Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expiration date is limited to Tue, 19 Jan 2038 03:14:07 GMT #92

Closed
wvdd007 opened this issue Jan 29, 2015 · 27 comments
Closed

Expiration date is limited to Tue, 19 Jan 2038 03:14:07 GMT #92

wvdd007 opened this issue Jan 29, 2015 · 27 comments
Labels
Customer reported Indicates issue was opened by customer Enhancement The issue is a new feature P2 High, but not urgent. Needs to be addressed within the next couple of sprints

Comments

@wvdd007
Copy link

wvdd007 commented Jan 29, 2015

I was using the version 0.1.0 of the nuget up until now. We are switching to the new nuget. To make sure that everything which worked before still works, I wrote some regression tests. One of them is "a token that was valid using the old handler should still be valid". To be able to test this, a serialized tons of jwt tokens using all of my RP settings and created a fake token with an expiration date at new DateTime(4321, 1, 1). (To be easy to visually see if it is correct) To my surprise this test failed with the current implementation. "IDX10225: Lifetime validation failed. The token is missing an Expiration Time.". I reverified my token which had ""nbf":0,"exp":74190380400". After a debugging session I noticed that there was an overflow exception (which is eaten by the handler). I saw that the claim is read using an int32. In practical situations this might be enough but I would have preferred the usage of an int64 for this. What do you think ?

@brentschmaltz
Copy link
Member

I used int32 as it maps nicely to epoch time. You are correct that in 2038, it wraps.
I think it is worth consideration.

@wvdd007
Copy link
Author

wvdd007 commented Jan 31, 2015

In theory this is a detail. In practice, we've had the fuzz about Y2K and we somehow would avoid something similar (although I fully admit that 2038 is still a lot of time). It's up to you what you do with it.

@brentschmaltz brentschmaltz added this to the GA milestone Feb 2, 2015
@brentschmaltz brentschmaltz modified the milestones: Next Release, GA Apr 18, 2015
@brentschmaltz brentschmaltz self-assigned this Apr 18, 2015
@brentschmaltz brentschmaltz modified the milestones: Beta 5, Beta 4 Apr 18, 2015
@brentschmaltz brentschmaltz removed the bug label Apr 18, 2015
@brentschmaltz brentschmaltz modified the milestones: GA, Beta 5 Apr 18, 2015
@tushargupta51
Copy link
Contributor

Closing this issue for now, 2038 is way in the future. We can revisit this later.

@MarkDuckworth
Copy link

This is still a bug, please reopen.

@silverferrum
Copy link

This is still a bug, please reopen. (2)

@brentschmaltz
Copy link
Member

@silverferrum Changing JwtPayload.Exp to long? would be breaking and would cause problems for many users.

We could add a new property that returns long?
We are favoring JsonWebToken and when we add the Exp property, we will add it as a long?.

@brentschmaltz brentschmaltz reopened this Oct 24, 2019
@brentschmaltz brentschmaltz modified the milestones: RC, 6.x Oct 24, 2019
@brentschmaltz brentschmaltz added Customer reported Indicates issue was opened by customer Enhancement The issue is a new feature labels Oct 24, 2019
@brentschmaltz brentschmaltz added the P1 More important, prioritize highly label Oct 24, 2019
@silverferrum
Copy link

@brentschmaltz hi!
Problem is that if we specify expiration after 2038-1-19 the token will be generated with correct exp value. But when we attempt to validate such token the error will be returned in header
www-authenticate: Bearer error="invalid_token", error_description="The token has no expiration"

So I cannot advise you how to fix that because I do not use JwtPayload.Exp property directly but the AuthorizeAttribute does.

@brentschmaltz
Copy link
Member

@silverferrum I am curious why you need a date so far in the future?

Can you share how you are using the AuthorizeAttribute?

@silverferrum
Copy link

Currently, it is not creating a bug for me but it is weird that token is generated with correct expiration but can't validate it.
Is it really hard to fix?

        public static void AddJwtAuthentication(this IServiceCollection services, IConfiguration configuration)
        {
            var jwtOptions = new JwtOptions();
            configuration.GetSection("JwtOptions").Bind(jwtOptions);

            services.Configure<JwtOptions>(o =>
            {
                o.Key = jwtOptions.Key;
                o.Issuer = jwtOptions.Issuer;
                o.Audience = jwtOptions.Audience;
            });

            var tokenValidationParameters = new TokenValidationParameters
            {
                ValidateIssuer = true,
                ValidateAudience = true,
                ValidateLifetime = true,
                ValidateIssuerSigningKey = true,
                ValidIssuer = jwtOptions.Issuer,
                ValidAudience = jwtOptions.Audience,
                IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(jwtOptions.Key))
            };

            services
                .AddAuthentication(o =>
                {
                    o.DefaultAuthenticateScheme = JwtBearerDefaults.AuthenticationScheme;
                    o.DefaultChallengeScheme = JwtBearerDefaults.AuthenticationScheme;
                })
                .AddJwtBearer(JwtBearerDefaults.AuthenticationScheme, options =>
                {
                    options.TokenValidationParameters = tokenValidationParameters;
                });
        }

And then you just add the AuthorizeAttribute to the ASP.NET Core Controller.

