You are not logged in.
Pages: 1
On some computers we get "not before failed" error when validating token from an OpenID Connect Identity Provider.
I assume this could be due to an NTP sync issue of the computer running mORMot application and the Identity provider issuing the token.
The following line did not help:
Verify(Token, jwt, [jrcNotBefore])
Any idea on how to have some "tolerance" in the code for this?
Offline
Difficult to debug as this is a client environment, not possible to install delphi or anything like that. Also, it does not happen on every machine, and interestingly enough those machines that had problem yesterday are working fine today.. so typical..
However, one machine was still stating "not before failed" so I added my own UnixTimeUtc timestamps before and after calling Verify and then compare those with the nbf in token.
Result: it was always 1 sec difference!
So, on that particular machine (or who knows how many others) I always get a token that is "from the future" for that given machine.
This is why I was thinking if there is some sort of "delta" tolerance.
Offline
I've found NotBeforeDelta (with 15 sec default) parameter within VerifyPayload procedure, but nothing similar is in the Verify procedure. Is there a reason for using one over another? Both are being tested in test.core.crypt.pas although no specific test for nbf.
The only thing I can see is that CheckAgainstActualTimestamp is not having any "delta" tolerance in:
if jrcNotBefore in Jwt.claims then
if not ToCardinal(Jwt.reg[jrcNotBefore], unix) or
(nowunix < unix) then
begin
Jwt.result := jwtNotBeforeFailed;
exit;
end;
Offline
It makes sense now.
Please try with
https://github.com/synopse/mORMot2/commit/d047caea4
There is a 30 seconds grace delay by default now.
Offline
Great! Thanks Arnaud.. works as expected!
Offline
Pages: 1