TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

JSON Web Token Validation Bypass in Auth0 Authentication API

3 点作者 mfincham大约 5 年前

1 comment

rvz大约 5 年前
&gt; The Authentication API prevented the use of alg: none with a case sensitive filter. This means that simply capitalising any letter e.g. alg: nonE, allowed tokens to be forged.<p>The option to have &#x27;alg: none&#x27; should never be used as it is still the biggest footgun in the JOSE specification. I&#x27;m not sure why on earth you need a case-sensitive filter on this, but even giving the user a choice of ciphers to use is a recipe for disaster. Thus JWT is still a cryptographically weak standard.<p>PASETO [0] or Branca [1] are cryptographically stronger alternatives to use over JWT here.<p>[0] <a href="https:&#x2F;&#x2F;paseto.io" rel="nofollow">https:&#x2F;&#x2F;paseto.io</a> [1] <a href="https:&#x2F;&#x2F;branca.io" rel="nofollow">https:&#x2F;&#x2F;branca.io</a>