Hi,

    Not directly related to OAuth at this time but we are investigating 
alternatives to session cookies. I am asking about coding additional 
approaches to thwart browsers' (Firefox) restored session cookies that our 
bank's users are objecting to. We don't want to change browser settings.  I 
know that this is widely discussed but haven't seen a general approach.

SInce protocols like OAuth may use tokens based on timestamps we could use 
an approach like this to have a second factor of authentication.

How do I prevent old session cookies that are restored by browsers from 
replaying an attack ? What additional cookies or tokens can I code ?

Can I look at any part of the source code to understand this ?

Thanks,
Mohan

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to