question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Parser throws exception when token is expired

See original GitHub issue

When parsing a token that has expired, the parser should not throw an exception, as was implemented in #6, because then the rest of the data in the token is inaccessible.

This appears to have been brought up before, and ignored in #379.

This exact case is happening to me now. I’m literally parsing the token to check if it has expired, but before I can evaluate it, I get an exception. Ok, so now I know its expired, but I can’t get any other data out of it to determine how I should refresh it.

io.jsonwebtoken.ExpiredJwtException: JWT expired at 2019-02-27T15:12:51Z. Current time: 2019-02-27T15:19:33Z, a difference of 402779 milliseconds.  Allowed clock skew: 0 milliseconds.
        at io.jsonwebtoken.impl.DefaultJwtParser.parse(DefaultJwtParser.java:385)
        at io.jsonwebtoken.impl.DefaultJwtParser.parse(DefaultJwtParser.java:481)
        at io.jsonwebtoken.impl.DefaultJwtParser.parseClaimsJwt(DefaultJwtParser.java:514)

Issue Analytics

  • State:closed
  • Created 5 years ago
  • Reactions:5
  • Comments:6 (3 by maintainers)

github_iconTop GitHub Comments

4reactions
lhazlewoodcommented, Mar 19, 2019

Parsing and processing are not the same thing

If you start using an expired JWT immediately after the parser returned quietly - as you would have it do - what would you call your usage? Once you start reading it and interpreting it and making logic decisions based on it - is that not processing? And consequently in direct violation of the spec?

and not in the spirit of the point of the spec.

According to whom? How do you know we haven’t spoken with JWT RFC specification committee members?

I would happily discuss with you or any other contributors on this project the merit of what you claim if you can provide some credible authoritative evidence (e.g. spec committee members or contributors or security experts) to the contrary. I genuinely mean this and I’m happy to oblige.

I think your interpretation of the spec needs to be peer reviewed

It has been - many, many, many times. That is why I’m using ‘we’ and not ‘I’. Most of us agree with JJWT’s stance on secure parsing because the pitfalls without it are significant.

The only people I’ve seen disagree are you and some others in some of the GH issues here (and even some of them have changed their mind in favor of JJWT’s current approach). I respectfully submit this is not enough evidence to overturn what we and most others consider a best practice.

This is not the first time I’ve noticed this library making assumptions like that

It is no assumption, I can assure you. It was a carefully crafted, very calculated behavioral choice based on the exact wording in the RFC specification as well as the significant security attack vectors that can happen with JWTs if library users are not careful.

Believe me - we agonize over this stuff. Every line of code in this project has a very clear intent for what is going on. It is why the entire codebase has 100% line and branch/conditional test coverage. We do our very best to make JJWT insanely easy to use, but sometimes we choose to favor security over usability.

Please consider enlisting some support, because unilateral anti-pattern decisions

Again, not unilateral (peer reviewed and discussed with many), and definitely not an anti-pattern according to those we’ve spoken with security backgrounds. And we’ve had great support so far, and more people lend a hand all the time.

Finally, I will end this by saying that we’re all human and fallible, and I could be wrong. But so could you. As much as I respect your desire and passion behind what you are advocating, you’ve presented only conjecture and opinion as to why JJWT’s security stance should change. Unfortunately that’s just not enough to override what I, @dogeared, and the other significant contributors believe to be the correct direction for JJWT’s design.

If you’d like to provide evidence from spec committee members or credible security experts that our design is flawed, I’ll be the first person to work with you to design a better approach. Cheers!

3reactions
bpappincommented, Mar 20, 2019

Ok, real world software happening here.

Think through the logic of throwing an exception, and preventing any more information from being gleaned from the token, just because it’s expired.

Ok, so the token is expired. It should not be considered valid, and it’s the responsibility of the calling code to prevent the client from doing anything that should be protected. All good. Now what?

In a simple approach, the client would simply ask for a new token. What happens if the client has several potential token providers (yes, that’s a thing where these tokens are used)? Which one do I ask for a new token from? Unfortunately, the client can’t tell, because an exception was thrown before it could get that data.

My problem with this, and with every other time I have had to raise issues, is that the library doesn’t take into account what software really has to do. The library makes far too many assumptions about how it’s being used, that only match a very narrow profile.

The library developer can’t possibly know what is the right thing to do at the time it’s being executed, and tries to impose its will on the calling code, via an exception. To make things worse, it isn’t even a checked exception!

You can imagine how frustrating it is, when a library does something contrary to the “principle of least astonishment”, and actively prevents normal flow. In this case, the anti-pattern is pretty much control flow by exception.

Read more comments on GitHub >

github_iconTop Results From Across the Web

JWT token is always throwing ExpiredJwtException while ...
I'm trying to implement jwt based authentication to expose my REST api using spring boot, but I'm facing an issue with JWT expiration...
Read more >
io.jsonwebtoken.ExpiredJwtException java code examples
@Override public Maybe<User> grant(TokenRequest tokenRequest) throws InvalidGrantException { String assertion = tokenRequest.
Read more >
Spring Boot Security - Refresh Expired JSON Web Token
We will be working on a solution where if the user he receives JWT expired exception, then he can call another API with...
Read more >
How to use managed identities for Azure resources on an ...
Cache miss occurs due to no token in the managed identities for Azure resources subsystem cache. The cached token is expired. Error handling....
Read more >
REST Security with JWT using Java and Spring Security - Toptal
startsWith("Bearer ")) { throw new JwtTokenMissingException("No JWT token found in ... stuff and add more security features, such as the token's expiration.
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found