TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

JSON Web Token Validation Bypass in Auth0 Authentication API

3 pointsby mfinchamabout 5 years ago

1 comment

rvzabout 5 years ago
&gt; The Authentication API prevented the use of alg: none with a case sensitive filter. This means that simply capitalising any letter e.g. alg: nonE, allowed tokens to be forged.<p>The option to have &#x27;alg: none&#x27; should never be used as it is still the biggest footgun in the JOSE specification. I&#x27;m not sure why on earth you need a case-sensitive filter on this, but even giving the user a choice of ciphers to use is a recipe for disaster. Thus JWT is still a cryptographically weak standard.<p>PASETO [0] or Branca [1] are cryptographically stronger alternatives to use over JWT here.<p>[0] <a href="https:&#x2F;&#x2F;paseto.io" rel="nofollow">https:&#x2F;&#x2F;paseto.io</a> [1] <a href="https:&#x2F;&#x2F;branca.io" rel="nofollow">https:&#x2F;&#x2F;branca.io</a>