On 20/02/2014 8:23 AM, Chris Karlof wrote: > Here are my recommendations: > > 1) *Don't remove Hawk where we're currently using it*. It will be too > disruptive at this point in time. > > 2) *Dramatically scale back the replay protection of Hawk. *Hawk allows > a time window of 1 min by default. I propose we change that to something > big. A day, a week, a month, a year. Turn the knob until we stop seeing > problems. This is a server side change, so we can keep cranking until > the problem diminishes to a level we're comfortable with. We could turn > it off completely (i.e., time window of infinity), but I think there is > some value to keeping *some* replay protection beyond what is already > provided by TLS. Even if we turn off the replay protection of Hawk, we > still get other benefits from it (e.g., not leaking the actual token in > every request). > > 3) *Keep the servers in time sync. *
There's also a non-hawk-related timestamp issue that has popped up from time to time - the client-provided expiry time in the BrowserID certificate. Has this been much of a problem in practice, and is there anything we can do there apart from adjust-for-skew-and-retry? (At least this case is localized to just the tokenserver client code, and doesn't need to be reimplemented all over the place) Ryan _______________________________________________ Sync-dev mailing list [email protected] https://mail.mozilla.org/listinfo/sync-dev

