Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add function to sign responses #112

Open
adamlwgriffiths opened this issue Jun 21, 2016 · 3 comments
Open

Add function to sign responses #112

adamlwgriffiths opened this issue Jun 21, 2016 · 3 comments

Comments

@adamlwgriffiths
Copy link

Responses should also be signed in a similar way to the requests so that client's can verify they are talking to the correct server.

Compromise of a server itself would mean the secret is compromised and therefore all communication is compromised.
But it is possible that a domain is hijacked instead.

In this case, the server can simply accept all messages it receives, then send malicious messages back which a client will blindly accept and act upon.

@kjg
Copy link
Collaborator

kjg commented Jun 30, 2016

This would be a great addition to api-auth. Unfortunately I don't have the time to tackle this feature right now, but I totally encourage someone to pick this up and I'd happily work with that person to get a PR for this merged.

@fwininger
Copy link
Collaborator

Interesting feature !

However I think that the purpose of ApiAuth is more to authenticate a Client with HMAC, like User/Password, or Security Token. If you need advance feature to block MITM attack (like domain hijacking), I think a better way is to use HTTPS over ApiAuth.

HTTPS is a common technique to secure an HTTP stream. The only point that is not covered is the authentication of a client. What is done with ApiAuth.

@fwininger
Copy link
Collaborator

Finally, I need this feature too for one project. So I try to do a PR for July.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants