-
Notifications
You must be signed in to change notification settings - Fork 374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWT is easily breakable #267
Comments
The values are signed to prevent modifying not encrypted check out this article https://stackoverflow.com/questions/454048/what-is-the-difference-between-encrypting-and-signing-in-asymmetric-encryption |
@gotoAndBliss First of all you seem to be confusing signing and encryption. The JWT standard (not only this library) only does the former. The tokens themselves (header, payload and signature) are just Base64-encoded for transport, never encrypted (just e.g. paste any JWT into the box on jwt.io to see the plaintext). There is a second standard (JWE) that does encryption, but that is for different use cases and is not handled by this library AFAIK. Secondly, in the second snippet you provided ( |
Why is this even still open? signing != encrypting |
if you need encryption, use |
Oh so fancy! RSA protected?
Works for every single encryption value offered by JWT
Good luck guys!
The text was updated successfully, but these errors were encountered: