SlideShare a Scribd company logo
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Deconstructing REST
Security
David Blevins
Tomitribe
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“The nice thing about standards is
you have so many to choose from.”
- Andrew S. Tanenbaum
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Focus Areas
• Beyond Basic Auth
• Theory of OAuth 2.0
• Introduction of JWT
• Google/Facebook style API security
• Stateless vs Stateful Architecture
• HTTP Signatures
• Amazon EC2 style API security
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Baseline
1000 users
x 3 TPS
4 hops
3000 TPS
frontend
12000 TPS
backend
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Basic Auth
(and its problems)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Basic Auth Message
POST /painter/color/object HTTP/1.1
Host: localhost:8443
Authorization: Basic c25vb3B5OnBhc3M=
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"b":255,"g":0,"name":"blue","r":0}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
(no auth)
3000 TPS
(LDAP)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
username+password
Base64
15000 TPS
(LDAP)
Password Sent
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
IP
whitelisting
3000 TPS
(LDAP)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“Hey, give me all
of Joe’s salary
information.”
“I don’t know
who you are,
…
but sure!”
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Latveria Attacks
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Basic Auth - Attacks
Valid
Password Sent
3000 TPS
(HTTP+SSL) IP
whitelisting
9000 TPS
(LDAP)
12000 TPS
(HTTP)
Invalid
Password Sent
6000 TPS
(HTTP+SSL)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
OAuth 2.0
(and its problems)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 - Password Grant
(LDAP)
(Token Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"2YotnFZFEjr1zCsicMWpAA",
"expires_in":3600,
"refresh_token":"tGzv3JOkF0XG5Qx2TlKWIA",
}
Verify
Password
Generate
Token
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/object HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"r":0,"g":0,"b":255,"name":"blue"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/palette HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"r":0,"g":255,"b":0,"name":"green"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/select HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 44
{"color":{"r":255,"g":0,"b":0,"name":"red"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/fill HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":0,"g":255,"b":255,"name":"yellow"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/stroke HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":255,"g":200,"b":255,"name":"orange"}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
401
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 - Refresh Grant
(LDAP)
(Token Store)
Verify
Password
Generate
Token
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=refresh_token&refresh_token=tGzv3JOkF0XG5Qx2TlKWIA
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"6Fe4jd7TmdE5yW2q0y6W2w",
"expires_in":3600,
"refresh_token":"hyT5rw1QNh5Ttg2hdtR54e",
}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Old pair
• Access Token 2YotnFZFEjr1zCsicMWpAA
• Refresh Token tGzv3JOkF0XG5Qx2TlKWIA
New pair
• Access Token 6Fe4jd7TmdE5yW2q0y6W2w
• Refresh Token hyT5rw1QNh5Ttg2hdtR54e
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/palette HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 46
{"color":{"r":0,"g":255,"b":0,"name":"green"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/select HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 44
{"color":{"r":255,"g":0,"b":0,"name":"red"}}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message
POST /painter/color/fill HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":0,"g":255,"b":255,"name":"yellow"}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
What have we achieved?
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
You have more passwords
(at least your devices do)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Term Alert
• Password Grant???
• Logging in
• Token?
• Slightly less crappy password
• Equally crappy HTTP Session ID
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelisting
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“Who the heck
is
6Fe4jd7TmdE5y
W2q0y6W2w
???????”
“No idea, dude.
Ask the token
server.”
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelisting
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
12000 TPS
(token checks)
8 hops
24000 TPS
backend
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelisting
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
12000 TPS
(token checks)
8 hops
24000 TPS
backend
55% of all traffic
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelisting
0 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
0 TPS
(token checks)
0 hops
0 TPS
backend
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2
Pointer Pointer
State
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Access Token
Access Pointer?
Access Primary Key?
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
OAuth 2.0
High Frequency Password
Exchange Algorithm?
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Problem: how to detect if a file's
contents have changed?
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Hashing and Signing
Symmetric and Asymmetric
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Hashing Data
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
01010000010001000011011011101000110101001001100001010011110000
00111010101111111111111111000101111101001110111000100010000000000
111111101011100001001100100000101011111001101111111100111011000011
111011001101100100000101011110011001100001011011110101110110001
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
01010000010001000011011011101000110101001001100001010011110000
00111010101111111111111111000101111101001110111000100010000000000
111111101011100001001100100000101011111001101111111100111011000011
111011001101100100000101011110011001100001011011110101110110001
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf More Bits the Better
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Hashing Data
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Hashing Data
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Hashing Data
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Hashing Data
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Bears beat Vikings 33 to 10
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Bears beat Vikings 33 to 10
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Bears beat Vikings 33 to 30
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Protecting the Hash
HMAC (Symmetric)
RSA (Asymmetric)
abc123 abc123
private
public
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf HMAC (Symmetric)
Read &
Write
Read 

