Skip to content
Advertisement

Validating Firebase Auth tokens manually

I’m trying to use cloudflare workers to perform authenticated actions.

I’m using firebase for authentication and have access to the Access Tokens coming through but since firebase-admin uses nodejs modules it can’t work on the platform so i’m left manually validating the token.

I’ve been attempting to authenticate with the Crypto API and finally got it to import the public key sign the token to check if its valid but I keep getting FALSE. I’m struggling to figure out why its always returning false for validity.

The crypto key I imported is coming in as type “secret” where I would expect it to be “public”.

Any thoughts or assistance would be huge. Been banging my head against a table for the last couple of days trying to figure this out

This is what I have so far:

JavaScript

Advertisement

Answer

There are a few issues with your code:

  1. The URL you call to obtain public keys returns a list of x509 certificates. These are not public keys used to verify signatures. Are you sure you don’t have access directly to the public keys? It seems like it’s possible to get the public key information from an x509 certificate (as described here: Extract PEM Public Key from X.509 Certificate), though I’m not sure whether that’s possible from a Cloudflare worker.

  2. In importPublicKey you’re telling the import method, that the key is in raw format and that it is an HMAC key. This means that crypto treats your key as a symmetric HMAC key, not as a public key. According to the docs: https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/importKey#subjectpublickeyinfo you should be using spki format as this is the one to import a public key. You would have to know up front whether the JWT access token is signed using RSA or Elliptic Curve algorithm. (e.g. check the alg header claim)

  3. You’re using sign method to verify the signature. That’s not how it works. You should be using the verify method of crypto.subtle and this method will verify the signature for you.

I think you shouldn’t be trying to verify JWTs manually, as you will most probably do it wrong (and create security issues for your app). You should be using libraries that deal with the verification of JWT signatures. It will be much easier for you and more secure for your app. One thing you have to figure out is to where you should take the public key from.

Advertisement