Hacker News new | past | comments | ask | show | jobs | submit login
JSON Web Token Validation Bypass in Auth0 Authentication API (insomniasec.com)
3 points by mfincham on April 15, 2020 | hide | past | favorite | 1 comment



> The Authentication API prevented the use of alg: none with a case sensitive filter. This means that simply capitalising any letter e.g. alg: nonE, allowed tokens to be forged.

The option to have 'alg: none' should never be used as it is still the biggest footgun in the JOSE specification. I'm not sure why on earth you need a case-sensitive filter on this, but even giving the user a choice of ciphers to use is a recipe for disaster. Thus JWT is still a cryptographically weak standard.

PASETO [0] or Branca [1] are cryptographically stronger alternatives to use over JWT here.

[0] https://paseto.io [1] https://branca.io




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: