-
-
Notifications
You must be signed in to change notification settings - Fork 222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecation proposal #54
Comments
I find JWT tricky to use securely which is why I avoid it like the plague whenever I can for my own stuff. You cannot avoid JWT much for external interoperability obviously but I will not deprecate itsdangerous as a result :) |
Thanks for the quick reply. Just out of curiosity, which aspect of JWT security do you find tricky to use? There were several implementation bugs a while back, e.g. |
For instance the server thinks it will get an RSA token but you actually send an HMAC token then the public part of the RSA key will be used for the secret of the HMAC token. But this is just an example, there are many more cases where libraries completely fail currently. JWT is just too complex of a system that people would write good implementations for. |
Interesting insights, thank you for sharing! |
Having read through the docs, it would seem that JWT is now a better solution. It covers more use cases, has more language implementations and is also an RFC standard. Many of the languages, in particular Python, have much more active repos and commit history.
Is there anything in particular that
itsdangerous
does, which JWT does not cover? If not, I would like to propose deprecating this library in favour of JWT.The text was updated successfully, but these errors were encountered: