-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unsecured JWT #253
Comments
At the moment, this isn't possible until jsonwebtoken accepts |
Considering jsonwebtoken has that issue as a closed:wontfix, and they give an easy solution, I don't see how that's a blocker. For alg So, what I mean is, jwt-cli could either do a plain decode (validate exp if you want), or this issue should be closed outright. But I think the blocked status is a falsehood and that shouldn't be the case here. I would prefer the former solution! thanks |
Thanks, @notrobpike. I'm not sure how much time I'll have to work on this, so if anyone would like to submit a PR, I'd be happy to review it. |
thanks. if i were familiar with rust I'd work up a PR. hopefully someone out there is motivated. |
Summary
RFC 7519 section 6.1 specifies Unsecured JWTs with algorithm
none
:https://www.rfc-editor.org/rfc/rfc7519#section-6
Steps to reproduce
Try encoding using algorithm
none
:And decoding using the JWT from the section 6.1 of the spec.
Expected behavior
The command
jwt encode --alg=none
should create a valid unsecured JWT andjwt decode
should be able to parse unsecured JWTs.Instead of
jwt encode --alg=none
the CLI could also expose this functionality viajwt encode --unsecured
to make the security implications more obvious.Additionally,
jwt decode
could also require an--unsecured
argument and throw a validation error if not provided when decoding an unsecured JWT.The text was updated successfully, but these errors were encountered: