You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
there is a risk of algorithm substitution
attacks, in which an attacker can use an existing digital signature
value with a different signature algorithm to make it appear that a
signer has signed something that it has not
But no algorithm configuration found. The jsonwebtoken has an example to validate against the algorithm.
// alg mismatchvarcert=fs.readFileSync('public.pem');// get public keyjwt.verify(token,cert,{algorithms: ['RS256']},function(err,payload){// if token alg != RS256, err == invalid signature});
Hope this is supported.
The text was updated successfully, but these errors were encountered:
We use the jsonwebtoken package quite transparently, so yes, this is possible. Just a thought, though... in that if you were to substitute a different signature, wouldn't you still have to know the secret to do so?
Nevertheless, I'll add in the option to specify allowed algorithms in the ACP (defaulting to... either all of them, or HS256)
According to Validating a JWT,
But no algorithm configuration found. The jsonwebtoken has an example to validate against the algorithm.
Hope this is supported.
The text was updated successfully, but these errors were encountered: