istio.io/istio@v0.0.0-20240520182934-d79c90f27776/tests/integration/security/fuzz/fuzzers/jwt_tool/jwtconf.ini (about)

     1  [crypto]
     2  # The sample RSA public and private keys are used to generate different tokens for testing. They can be simply generated
     3  # with the command `make -f tools/certs/Makefile.selfsigned.mk sample-RSA`.
     4  pubkey = sample-RSA-public.pem
     5  privkey = sample-RSA-private.pem
     6  jwks =
     7  
     8  [services]
     9  jwt_tool_version = 2.2.3
    10  # To disable the proxy option set this value to: False (no quotes)
    11  proxy = False
    12  # Set this to the URL you are hosting your custom JWKS file - your own server, or maybe use this cheeky reflective URL (https://httpbin.org/base64/{base64-encoded_JWKS_here})
    13  jwksloc =
    14  # Set this to the base URL of a Collaborator server, somewhere you can read live logs, a Request Bin etc.
    15  httplistener =
    16  
    17  [customising]
    18  useragent = Mozilla/5.0 (Windows NT 10.0; Win64; x64) jwt_tool
    19  
    20  [input]
    21  wordlist = jwt-common.txt
    22  commonHeaders = common-headers.txt
    23  commonPayloads = common-payloads.txt
    24  
    25  [argvals]
    26  # Set at runtime - changes here are ignored
    27  sigType =
    28  targetUrl =
    29  cookies =
    30  key =
    31  keyList =
    32  keyFile =
    33  headerLoc =
    34  payloadclaim =
    35  headerclaim =
    36  payloadvalue =
    37  headervalue =
    38  canaryvalue =
    39  header =
    40  exploitType =
    41  scanMode =
    42  reqMode =
    43  postData =
    44  resCode =
    45  resSize =
    46  resContent =