Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent Reuse of Step-One Token After Phone Number Registration #90

Closed
Dynavy opened this issue Mar 22, 2025 · 0 comments
Closed

Prevent Reuse of Step-One Token After Phone Number Registration #90

Dynavy opened this issue Mar 22, 2025 · 0 comments
Assignees
Labels
⬅️BACKEND 🧠 logic Handles business rules, data processing, and internal logic. 🔒security Tasks related to authentication, authorization, and data protection.

Comments

@Dynavy
Copy link
Collaborator

Dynavy commented Mar 22, 2025

Current Behavior:

Currently, after completing step one, a user receives a temporary 5-minute JWT token to proceed to step two, where the phone number is submitted.

However, since the token remains valid for 5 minutes, it is possible for the token to be reused multiple times to change the phone number within that time frame. This introduces a security risk, as the phone number should be set only once during registration.

Proposed Solution:

To prevent token reuse, the step-one token should be revoked immediately after it is used in step two. The best approach is to store revoked tokens in a database and check for revocation before authenticating any request.

Implementation Steps:

1. Create a database table to store revoked tokens:

A database table should be created to log the revoked tokens. This will allow tracking of the tokens that have already been invalidated.

2. Implement new methods in the JwtService to manage token revocation:

The JwtService will handle the management of revoked tokens, enabling both the revocation of a token and checking if a token has already been revoked.

3. Revoke the token immediately after step-two registration:

Once step two is completed, the step-one token must be revoked. This ensures that the token cannot be reused for any further operations after its intended use.

4. Modify JwtAuthenticationFilter to reject revoked tokens before authentication:

Before proceeding with authentication, it is necessary to check whether the token has been revoked. If the token has been revoked, the request should be rejected, and access to the system should be denied.

@Dynavy Dynavy added ⬅️BACKEND 🔒security Tasks related to authentication, authorization, and data protection. 🧠 logic Handles business rules, data processing, and internal logic. labels Mar 22, 2025
@Dynavy Dynavy self-assigned this Mar 22, 2025
@Dynavy Dynavy moved this to In Progress in COPAY - Sprint 1 Mar 23, 2025
@Dynavy Dynavy moved this from In Progress to Backlog in COPAY - Sprint 1 Mar 27, 2025
@krschan krschan self-assigned this Mar 27, 2025
krschan added a commit that referenced this issue Mar 28, 2025
@krschan krschan closed this as completed Mar 28, 2025
@github-project-automation github-project-automation bot moved this from Backlog to Done in COPAY - Sprint 1 Mar 28, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
⬅️BACKEND 🧠 logic Handles business rules, data processing, and internal logic. 🔒security Tasks related to authentication, authorization, and data protection.
Projects
Status: Done
Development

When branches are created from issues, their pull requests are automatically linked.

2 participants