logoalt Hacker News

some_furryyesterday at 11:00 PM2 repliesview on HN

https://github.com/tvondra/jwt_context/blob/10be23c0651f1099...

https://github.com/tvondra/jwt_context/blob/10be23c0651f1099...

https://github.com/tvondra/jwt_context/blob/10be23c0651f1099...

Oh look, the typical setup for a classical JWT vulnerability.

Prior art:

https://auth0.com/blog/critical-vulnerabilities-in-json-web-...

https://github.com/firebase/php-jwt/issues/351

You should really consider not using JWT for new designs that don't a priori need to interop with JWT.

PASETO is less likely to create sadness: https://paseto.io


Replies

qudatyesterday at 11:18 PM

Aside: this was very informational for me, thanks!

twosdaiyesterday at 11:13 PM

> You should really consider not using JWT for new designs that don't a priori need to interop with JWT.

If you're trying to make the argument that because they can be insecure, we should not use JWTs. Thats not really a great argument for most people. JWTs provide a lot of value, and the idea of having some secure, validatable, and no network required check for authentication, or transporting information. Is too valuable for businesses. So we all use JWTs, they are a decent standard.

At the very least you should propose an alternative that people use besides JWTs if you're going to vaugly hand wave about the scary security issues of 2021 firebase, and 2020 Npm packages reported by Auth0.

show 2 replies