You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 5, 2024. It is now read-only.
I've been building a larger collection of services using hawk to do authentication, with a single auth-service holding all credentials where other services fetch the credentials from. But I've found that as I want to let other services, less trusted, services use my auth-service (to manage credentials); that I would wish hawk had support for asymmetric algorithms.
So far I've used hawk and been very happy with it, because the key is relatively small 256 bit; which is easy to copy around, insert in environment variables, config files, etc.
But with 256bit ECDSA keys offering decent security, it's tempting to use that.
TL;DR
Would there be any interest in accepting a PR with support for ECDSA as algorithm?
(I fully understand if that is not the case)
I've been building a larger collection of services using hawk to do authentication, with a single auth-service holding all credentials where other services fetch the credentials from. But I've found that as I want to let other services, less trusted, services use my auth-service (to manage credentials); that I would wish hawk had support for asymmetric algorithms.
ECDSA has high security with small 256 bit keys, and seems to be pretty fast; here is a demo I found using javascript:
http://kjur.github.io/jsrsasign/sample-ecdsa.html
So far I've used hawk and been very happy with it, because the key is relatively small 256 bit; which is easy to copy around, insert in environment variables, config files, etc.
But with 256bit ECDSA keys offering decent security, it's tempting to use that.
TL;DR
Would there be any interest in accepting a PR with support for ECDSA as
algorithm?(I fully understand if that is not the case)