& Write
Shared and equal relationship
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf RSA (Asymmetric)
Write
Read
Read
Read
One side has more authority
* the reverse is possible
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Distributed Read-Only Data
Can Write
Read
Read
Read
Data
Encrypted
Hash of Data
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
How many RSA keys does
Susan need to sign
1,000,000
documents?
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
one
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
OAuth 2.0
+
JSon Web Tokens (JWT)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf JSon Web Token
• Pronounced “JOT”
• Fancy JSON map
• Base64 URL Encoded
• Digitally Signed (RSA-SHA256, HMAC-SHA512, etc)
• Built-in expiration
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf • { "alg": “RS256", "typ": “JWT" }
• {
"token-type": "access-token",
"username": "snoopy",
"animal": "beagle",
"iss": "https://demo.superbiz.com/oauth2/token",
"scopes": [
“twitter”, "mans-best-friend"
],
"exp": 1474280963,
"iat": 1474279163,
"jti": "66881b068b249ad9"
}
• DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv
0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzl
LJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Access Token Now
• header (JSON > Base64 URL Encoded)
• describes how the token signature can be checked
• payload (JSON > Base64 URL Encoded)
• Basically a map of whatever you want to put in it
• Some standard entries such as expiration
• signature (Binary > Base64 URL Encoded
• The actual digital signature
• made exclusively by the /oauth2/token endpoint
• If RSA, can be checked by anyone
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Access Token Previously
• 6Fe4jd7TmdE5yW2q0y6W2w
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Access Token Now
• eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi
10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hbWUiOiJzb
m9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRw
czovL2RlbW8uc3VwZXJiaXouY29tL29hdXRoMi90b2tlbiI
sInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaW
VuZCJdLCJleHAiOjE0NzQyODA5NjMsImlhdCI6MTQ3NDI3O
TE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMz
IIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8
DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1Ta
Elxc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadhVDaiqmhct0
98ocefuv08TdzRxqYoEqYNo
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Subtle But High Impact
Architectural Change
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
What we had
(quick recap)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Pull User Info
From IDP
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Generate an
Access Token
(pointer)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Insert both
into DB
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Send Access Token (pointer)
to client
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Results
Client Holds Pointer Server Holds State
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
What we can do now
(Hello JWT!)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Pull User Info
From IDP
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Format the data
as JSON
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
RSA-SHA 256
sign JSON private
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Insert only
pointer
into DB
(for revocation)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
(LDAP)
Send Access Token (state)
to client
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Client Holds State Server Holds Pointer
Desired
Results
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 - Password Grant
(LDAP)
(Token ID Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
Verify
Password
Generate
Signed
Token
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.
eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hb
WUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3M
iOiJodHRwczovL2RlbW8uc3VwZXJiaXouY29tL29hdXRoM
i90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0
LWZyaWVuZCJdLCJleHAiOjE0NzQyODA5NjMsImlhdCI6M
TQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ
9.DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8
OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaO
EUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadh
VDaiqmhct098ocefuv08TdzRxqYoEqYNo",
"expires_in":3600,
"refresh_token":"eyJhbGctGzv3JOkF0XG5Qx2TlKWIAkF0X.
eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hb
WUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3M
iOiJodHRwczovL",
}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2.0 Message with JWT
POST /painter/color/palette HTTP/1.1

Host: api.superbiz.io

Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXR
va2VuIiwidXNlcm5hbWUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRwczovL2RlbW8uc3VwZXJ
iaXouY29tL29hdXRoMi90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaWVuZCJdLCJleHAiOjE0NzQy
ODA5NjMsImlhdCI6MTQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMzIIsC0j8z3icRdYO1GaMGl
6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZ
vzlLJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
User-Agent: curl/7.43.0

Accept: */*

Content-Type: application/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 + JWT
Tokens Sent
3000 TPS
(HTTP+SSL)
0.55 TPS
(refresh token checks)
(30 minute expiration)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
3000 TPS
(signature verification)
12000 TPS
(signature verification)(private key)
(public key)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
"We need to check every
request"
(having *that* conversation)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Revocation Cost
Having the conversation
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Impact on the Backend
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“Hey, give me all
of Joe’s salary
information.”
“Not a chance!”
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“Hey, give me all
of Joe’s salary
information.”
“Sure thing!”
Every Microservice Has the Gateway's Public Key
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Latveria Attacks
(again)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 + JWT
Valid
Tokens Sent
3000 TPS
(HTTP+SSL)
0.55 TPS
(refresh token checks)
Password Sent
1000/daily
(HTTP+SSL)
(LDAP)
4 hops
12000 TPS
backend
9000 TPS
(signature verification)
12000 TPS
(signature verification)
Invalid
Tokens Sent
6000 TPS
(HTTP+SSL)
(private key)
(public key)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
HTTP Signatures
(Amazon EC2 style API Security)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf HTTP Signatures
• No “secret” ever hits the wire
• Signs the message itself
• Proves identity
• Prevents message tampering
• Symmetric or Asymmetric signatures
• IETF Draft
• https://tools.ietf.org/html/draft-cavage-http-signatures
• Extremely simple
• Does NOT eliminate benefits of JWT
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
POST /painter/color/palette HTTP/1.1

Host: api.superbiz.io

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: application/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
Take the full http
message
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
POST /painter/color/palette HTTP/1.1

Host: api.superbiz.io

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: application/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
Select the parts

you want to protect
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
(request-target): POST /painter/color/palette

host: api.superbiz.io

date: Mon, 19 Sep 2016 16:51:35 PDT
content-length: 46
Create a 

Signing String
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
(request-target): POST /painter/color/palette

host: api.superbiz.io

date: Mon, 19 Sep 2016 16:51:35 PDT
content-length: 46
Aj2FGgCdGhIp6LFXjxSxBsSwTp9i
C7t7nmRZs-hrYcQ
Hash the string

(sha256 shown)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
Aj2FGgCdGhIp6LFXjxSxBsSwTp9i
C7t7nmRZs-hrYcQ
Encrypt the hash

(hmac shown)
j050ZC4iWDW40nVx2oVwBEymX
zwvsgm+hKBkuw04b+w=
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signing a Message
Signature
keyId=“orange-1234",
algorithm="hmac-sha256",
headers="(request-target) host date content-length”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="

Put it all together
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signed Message
POST /painter/color/palette HTTP/1.1

Host: api.superbiz.io

Authorization: Signature keyId=“orange-1234",
algorithm="hmac-sha256",
headers="(request-target) host date content-length”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: application/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signature Auth
Password Sent
0 TPS
(HTTP)
Signature (no auth)
3000 TPS
(LDAP or Keystore)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signature Auth
Password Sent
0 TPS
(HTTP)
Signature Signature
3000 TPS
(LDAP or Keystore)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
“Hey, give me all
of Joe’s salary
information.”
“Hey, Larry!
Sure!”
Issue Returns
(bad)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
OAuth 2.0 Proof-of-Possession
(JWT + HTTP Signatures)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
Key Value
Identity Information
(JWT)
Key ID
Proof Of Identity
(HTTP Signature)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
{ "alg": “RS256", "typ": “JWT" }
{ "token-type": "access-token",
"username": "snoopy",
"iss": "https://demo.superbiz.com/oauth2/token",
"scopes": ["twitter”, "mans-best-friend"],
"exp": 1474280963,
"iat": 1474279163,
"jti": "66881b068b249ad9"
}
DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc
0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksF
XGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
Access Token
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
{ "alg": “RS256", "typ": “JWT" }
{ "token-type": "pop",
"cnf":{ "kid": "green-1234" }
"username": "snoopy",
"iss": "https://demo.superbiz.com/oauth2/token",
"scopes": ["twitter”, "mans-best-friend"],
"exp": 1474280963,
"iat": 1474279163,
"jti": "66881b068b249ad9"
}
DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc
0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksF
XGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
Access Token
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 - Password Grant
(LDAP)
(Token ID Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
Verify
Password
Generate
Signed
Token
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc
3MiOiJodHRwczovL3NlcnZlci5leGFtcGxlLmNvbSIsImV4cCI6M
TMxMTI4MTk3MCwiaWF0IjoxMzExMjgwOTcwLCJjbmYiOnsia2",
"token_type":"pop",
"expires_in":3600,
"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc
3MiOiJodHRwczovL2FzZGZhc2RzZGZzZXJ2ZXIuZXhhbXBsZS5
jb20iLCJleHAiOjEzMTEyODE5NzAsImlhdCI6MTMxMTI4MDk3M",
"key":"eyJrdHkiOiJvY3QiLCJ1c2UiOiJzaWciLCJraWQiOiJvcmFuZ
2UteXlqOUQwZWgiLCJrIjoiVlotMFFHTFoyUF9SUFVTVzEwQ0l1
MFdNeVhxLU5EMnBtRFl6QTBPVEtXVEhscDVpYWM1SzRWZWlS
ci1fQk9vWEo0WDJmU1R0NG5Id29fcXV0YTdqSkpLVDRQRVd5W
WFuQlNGc2kwRFc3b3dULUhFeEFHRHlKdEhVdE53NXhzczhOajZ
PeE5QdjZyUk9FLWtldmhMMndCOWNxZ2RJc2NidkRocmFzMzljd
2ZzIiwiYWxnIjoiSFMyNTYifQ"
}
Generate
HMAC
Key
(Key Store)
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf JSON Web Key (encoded)
eyJrdHkiOiJvY3QiLCJ1c2UiOiJzaWciLCJraWQiOiJvcmFuZ2Ut
eXlqOUQwZWgiLCJrIjoiVlotMFFHTFoyUF9SUFVTVzEwQ0l1M
FdNeVhxLU5EMnBtRFl6QTBPVEtXVEhscDVpYWM1SzRWZ
WlSci1fQk9vWEo0WDJmU1R0NG5Id29fcXV0YTdqSkpLVDRQ
RVd5WWFuQlNGc2kwRFc3b3dULUhFeEFHRHlKdEhVdE53N
XhzczhOajZPeE5QdjZyUk9FLWtldmhMMndCOWNxZ2RJc2Nid
kRocmFzMzljd2ZzIiwiYWxnIjoiSFMyNTYifQ
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf JSON Web Key (decoded)
{ "kty": "oct",
"use": "sig",
"kid": "orange-1234",
"k": "VZ-0QGLZ2P_RPUSW10CIu0WMyXq-ND2pmDYzA0OTKW
THlp5iac5K4VeiRr-_BOoXJ4X2fSTt4nHwo_quta7j
JJKT4PEWyYanBSFsi0DW7owT-HExAGDyJtHUtNw5xs
s8Nj6OxNPv6rROE-kevhL2wB9cqgdIscbvDhras39c
wfs",
"alg": "HS256"
}
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Signed OAuth 2.0 Message
POST /painter/color/palette HTTP/1.1

