-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace insecure and unmaintained indirect dependencies of oic
(pyjwkest
)
#136
Comments
oic
(pyoidc
) and pyjwkest
oic
(pyjwkest
)
Hello @glarrain-cdd, Thanks a lot for reporting this issue 😄. |
Hello and thanks for your quick response.
I didn't know any of that. I might have missed it in the docs but I think there was no mention of that. There was an option to select Flask in the initial project setup (noting it was beta support) though, but that's it. If I understand you correctly, the new agent is not only for Flask but also for Django and other frameworks? Also, what do you mean by "v2 style" and what are the implications of that? Does it mean, for example, that the HTTP API that Forest Admin expect from the Admin Backend is different? Thanks |
Hello, Best regards. |
Expected behavior
All the code used for cryptography, authentication or authorization related operations must be top notch, from popular, maintained and robust libraries.
A popular saying applies: "Good friends don't let friends program cryptography"
Actual behavior
Library
oic
(OIC = OpenID Connect) uses a crypto-related library that is unmaintained, and has been unable to replace it for over 4 years.The ideas of switching to any of these libraries have utterly failed
pyca/cryptography
(the golden standard) has been discussed for over 4 years, without results (GH issue)Not crypto-related but with cybersecurity relevance:
Failure Logs
Check out these alternatives:
Failure Logs
N/A
Context
N/A
The text was updated successfully, but these errors were encountered: