tomitribe / http-signatures-java

Java Client Library for HTTP Signatures
Apache License 2.0
86 stars 39 forks source link

= HTTP Signatures Java Client :showtitle:

HTTP signatures provide a mechanism by which a shared secret key can be used to digitally "sign" a HTTP message to both verify the identity of the sender and verify that the message has not been tampered with in-transit.

This is done by concatenating the desired HTTP Headers together to form a string called a "Signing String". An encrypted hash (digitial signature) is made of the Signing String using either an asymmetric algorithm (rsa-sha256) with a public/private key pair or a symmetric algorithm (hmac-sha256) with a shared secret key.

Finally, the encrypted bytes are Base64 encoded and added to the Authorization header, along with the keyId, signing algorithm, header names, and the signature itself.

For example, the following Signing String:

[source]

digest: SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE= date: Tue, 07 Jun 2014 20:51:35 GMT (request-target): get /foo/Bar

if encrypted using the hmac-sha256 algorithm with the secret +don't tell+, and then encoded with Base64 would yield the result:

[source]

6aq7lLvqJlYRhEBkvl0+qMuSbMyxalPICsBh1qV6V/s=

This would then be applied to the Authorization header as below:

[source]

Authorization: Signature keyId="myusername:mykey",algorithm="hmac-sha256",headers="digest date (request-target)",signature="6aq7lLvqJlYRhEBkvl0+qMuSbMyxalPICsBh1qV6V/s="

== Maven Dependency

Add the following dependency to your Maven pom file.

[source,xml]

org.tomitribe tomitribe-http-signatures 1.5

== Library Overview

There are 2 key classes in this library:

=== Creating a Signer

The Signer instance is intended to be created once and reused to sign all the HTTP messages that require HTTP Signature Authentication.

It is immutable, fully thread-safe and optimized to check and verify the supplied Key on construction.

The first steps to creating a Signer instance are as follows:

[source,java]

final Signature signature = new Signature("key-alias", "hmac-sha256", null, "(request-target)"); // <1> final Key key = new SecretKeySpec(passphrase.getBytes(), "HmacSHA256"); // <2> final Signer signer = new Signer(key, signature); // <3>

