bug: _session cookie of deleted user not invalidated, feature: cookie max-age
Problem:
There is a specific circumstance where it's impossible to sign-in anymore till the deletion of _session cookie in Chrome(Android) or Safari(iOS), even if the prompt=login.
Related issue here https://github.com/openid/AppAuth-Android/issues/874 and how it is solved
Steps to reproduce the issue, assuming you have a signin with auto code exchange and prompt=login, i.e should always force a new login:
- You log-in in your app
- You clear the data / uninstall app
- From LogTo, you must delete the account where you logged in at step 1
- Open the app and try to login: you get always "invalid-grant"
PlatformException(authorize_and_exchange_code_failed, Failed to authorize: [error: invalid_grant, description: grant request is invalid], null, null)
What would be the correct flow:
- //
- //
- //
- You should be able to login again, because
prompt=loginshould be a guarantee that any (corrupted or not corrupted)_session cookie previously stored in the browser won't prevent you to login again
Explanations:
- Seems that somehow is read the
_sessioncookie that points to "dead" user information (deleted). The user will not be able to login anymore till he manually delete the_sessioncookie in Chrome.
Possible solution:
- Find a way to set
max_age: 0along withprompt=login, so that the_sessioncookie auto-expire. In the specs there is actually an OpenID param called max-age or max-auth-age but I'm not sure LogTo implement it.
You can notice, in the photo below that_sessionis valid for 2 weeks from login, it should be always 0 whenprompt=loginis used
In order to don't break the user sign-in flow after a user deletion, we should either:
- Workaround / Feature "maxAge": this will tweak the
_sessioncookie so that is not always1_209_600but ismaxAgedependant. - I think that, when
prompt=login,_sessioncookie should never be parsed/validated, because everything related the previous session can be safely ignored. - If still, for some reason, we want to validate the
_sessioncookie even ifprompt=login, we should definitely find a way to don't throw an exception when the user info associated to the_sessioncookie doesn't exist anymore
on iOS a temp workaround to this issue is to set ephimeralSession true, but is not possible on Android and also is not something nice, since the browser have stored the connectors account (like AppleID / Gmail) to be easily tapped
I tried to pass "max-age":0 or "max_age":0 but is still setting _session cookie expiration after 2 weeks
Is there any update about?
@michelerenzullo I'll take a look soon.
Hi @michelerenzullo,
I attempted to reproduce the issue but was unsuccessful. Here's my process:
- Signed in as
user1and redirected to the application - Deleted
user1via the admin console - Cleared the application's local data (specifically, the
localStorage) - Reloaded the application
Result: I was redirected to the sign-in page. The password form appeared without any errors. This behavior is expected because the server automatically invalidates and clears the session for the deleted user.
Let me know if you need any clarification or if you'd like me to try a different approach.
Hi @wangsijie ,
I believe there is something different in your environment, for app I mean any android or iOS application . The "_session" cookie is stored in Cookie Tab of Chrome or Safari (you can use Dev tools and remote debugging from your laptop). Even if you delete local storage, the cookie is still present and is erased only when doing an endSession on the endpoint of LogTo. Let me know how can I help you to reproduce, I will think something more advanced in a bit.
The _session cookie is still holding the userID information has an hash, because this is verified in LogTo and it throws an error. The _session cookie can't be directly "deleted" because LogTo has no access to Chrome or Safari, only if executing an end session request this is erased, but this option is excluded since (point 2) the user deleted the app
I can confirm that _session exists in my browser, and it was sent to the server.
I'll do another test in native application.
Hi, is there any update about this issue? Thank you
Hi @michelerenzullo , I just have a test, but I can't reproduce.
https://github.com/user-attachments/assets/079fe5a9-0c0f-49dd-b785-42a4f7cf47e2
That s strange, have you checked if there is the _session cookie? If there isn't this explain why your app is still able to sign in again. I tested with Flutter. I will do a screen record.
@xiaoyijun I created a similar test to yours, using an android emulator and a test app (flutter based), the cookie is kept stored in WebView Shell, so the bug persist in the same way as I described initially.
In your test you are using native layer Android, so perhaps you are not launching a Tab in an external browser (doesn't matter if is WebView Shell / Chrome / Firefox / Safari iOS...), so somehow the _session cookie is not stored in your scenario and therefore you not having the same issue.
In the video the "browser" is WebView Shell, but I can create the same test using Chrome and showing the same behaviour, where only deleting the cookie _session solve the issue (or generally speaking all data).
The issue is not actually the _session cookie, is that, LogTo backend try to parse the info inside this cookie, when it should not parse (since 'login' prompt), or it should safely "ignore" since are pointing to a deleted user, rather than reject, returning an "invalid_grant" error
https://github.com/user-attachments/assets/075e61ed-fcb9-417d-931e-738780563b13
Is there any update about? I can try to provide more info if can be helpful to you
We are still unable to reproduce this in native SDKs, we are now trying to do it again with flutter SDK.
@michelerenzullo are you using Logto Flutter SDK?
I'm using flutter_appauth plugin, but I don't think makes any difference as long as it is flutter and not native SDKs. I can try to replicate with LogTo Flutter SDK as well to confirm.
No worries, just want to confirm the native environment you have. As for all Logto native SDKs (including Flutter), we do not store login session cookies to the WebView. E.g. Swift SDK we have the ephimeralSession set to true.
That is probably why @wangsijie and @xiaoyijun couldn't reproduce this issue.
while this might be true for Swift SDK, using under the hood by default ephimeralSession, this is not true for LogTo Dart SDK, I just verified, LogTo Dart SDK stores for 14 days the _session cookie, I used chrome://inspect/#devices. so if is flutter_appauth or is LogTo Dart SDK the bug is still here
I want to let you know that I found a workaround for my situation that does the job but I strongly believe that a more good / elegant approach should be done from your side, in the backend, my solution is to force an endSession when invalid_grant is detected during signIn or during refresh tokens (well actually both are the same thing under the hood). Reference here
end session wipe out _session cookie but is not the best approach in my opinion
@simeng-li Can this be resolved since we are now moving to flutter-web-auth-2?
Is flutter web auth2 handling this scenario?
Hi folks, we have the exact same issue with Next.js APP Router. Is there any way to fix it at the moment? We have a 1 day TTL for the connector, but even after one day, given that we have the Logto session, the user can proceed to reauthenticate silently. For context:
We're using Logto as our authentication layer, which is based on the OIDC protocol. We’ve configured two Identity Providers (IdPs).
Token Configuration: Access Token TTL: 10 minutes Refresh Token TTL: 1 day
Current Authentication Flow: In our application, we attempt to retrieve a new access token using the refresh token. If this fails (e.g., the refresh token has expired), we redirect the user to /login, which in turn redirects to the Logto login page.
However, we’ve identified an issue in this flow:
The app tries to retrieve a new access token. The request fails because the refresh token is expired. The user is redirected to /login, which redirects to the Logto login screen. Logto still has an active session (stored via its own session mechanism). Logto silently initiates a new authorization code flow with PKCE. A new refresh token is issued to the app, allowing it to retrieve a fresh access token. The user is never prompted to log in again via the original IdP.
Problem: This means that even after the refresh token has expired, users are not required to reauthenticate with the IdP. Logto’s internal session continues to allow silent reauthentication and token issuance.
Desired Behavior: After the 1-day refresh token TTL, we want to enforce full reauthentication with the IdP. That is, when a user is redirected to /login, they should:
See the Logto login screen Be required to log in again with their chosen IdP.
Not be silently reauthenticated through Logto’s internal session