HTTP & AUTH Flashcards

1
Q

What is multipart upload and how do you use it?

A

Multipart upload chunks files to the server and is great for sending media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is JWT PoP, why do you use and how does it work?

A
  • PoP stands for Proof of Possession. Regular JWTs (Bearer Tokens) are prone to theft, meaning anyone who steals the token can use it. PoP helps prevent bots, replay attacks, and unauthorized API usage.
  • PoP proves that the client possesses the private key by signing each API request.
  • The server verifies the signature using the corresponding public key stored in the JWT’s cnf.jwk claim.
  • Private keys are stored on backend and oauth2 is used to authenticate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a nonce?

A

A number used once. This can prevent replay attacks by aadding a nonce for each call.

these are typically signed by the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do we ensure zero trust & high security auth

A

Use Oauth2 + pop with a client-stored private key.

Use short lived oauth2 tokens and rotate pop private keys often.

If an attacker steals private key and oauth2 token they will have until one of the above changes to impersonate the user.

Can also use device fingerprinting to identify devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discuss Attack and Mitigation Flow

A

.

📌 Breakdown of the Attack & Mitigation Flow
1️⃣ User logs into an OAuth2 provider (Google, Facebook, etc.)
2️⃣ OAuth2 provider issues an OAuth2 access token to the client
3️⃣ Client uses its private PoP key to sign API requests
4️⃣ API server verifies both the OAuth2 token and PoP signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly