Skip to content

Commit 8257685

Browse files
committed
fix: clarify replay attack prevention details in signature handling
Signed-off-by: Matthias Lechner <matlec.public@gmail.com>
1 parent 71f9d2f commit 8257685

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

system-design/specification/margo-management-interface/api-requirements-and-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Once the device management client has a message prepared for the Workload Fleet
108108
sig1=:<base64(signature)>:
109109
```
110110
111-
> Note: The server MUST use the 'created' value to detect and prevent replay attacks.
111+
> Note: The server MUST use the `created` timestamp from the signature input to detect and prevent replay attacks. Requests with a `created` timestamp older than a configurable validity window (e.g., 5 minutes) or in the future (allowing for clock skew) MUST be rejected.
112112
113113
#### Workload Fleet Manager Web-Service
114114
- On receiving the message from the Device Client, the Workload Fleet Management's web service MUST do the following :

0 commit comments

Comments
 (0)