Host: api.superbiz.io

Authorization: Signature keyId=“orange-1234", algorithm="hmac-sha256",
headers="content-length host date (request-target)”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="
Bearer:
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5h
bWUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRwczovL2RlbW8uc3VwZXJiaXouY29t
L2
9hdXRoMi90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaWVuZCJdLCJleHAiOjE0NzQyO
DA5NjMsImlhdCI6MTQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMzIIsC0j8z3icRdY
O1GMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaEl
xc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: application/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf OAuth 2 + JWT + Signatures
Tokens+Signatures Sent
3000 TPS
(HTTP safe)
0.55 TPS
(refresh token checks)
Password Sent
1000/daily
(HTTP+TLS)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
3000 TPS
(signature verification)
12000 TPS
(signature verification)
#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf
https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution
Specification Reference
@dblevins @tomitribe#RESTSecurity @dblevins @tomitribetribestream.io/jprime2018
jPrimeConf Observations
• HTTP Signatures the only HTTP friendly approach
• Signatures does not solve the “Identity Load” problem
• OAuth 2 with JWT significantly improves IDP load
• Plain OAuth 2
• HTTP Session-like implications
• OAuth 2 with JWT
• Signed cookie
• Signing key to the future
Thank You
Slides and Resources
https://tribestream.io/jprime2018
#RESTSecurity
jPrime

More Related Content

PDF
2018 Denver JUG Deconstructing and Evolving REST Security
PDF
2018 Boulder JUG Deconstructing and Evolving REST Security
PDF
2018 JavaLand Deconstructing and Evolving REST Security
PDF
2017 dev nexus_deconstructing_rest_security
PDF
2016 JavaOne Deconstructing REST Security
PDF
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
PDF
2017 Devoxx MA Deconstructing and Evolving REST Security
PDF
Deconstructing and Evolving REST security
2018 Denver JUG Deconstructing and Evolving REST Security
2018 Boulder JUG Deconstructing and Evolving REST Security
2018 JavaLand Deconstructing and Evolving REST Security
2017 dev nexus_deconstructing_rest_security
2016 JavaOne Deconstructing REST Security
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2017 Devoxx MA Deconstructing and Evolving REST Security
Deconstructing and Evolving REST security

What's hot (11)

PDF
2018 SDJUG Deconstructing and Evolving REST Security
PDF
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
PPTX
Understanding gRPC Authentication Methods
PPTX
Build your own Blockchain with the right tool for your application
PDF
Deconstructing and Evolving REST Security
PDF
Side-Channels on the Web: Attacks and Defenses
PDF
JWT: jku x5u
PDF
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
PDF
[OPD 2019] Attacking JWT tokens
PPTX
F5 SIRT - F5 ASM WAF - DDoS protection
PPS
Hacking Client Side Insecurities
2018 SDJUG Deconstructing and Evolving REST Security
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
Understanding gRPC Authentication Methods
Build your own Blockchain with the right tool for your application
Deconstructing and Evolving REST Security
Side-Channels on the Web: Attacks and Defenses
JWT: jku x5u
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
[OPD 2019] Attacking JWT tokens
F5 SIRT - F5 ASM WAF - DDoS protection
Hacking Client Side Insecurities
Ad

Similar to 2018 jPrime Deconstructing and Evolving REST Security (20)

