Skip to content

Commit 40ded9b

Browse files
authored
Update draft-ietf-httpapi-idempotency-key-header.md
1 parent 04aefa0 commit 40ded9b

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

draft-ietf-httpapi-idempotency-key-header.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -309,14 +309,15 @@ Organization: WebEngage
309309
This section is meant to inform developers, information providers,
310310
and users of known security concerns specific to the idempotency keys.
311311

312-
When the resource server does not implement a strong idempotency key, such as an UUID or have appropriate controls to validate the idempotency key, it leads to various forms of security attacks.
312+
When the resource server does not implement a strong idempotency key, such as an UUID or have appropriate controls to validate the idempotency key, there could be various forms of security attacks from malicious clients:
313313

314-
* When a resource server that does not have stricter enforcement on the format of the idempotency key, clients MAY send low entropy keys in requests. In absence of a stronger authorization merchanisms in the resource server, an attacker MAY try to fetch idempotent cache entries belonging to other clients.
315-
* When a resource server directly uses the idempotency key in the client request to perform a cache or persistent store look up in order to evaluate the idempotency condition (including the detection of duplicate requests), it leads to many forms of security attacks (e.g. injection attacks) if the resource server does not implement a stronger validation mechanism for the idempotency key.
314+
* When a resource server directly uses the idempotency key in the client request to perform a cache or persistent store look up in order to evaluate the idempotency condition (including the detection of duplicate requests), there could be many forms of security attacks (e.g. injection attacks) from malicious actors if the resource server does not implement a stronger validation mechanism for the idempotency key.
315+
* When a resource server does not enforce stricter format for the idempotency key, clients MAY send low entropy keys in requests. In absence of a strong authorization merchanisms in the resource server, an attacker MAY try to fetch idempotent cache entries belonging to other clients.
316316

317-
The specification thus recommends the following for an idempotency key implementation.
318317

319-
* The resource server SHOULD always validate the key as per the published specification before processing any request.
318+
The specification thus recommends the following for an idempotency key implementation:
319+
320+
* The resource server SHOULD always validate the key as per it's published specification before processing any request.
320321
* Regardless of the specification of the idempotency key, the resource server MAY generate a server side idempotency key. Such a mechanism helps both towards reducing any form of security attacks, through the idempotency key, and preventing key collisons.
321322
* If a resource server implements an idempotent resource cache, the resource server, before doing a cache lookup using the client-sent or server generated idempotency key, SHOULD perform appropriate authorization to prevent leaking of cache entries belonging to another client.
322323

0 commit comments

Comments
 (0)