On Aug 27, 2012, at 1:06 PM, Brian Eaton wrote:

> On Mon, Aug 27, 2012 at 12:11 PM, Dick Hardt <[email protected]> wrote:
> I have an application for JWT that is not OAuth2.
> 
> Should nonce and timestamp logic go in the application level protocol?

I prefer to NOT have the application level deal with token validity.

>  
> Having said that, nonce's are difficult to implement at scale and I have 
> heard of many sites that don't implement them fully.
> 
> Nonce alone can't be implemented efficiently.  You have to have time stamps 
> as well, otherwise you are stuck storing ever nonce you've ever seen, forever.
> 
> Even nonce + time stamp is challenging in distributed systems.  It adds a lot 
> of complexity.  That complexity is sometimes merited, but not always.

Thanks for confirming my statement.

I have stopped using nonce and only use time stamps lately and have made the 
system relatively stateless so that a second submission of the token is ok. 
That may not work for everyone, but I have found that architecture to be easier 
to implement and scale.

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to