-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rate limit github-auth endpoints #1805
Comments
Just emailed you; thanks. |
Clarified offline that this is low severity. We should still fix it quickly. 😬 |
It's not clear how to fix this. The We could consider a rate limit. |
In my opinion, this and the token pool solidifies the need for separate state storage such as a key-value database like Redis.
That's like demolishing a building so terrorists can't blow it up. |
How would state storage solve the problem? If one endpoint gives out tokens as fast as you want, and another consumes them, it doesn’t matter whether they are single use or not. It’s more like putting a fence around it. We probably could limit to one token per 30 sec per IP, and 5 per 30 seconds overall, without much inconvenience to anyone. |
You're right, rate-limiting the auth endpoint makes sense. |
I noticed this issue while I was working on #541. OAuth web application flows require a randomly generated
state
parameter to authenticate callback (redirection) requests from the client. Without this security check, adversaries can orchestrate a denial of service attack using the callback endpoint. For more info see:TL;DR:
The text was updated successfully, but these errors were encountered: