DPoP using Ed25519 keys? #1
Replies: 4 comments 3 replies
-
If it's not part of Web Cryptography API I cannot possibly add it to a Browser-focused implementation where Web Cryptography API is the only available crypto runtime ;) |
Beta Was this translation helpful? Give feedback.
-
@panva K, no prob. I'll figure something out with a polyfill. |
Beta Was this translation helpful? Give feedback.
-
@panva sure, you're right. The reason for the ask is, one, I do want to use dpop for server-to-server (non-browser) use cases. And two, I genuinely don't think that the non-extractable feature of IndexedDB provides sufficient protection (from regular extractable keys). Because if you have a compromised / XSS'd web page, the attacker can use the non-extractable key anyways. So, it's not that much more secure. |
Beta Was this translation helpful? Give feedback.
-
@panva I know, it's a lot less convenient than the built in WebCrypto key types. |
Beta Was this translation helpful? Give feedback.
-
Hi @panva! As always, thank you so much for your excellent libraries.
Would you object to the addition of Ed25519 key types to the allowed DPoP algorithms list for this library (it can be marked unofficial or beta or something)?
I know it's not currently a part of WebCrypto, but from what I understand there are rumours of Ed25519 keys being added to webcrypto soonish, and in any case, I have a use case that needs that key type. So I was wondering if you'd be open to PRs for it.
Beta Was this translation helpful? Give feedback.
All reactions