PDF
2017 JavaOne Deconstructing and Evolving REST Security
PDF
2018 IterateConf Deconstructing and Evolving REST Security
PDF
Stateless Microservice Security via JWT and MicroProfile - Mexico
PDF
Stateless Microservice Security via JWT and MicroProfile - ES
PDF
Stateless Microservice Security via JWT and MicroProfile - Guatemala
PDF
2019 ITkonekt Stateless REST Security with MicroProfile JWT
PDF
2018 Madrid JUG Deconstructing REST Security
PDF
Seguridad en microservicios via micro profile jwt
PDF
Dublin JUG Stateless Microservice Security via JWT, TomEE and MicroProfile
PDF
Cilium:: Application-Aware Microservices via BPF
PDF
HITCON Defense Summit 2019 - 從 SAST 談持續式資安測試
PDF
MeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
PDF
HowYourAPIBeMyAPI
PDF
Learning the basics of Apache NiFi for iot OSS Europe 2020
PDF
Intrigue Core: Scaling Assessment Automation
PPT
Rapid java backend and api development for mobile devices
PPTX
RESTful web services with Groovy on Grails by Vugar Suleymanov
PDF
Protecting Your APIs Against Attack & Hijack
PDF
OpenStack Architecture
PDF
OpenStack Architecture
2017 JavaOne Deconstructing and Evolving REST Security
2018 IterateConf Deconstructing and Evolving REST Security
Stateless Microservice Security via JWT and MicroProfile - Mexico
Stateless Microservice Security via JWT and MicroProfile - ES
Stateless Microservice Security via JWT and MicroProfile - Guatemala
2019 ITkonekt Stateless REST Security with MicroProfile JWT
2018 Madrid JUG Deconstructing REST Security
Seguridad en microservicios via micro profile jwt
Dublin JUG Stateless Microservice Security via JWT, TomEE and MicroProfile
Cilium:: Application-Aware Microservices via BPF
HITCON Defense Summit 2019 - 從 SAST 談持續式資安測試
MeetUp: Kerberos - Protocol for Authentication & Authorization @Criteo
HowYourAPIBeMyAPI
Learning the basics of Apache NiFi for iot OSS Europe 2020
Intrigue Core: Scaling Assessment Automation
Rapid java backend and api development for mobile devices
RESTful web services with Groovy on Grails by Vugar Suleymanov
Protecting Your APIs Against Attack & Hijack
OpenStack Architecture
OpenStack Architecture
Ad

More from David Blevins (8)

PDF
DevNexus 2020 - Jakarta Messaging 3.x, Redefining JMS
PDF
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
PDF
2017 JCP EC: Configuration JSR
PDF
2015 JavaOne EJB/CDI Alignment
PDF
JavaOne 2013 - Apache TomEE, Java EE Web Profile {and more} on Tomcat
PDF
2011 JavaOne EJB with Meta Annotations
PDF
2011 JavaOne Apache TomEE Java EE 6 Web Profile
PDF
2011 JavaOne Fun with EJB 3.1 and OpenEJB
DevNexus 2020 - Jakarta Messaging 3.x, Redefining JMS
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
2017 JCP EC: Configuration JSR
2015 JavaOne EJB/CDI Alignment
JavaOne 2013 - Apache TomEE, Java EE Web Profile {and more} on Tomcat
2011 JavaOne EJB with Meta Annotations
2011 JavaOne Apache TomEE Java EE 6 Web Profile
2011 JavaOne Fun with EJB 3.1 and OpenEJB

Recently uploaded (20)

PPTX
presentation_pfe-universite-molay-seltan.pptx
DOCX
Unit-3 cyber security network security of internet system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Internet___Basics___Styled_ presentation
PDF
Testing WebRTC applications at scale.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
innovation process that make everything different.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
presentation_pfe-universite-molay-seltan.pptx
Unit-3 cyber security network security of internet system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
SAP Ariba Sourcing PPT for learning material
Internet___Basics___Styled_ presentation
Testing WebRTC applications at scale.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introuction about WHO-FIC in ICD-10.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
Paper PDF World Game (s) Great Redesign.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
innovation process that make everything different.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
QR Codes Qr codecodecodecodecocodedecodecode
Job_Card_System_Styled_lorem_ipsum_.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Tenda Login Guide: Access Your Router in 5 Easy Steps

2018 jPrime Deconstructing and Evolving REST Security