Skip to content

Commit 726dfac

Browse files
author
ID Bot
committed
Script updating gh-pages from d3d0e41. [ci skip]
1 parent a09ce08 commit 726dfac

File tree

2 files changed

+10
-19
lines changed

2 files changed

+10
-19
lines changed

mbj-aaron/draft-ietf-oauth-rfc8725bis.html

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1659,12 +1659,7 @@ <h3 id="name-use-appropriate-algorithms">
16591659
This set will vary over time as new algorithms are introduced
16601660
and existing algorithms are deprecated due to discovered cryptographic weaknesses.
16611661
Applications <span class="bcp14">MUST</span> therefore be designed to enable cryptographic agility.<a href="#section-3.2-2" class="pilcrow"></a></p>
1662-
<p id="section-3.2-3">That said, if a JWT is cryptographically protected end-to-end by a
1663-
transport layer, such as TLS
1664-
using cryptographically current algorithms, there may be no need to apply another layer of
1665-
cryptographic protections to the JWT.
1666-
In such cases, the use of the "none" algorithm can be perfectly acceptable.
1667-
The "none" algorithm should only be used when the JWT is cryptographically protected by other means.
1662+
<p id="section-3.2-3">The "none" algorithm should only be used when the JWT is cryptographically protected by other means.
16681663
JWTs using "none" are often used in application contexts in which the content is optionally signed.
16691664
The URL-safe claims representation and processing in this context can be the same in both
16701665
the signed and unsigned cases.

mbj-aaron/draft-ietf-oauth-rfc8725bis.txt

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -406,19 +406,15 @@ Table of Contents
406406
cryptographic weaknesses. Applications MUST therefore be designed to
407407
enable cryptographic agility.
408408

409-
That said, if a JWT is cryptographically protected end-to-end by a
410-
transport layer, such as TLS using cryptographically current
411-
algorithms, there may be no need to apply another layer of
412-
cryptographic protections to the JWT. In such cases, the use of the
413-
"none" algorithm can be perfectly acceptable. The "none" algorithm
414-
should only be used when the JWT is cryptographically protected by
415-
other means. JWTs using "none" are often used in application
416-
contexts in which the content is optionally signed. The URL-safe
417-
claims representation and processing in this context can be the same
418-
in both the signed and unsigned cases. JWT libraries SHOULD NOT
419-
generate JWTs using "none" unless explicitly requested to do so by
420-
the caller. Similarly, JWT libraries SHOULD NOT consume JWTs using
421-
"none" unless explicitly requested by the caller.
409+
The "none" algorithm should only be used when the JWT is
410+
cryptographically protected by other means. JWTs using "none" are
411+
often used in application contexts in which the content is optionally
412+
signed. The URL-safe claims representation and processing in this
413+
context can be the same in both the signed and unsigned cases. JWT
414+
libraries SHOULD NOT generate JWTs using "none" unless explicitly
415+
requested to do so by the caller. Similarly, JWT libraries SHOULD
416+
NOT consume JWTs using "none" unless explicitly requested by the
417+
caller.
422418

423419
Applications SHOULD follow these algorithm-specific recommendations:
424420

0 commit comments

Comments
 (0)