<1> Define a new `Signature` object. This `Signature` object isn't fully computed signature, but rather a template for the Signatures that will be created by the `Signer` for specific HTTP messages. It requires a key alias (1st parameter), the signature algorithm (2nd parameter - usually "hmac-sha256") and a var-arg list of header names indicating which headers will require signing (4th - nth parameters). <2> Define a SecretKeySpec instance, this needs the shared secret passphrase, and the algorithm used to store it in the keystore (usually "HmacSHA256"). <3> Initialize a new Signer object with the key and signature from <1> and <2> above === Signing an HTTP Message Once you have a `Signer`, signing an HTTP Message is as simple as passing in the respective parts and letting the signer do the magic. The library is not specific to any HTTP Client Java library such as Apache HttpClient, therefore data must be copied from the request object of your specifc HTTP Client library and passed to the `Signer` in simple `String` and `Map` form. [source,java] ---- final String method = "GET"; final String uri = "/foo/Bar"; final Map headers = new HashMap(); headers.put("Host", "example.org"); headers.put("Date", "Tue, 07 Jun 2014 20:51:35 GMT"); headers.put("Content-Type", "application/json"); headers.put("Digest", "SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE="); headers.put("Accept", "*/*"); headers.put("Content-Length", "18"); // Here it is! final Signature signed = signer.sign(method, uri, headers); ---- The returned `Signature` object represents a full HTTP Signature. Simply call `toString()` on it to get a fully formatted `Authorization` header value. Calling `toString()` on the above `Signature` instance will yeild the following: [source] ---- Signature keyId="my-key-name","algorithm="hmac-sha256",headers="content-length host date (request-target)",signature="yT/NrPI9mKB5R7FTLRyFWvB+QLQOEAvbGmauC0tI+Jg=" ---- The output of +signature.toString()+ should be used as the value the +Authorization+ header for the request. == Scenarios The following sections demonstrate a few common scenarios using http-signatures-java. === Simple (request-target) This is the simplest request. Only the request-target (URI) is used to build the signature. [source,java] ---- final Signature signature = new Signature("key-alias", "hmac-sha256", null, "(request-target)"); // <1> final Key key = new SecretKeySpec(passphrase.getBytes(), "HmacSHA256"); final Signer signer = new Signer(key, signature); final Map headers = new HashMap<>(); return signer.sign(method, uri, headers); // <2> ---- <1> Define the +Signature+ object using just the "(request-target)" (note the use of parenthesis) element. <2> Use the +Signer+ class with the method, URI, and an empty header map to create the signature. === (request-target) date (with date validation) This is similar to the the previous example, but expands on it by adding the date header to the signature. The date should be created in the "EEE, dd MMM yyyy HH:mm:ss zzz" format, and the exact same date should be passed to the +Signer+ as is used on the +Date+ header. [source,java] ---- final Date today = new Date(); // default window is 1 hour final String stringToday = new SimpleDateFormat("EEE, dd MMM yyyy HH:mm:ss zzz", Locale.US).format(today); final Signature signature = new Signature("key-alias", "hmac-sha256", null, "(request-target)", "date"); // <1> final Key key = new SecretKeySpec(passphrase.getBytes(), "HmacSHA256"); final Signer signer = new Signer(key, signature); final Map headers = new HashMap<>(); s.put("Date", stringToday); // <2> return signer.sign(method, uri, headers); ---- <1> Define the +Signature+ object with the "(request-target)" and "date" headers <2> Include the date in the headers map === Message body digest [source,java] ---- final byte[] digest = MessageDigest.getInstance("SHA-256").digest(payload.getBytes()); // <1> final String digestHeader = "SHA-256=" + new String(Base64.encodeBase64(digest)); final Signature signature = new Signature("key-alias", "hmac-sha256", null, "(request-target)", "digest"); // <2> final Key key = new SecretKeySpec(passphrase.getBytes(), "HmacSHA256"); final Signer signer = new Signer(key, signature); final Map headers = new HashMap<>(); headers.put("digest", digestHeader); return signer.sign(method, uri, headers); ---- <1> Define the +Signature+ object with the "(request-target)" and "digest" headers <2> Include the digest in the headers map == References Signing HTTP Messages (Internet Draft) https://tools.ietf.org/html/draft-ietf-httpbis-message-signatures-00 Instance Digests in HTTP http://tools.ietf.org/html/rfc3230 = Signing Examples == Java 8 [source,java] ---- import javax.crypto.Mac; import javax.crypto.spec.SecretKeySpec; import java.util.Base64; public class SigningExample { public static void main(String... s) throws Exception { final String key = "don't tell"; final String signingString = "digest: SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=\n" + "date: Tue, 07 Jun 2014 20:51:35 GMT\n" + "(request-target): get /foo/Bar"; final Mac mac = Mac.getInstance("HmacSHA256"); mac.init(new SecretKeySpec(key.getBytes("UTF-8"), "HmacSHA256")); final byte[] signedBytes = mac.doFinal(signingString.getBytes("UTF-8")); final Base64.Encoder encoder = Base64.getEncoder(); final String result = new String(encoder.encode(signedBytes), "UTF-8"); if (!"6aq7lLvqJlYRhEBkvl0+qMuSbMyxalPICsBh1qV6V/s=".equals(result)) { throw new IllegalStateException("Signing failed"); } System.out.println(result); } } ---- == Bash [source,java] ---- #!/bin/bash # Secret Key KEY="don't tell" # Create the Signing string from the required headers STRING='digest: SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE= date: Tue, 07 Jun 2014 20:51:35 GMT (request-target): get /foo/Bar' # Sign the string, base64 echo -n "$STRING" | openssl dgst -binary -sha256 -hmac "$KEY" | base64 ---- Running this will print: ---- 6aq7lLvqJlYRhEBkvl0+qMuSbMyxalPICsBh1qV6V/s= ----