Skip to content

Conversation

blacktemplar
Copy link
Contributor

@blacktemplar blacktemplar commented Apr 3, 2020

Resolves #106.

This allows the recommended use of "hs2019" as algorithm, that effectively hides the used algorithm from the signature to avoid attacks, see Appendix E.2 in https://tools.ietf.org/html/draft-cavage-http-signatures-12.

For signing there is an option hideAlgorithm that defaults to false and if true writes "hs2019" into the authentication header.

For verifying one has to pass an overriddenAlgorithm to verify that basically overrides the algorithm "hs2019" for verification. The overriddenAlgorithm has to be determined by metadata of the clientId (after parsing the signature the clientId is known).

@gabek
Copy link

gabek commented Sep 24, 2021

Hi there. Is there going to be any progress made on this front?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support hs2019 algorithm
2 participants