@brentschmaltz
Copy link
Member

@silverferrum the problem is the api returns an int (our mistake). If we change it to return a long we will break users. That is why we would need a new API. Breaking users is a really bad thing in today's world of multiple dependencies.

@brentschmaltz brentschmaltz added P2 High, but not urgent. Needs to be addressed within the next couple of sprints and removed P1 More important, prioritize highly labels Oct 30, 2019
@silverferrum
Copy link

I think you are right. Maybe, adding the long field with marking the int field as obsolete will be good idea for a couple of years.

@stukselbax
Copy link

Today is 22.11.2021, problem still exist - System.IdentityModel.Tokens.Jwt, Version=6.14.1.0.

Please, introduce major release with Y2K fix.

One day the users with old version of this package will get broken application. That's sad.

@vcsjones
Copy link

A developer reported an issue to dotnet/runtime that was ultimately this issue. dotnet/runtime#63001 (comment)

@ggeurts
Copy link

ggeurts commented Mar 7, 2022

This issue has cost me days of work trouble shooting. Please make the Int32 value obsolete and add an 64-bit version of the property that gets used by the validators.

@brentschmaltz
Copy link
Member

@ggeurts ouch, that is painful.
Yes we will add a new API.

@andylai
Copy link

andylai commented Apr 12, 2022

Is this issue has been solved? Or still the same?
I have faced this issue recently.
Any solution?
Thanks.

@brentschmaltz
Copy link
Member

@andylai we haven't got to it yet.

@Exadra37
Copy link

On same boat here, spent some days trying to figure out what was wrong until I landed here.

@jaslam94
Copy link

jaslam94 commented May 4, 2022

The problem still exists.

@mus65
Copy link

mus65 commented Jun 27, 2022

For anyone who needs a workaround: we worked around this by setting TokenValidationParameters.RequireExpirationTime to false if exp overflows.

if (
  DateTime.UtcNow.Year < 2038 &&
  jwtTokenParsed.Payload.TryGetValue("exp", out object expObj) &&
  expObj is long exp &&
  exp > int.MaxValue
)
{
  requireExpirationTime = false;
}

@nikolaytashev
Copy link

I need this one fixed. The workarounds doesn't work for me.

@jhonathanc
Copy link

jhonathanc commented Mar 13, 2023

For anyone who needs a workaround: we worked around this by setting TokenValidationParameters.RequireExpirationTime to false if exp overflows.

if (
  DateTime.UtcNow.Year < 2038 &&
  jwtTokenParsed.Payload.TryGetValue("exp", out object expObj) &&
  expObj is long exp &&
  exp > int.MaxValue
)
{
  requireExpirationTime = false;
}

This workaround is very limited because the time validation may be different for different bearers (e.g., different users with different roles, different systems with different expiration times...) and some bearers need to be validated against time (with a short period of time, like 5 minutes) and others "don't" (15 years). I agree it may solve the issue for some users that has only one expiration time, but for others, it will just remove an important validation.

@mus65
Copy link

mus65 commented Mar 13, 2023

For anyone who needs a workaround: we worked around this by setting TokenValidationParameters.RequireExpirationTime to false if exp overflows.

if (
  DateTime.UtcNow.Year < 2038 &&
  jwtTokenParsed.Payload.TryGetValue("exp", out object expObj) &&
  expObj is long exp &&
  exp > int.MaxValue
)
{
  requireExpirationTime = false;
}

This workaround is very limited because the time validation may be different for different bearers (e.g., different users with different roles, different systems with different expiration times...) and some bearers need to be validated against time (with a short period of time, like 5 minutes) and others "don't" (15 years). I agree it may solve the issue for some users that has only one expiration time, but for others, it will just remove an important validation.

This actually works in our case because we are creating a new TokenValidationParameters instance for every single validation (we are not using using the ASP.NET Core extension methods where this may not be possible).

But yes, it's a bad workaround and I'm quite dissappointed that this still hasn't been fixed. 2038 is not that far off anymore and the longer the fix takes, the more legacy software will be broken by this.

@michaelhachen
Copy link

Same problem here. We really need a fix for this!

@jbcullis
Copy link

jbcullis commented Jun 23, 2023

Yeah, this needs to be fixed....reported 8 years ago and the problem persists?
Seems to be a .net issue more than a AD issue as we are running into this on a .net7 web app.

@jennyf19
Copy link
Collaborator

This is fixed in IdentityModel 7.

@KalleOlaviNiemitalo
Copy link

IIUC, IdentityModel 7 doesn't support .NET Framework (#2123); how can I get the year 2038 fix for .NET Framework?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Customer reported Indicates issue was opened by customer Enhancement The issue is a new feature P2 High, but not urgent. Needs to be addressed within the next couple of sprints
Projects
None yet
Development

No branches or pull requests