Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EXTJWT signed with HMAC is impractical for use with arbitrary IRC networks #55

Open
vith opened this issue Mar 18, 2019 · 1 comment
Open
Assignees
Labels
enhancement New feature or request

Comments

@vith
Copy link
Contributor

vith commented Mar 18, 2019

Our use of HMAC signatures on JWT makes it impractical to validate tokens that are signed by IRC networks that aren't part of the same operational group as the fileupload server. The secret is used as a symmetric key in HMAC, so anyone who can validate a token can also forge them.

Supporting and using public/private keypair-based signatures for the tokens (RSA or ECDSA, etc.) would make it possible for a fileuploader server to validate tokens without needing to be trusted with the capacity to create them.

@ojamin ojamin added the enhancement New feature or request label Jul 19, 2019
@prawnsalad
Copy link
Member

This would be advantageous. Can we get a working concept for this? Perhaps linking this issue to one on webircgateway that implements EXTJWT.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants