mirror of
https://github.com/pacnpal/thrillwiki_django_no_react.git
synced 2025-12-22 13:11:12 -05:00
okay fine
This commit is contained in:
48
.venv/share/doc/jwcrypto/README.md
Normal file
48
.venv/share/doc/jwcrypto/README.md
Normal file
@@ -0,0 +1,48 @@
|
||||
[](https://pypi.org/project/jwcrypto/)
|
||||
[](https://github.com/latchset/jwcrypto/releases)
|
||||
[](https://github.com/latchset/jwcrypto/actions/workflows/build.yml)
|
||||
[](https://github.com/latchset/jwcrypto/actions/workflows/ppc64le.yml)
|
||||
[](https://github.com/latchset/jwcrypto/actions/workflows/codeql-analysis.yml)
|
||||
[](https://jwcrypto.readthedocs.io/en/latest/?badge=latest)
|
||||
|
||||
JWCrypto
|
||||
========
|
||||
|
||||
An implementation of the JOSE Working Group documents:
|
||||
- RFC 7515 - JSON Web Signature (JWS)
|
||||
- RFC 7516 - JSON Web Encryption (JWE)
|
||||
- RFC 7517 - JSON Web Key (JWK)
|
||||
- RFC 7518 - JSON Web Algorithms (JWA)
|
||||
- RFC 7519 - JSON Web Token (JWT)
|
||||
- RFC 7520 - Examples of Protecting Content Using JSON Object Signing and
|
||||
Encryption (JOSE)
|
||||
|
||||
Installation
|
||||
============
|
||||
|
||||
pip install jwcrypto
|
||||
|
||||
Documentation
|
||||
=============
|
||||
|
||||
http://jwcrypto.readthedocs.org
|
||||
|
||||
Deprecation Notices
|
||||
===================
|
||||
|
||||
2020.12.11: The RSA1_5 algorithm is now considered deprecated due to numerous
|
||||
implementation issues that make it a very problematic tool to use safely.
|
||||
The algorithm can still be used but requires explicitly allowing it on object
|
||||
instantiation. If your application depends on it there are examples of how to
|
||||
re-enable RSA1_5 usage in the tests files.
|
||||
|
||||
Note: if you enable support for `RSA1_5` and the attacker can send you chosen
|
||||
ciphertext and is able to measure the processing times of your application,
|
||||
then your application will be vulnerable to a Bleichenbacher RSA padding
|
||||
oracle, allowing the so-called "Million messages attack". That attack allows
|
||||
to decrypt intercepted messages (even if they were encrypted with RSA-OAEP) or
|
||||
forge signatures (both RSA-PKCS#1 v1.5 and RSASSA-PSS).
|
||||
|
||||
Given JWT is generally used in tokens to sign authorization assertions or to
|
||||
encrypt private key material, this is a particularly severe issue, and must
|
||||
not be underestimated.
|
||||
Reference in New Issue
Block a user