There's also this approach:

https://tools.ietf.org/html/draft-ietf-oauth-signed-http-request-02

It's more limited than a general HTTP signing mechanism, but as a consequence it's more robust for systems that mess with the HTTP message in transit (which we know happens in the real world).

 -- Justin


On 8/2/2016 1:32 AM, Anders Rundgren wrote:
Hi All,

I was recently involved in an inter-bank payment project based on a REST API.

Since my role was "cryptography" I recommended the following approach
http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html since an operation is defined not only by the message payload, but also by the HTTP verb, URI, and header parameters.

The only related standards effort I'm aware of is this:
https://tools.ietf.org/html/draft-cavage-http-signatures-05

Unfortunately the methods above get rather awkward if you have a system where requests are supposed to be embedded in other messages or just proxied to another server.

I would rather have dropped REST in favor of transport-independent schemes using self-contained JSON-encoded signed message objects.

WDYT?

Anders

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to