-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
auth_jwt_require_claim
vs auth_jwt_validate_exp
#18
Comments
auth_jwt_require_claim validation is performed before auth_jwt_validate_exp validation of exp claim. If auth_jwt_require_claim validates the exp claim, auth_jwt_validate_exp does not validate it. |
In my opinion this is a high severity security flaw. Both
|
Same accounts for In addition, a JWT without a signature should not be accepted at all! See e.g. https://blog.pentesteracademy.com/hacking-jwt-tokens-the-none-algorithm-67c14bb15771 the alg none attack! |
I understand the JWT specification. However, it is up to the user how to use them, so they can be toggled (e.g. auth_jwt_leeway). |
For the same reason, I used to incorporate iss, sub, iat claim checks, but I have removed them now. |
sorry, but I'm confused - we deviated from the original question?! Maybe I need to change it: How does |
Could it be, that if I configure the location like this
it is not verified if the token is expired? I don't entirely understand the documentation
Do not process if verified by auth_jwt_require_claim directive
but in practice this seems to be the case?!
If yes, why? Could we better document this? Can I stil validate if the token is expired despite testing
for the claim?
The text was updated successfully, but these errors were encountered: