If you’re getting this error message doing nginx -t or otherwise,
for instance if you’re copy/pasting Mattermost’s nginx configuration,
know that the line is
add_header X-Early-Data $ssl_early_data;
add_header X-Early-Data $tls1_3_early_data;
I’m not sure but I’m guessing nginx developers renamed that variable, I’m just not sure when that happened. $tls1_3_early_data must have worked some time ago, but on my nginx version it doesn’t and I have to use the $ssl_early_data variable.
nginx ssl early data
mattermost’s nginx configuration
Crayon Syntax Highlighter compatible with PHP 8, has moved from git.icod.de to code.icod.de .
It can now be found at https://code.icod.de/dalu/crayon-syntax-highlighter
And the maintainers refuse to change that, responding with bureaucratic measures and general ignorance.
When you have an UUID string, example “192c1916-de80-4003-a01b-b2eaf97a1721” first of all those aren’t 128 bits.
You have a representation of those 128 bits and a very limited set of characters 0123456789abcdef, so you represent those 128 bits in only 16 characters of 256 possible, effectively reducing the bit-“strength” to 128/(256/16)=8 bits. And of course you know how many characters 8 bits are, exactly 1.
So now you have 32 characters that can only have the state of [0-9a-f] each. How long does it take to brute force 32 characters with 16 possible values per character?
Keycloak client passwords are insecure by default and that maybe be because of laziness, which I first assumed, stupidity, which is quite common or by design.
Electricity prices are through the roof, we’re being scammed by the EU, Von der Leyen. We’re being robbed by the USA.
We are being abused by our Oligarchs.
Things need to change. It’s either peaceful change or heads will roll and there will be blood.
It’s about our very existence. We need to fight the oppressors, the slave masters.
There are currently 2 packages to integrate keycloak-js with your Vue 3 WEB app.
But each have their quirks and issues.
If you want to use keycloak in a native app, none of these work.
There is keycloak-ionic and someone created a repo https://github.com/marchalb/qkeycloak to showcase a modified version of dsb-norge/vue-keycloak-js and keycloak-ionic, but that also isn’t working.
So the current state for OIDC client apps is: NOT FUNCTIONAL
OIDC fails the K.I.S.S. principle. It is so complicated that no one has managed to write something that works for every scenario.
Mobile and Web are some very common scenarios, why is there nothing that provides this functionality?
I think it’s better to abandon OIDC, since all that’s left are commercial offerings and the open source ones don’t work properly,
and write your own auth package, which may not be as sophisticated but at least it will work for you and your needs and you know what it’s doing.