenging to think about clearly. |
@martindale is this still relevant |
As per #12, the included test server should reject requests that that do not correctly include a nonce.
The text was updated successfully, but these errors were encountered: