SlideShare a Scribd company logo
SDJUG
#RESTSecurity @dblevins @tomitribe
Deconstructing REST Security
David Blevins
Tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“The nice thing about standards is
you have so many to choose from.”
- Andrew S. Tanenbaum
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Focus Areas
• Beyond Basic Auth
• Theory of OAuth 2.0
• Introduc?on of JWT
• Google/Facebook style API security
• Stateless vs Stateful Architecture
• HTTP Signatures
• Amazon EC2 style API security
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Baseline Architecture
1000 users
x 3 TPS
4 hops
3000 TPS
frontend
12000 TPS
backend
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth
(and its problems)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth Message
POST /painter/color/object HTTP/1.1
Host: localhost:8443
Authorization: Basic c25vb3B5OnBhc3M=
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"b":255,"g":0,"name":"blue","r":0}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
(no auth)
3000 TPS
(LDAP)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
username+password
Base64
15000 TPS
(LDAP)
Password Sent
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth
Password Sent
3000 TPS
(HTTP+SSL)
username+password
Base64
IP
whitelis?ng
3000 TPS
(LDAP)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“Hey, give me all
of Joe’s salary
information.”
“I don’t know
who you are,
…
but sure!”
SDJUG
#RESTSecurity @dblevins @tomitribe
Latveria Attacks
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Basic Auth - Attacks
Valid
Password Sent
3000 TPS
(HTTP+SSL) IP
whitelis?ng
9000 TPS
(LDAP)
12000 TPS
(HTTP)
Invalid
Password Sent
6000 TPS
(HTTP+SSL)
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0
(and its problems)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 - Password Grant
(LDAP)
(Token Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"2YotnFZFEjr1zCsicMWpAA",
"expires_in":3600,
"refresh_token":"tGzv3JOkF0XG5Qx2TlKWIA",
}
Verify
Password
Generate
Token
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/object HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"r":0,"g":0,"b":255,"name":"blue"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/palette HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 45
{"color":{"r":0,"g":255,"b":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/select HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 44
{"color":{"r":255,"g":0,"b":0,"name":"red"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/fill HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":0,"g":255,"b":255,"name":"yellow"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/stroke HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 2YotnFZFEjr1zCsicMWpAA
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":255,"g":200,"b":255,"name":"orange"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
401
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 - Refresh Grant
(LDAP)
(Token Store)
Verify
Password
Generate
Token
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=refresh_token&refresh_token=tGzv3JOkF0XG5Qx2TlKWIA
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"6Fe4jd7TmdE5yW2q0y6W2w",
"expires_in":3600,
"refresh_token":"hyT5rw1QNh5Ttg2hdtR54e",
}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Old pair
• Access Token 2YotnFZFEjr1zCsicMWpAA
• Refresh Token tGzv3JOkF0XG5Qx2TlKWIA
New pair
• Access Token 6Fe4jd7TmdE5yW2q0y6W2w
• Refresh Token hyT5rw1QNh5Ttg2hdtR54e
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/palette HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 46
{"color":{"r":0,"g":255,"b":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/select HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 44
{"color":{"r":255,"g":0,"b":0,"name":"red"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message
POST /painter/color/fill HTTP/1.1
Host: api.superbiz.io
Authorization: Bearer 6Fe4jd7TmdE5yW2q0y6W2w
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/json
Content-Length: 49
{"color":{"r":0,"g":255,"b":255,"name":"yellow"}}
SDJUG
#RESTSecurity @dblevins @tomitribe
What have we achieved?
SDJUG
#RESTSecurity @dblevins @tomitribe
You have more passwords
(at least your devices do)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Term Alert
• Password Grant???
• Logging in
• Token?
• Slightly less crappy password
• Equally crappy HTTP Session ID
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelis?ng
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“Who the heck
is
6Fe4jd7TmdE5y
W2q0y6W2w
???????”
“No idea, dude.
Ask the token
server.”
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelis?ng
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
12000 TPS
(token checks)
8 hops
24000 TPS
backend
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelis?ng
3000 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
12000 TPS
(token checks)
8 hops
24000 TPS
backend
55% of all traffic
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2
Tokens Sent
3000 TPS
(HTTP+SSL)
IP
whitelis?ng
0 TPS
(token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
0 TPS
(token checks)
0 hops
0 TPS
backend
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2
Pointer Pointer
State
SDJUG
#RESTSecurity @dblevins @tomitribe
Access Token
Access Pointer?
Access Primary Key?
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0
High Frequency Password
Exchange Algorithm?
SDJUG
#RESTSecurity @dblevins @tomitribe
Problem: how to detect if a file's
contents have changed?
SDJUG
#RESTSecurity @dblevins @tomitribe
Hashing and Signing
Symmetric and Asymmetric
SDJUG
#RESTSecurity @dblevins @tomitribe
Hashing Data
SDJUG
#RESTSecurity @dblevins @tomitribe
01010000010001000011011011101000110101001001100001010011110000
00111010101111111111111111000101111101001110111000100010000000000
111111101011100001001100100000101011111001101111111100111011000011
111011001101100100000101011110011001100001011011110101110110001
SDJUG
#RESTSecurity @dblevins @tomitribe
01010000010001000011011011101000110101001001100001010011110000
00111010101111111111111111000101111101001110111000100010000000000
111111101011100001001100100000101011111001101111111100111011000011
111011001101100100000101011110011001100001011011110101110110001
SDJUG
#RESTSecurity @dblevins @tomitribe
More Bits the Better
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Vikings beat Saints 29 to 24
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Vikings beat Saints 29 to 24
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Vikings beat Saints 26 to 24
SDJUG
#RESTSecurity @dblevins @tomitribe
Protecting the Hash
HMAC (Symmetric)
RSA (Asymmetric)
abc123 abc123
private
public
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Encoding a Hash or Signature
Binary 0010100011010111110000011011000100101000110011100111010010001000
0100011011011010000000100011110100111111010100011000100011010001
1101101001010101111100010011111110100000001001100010000000010111
0000000000100101000010110011000100001001011011010111101111101101
Hex 8af5c1468a399708b12d205e7ec588c52dd547fe0232027400526846485bef5b
Base64 ivXBRoo5lwixLSBefsWIxS3VR_4CMgJ0AFJoRkhb71s
Base85 MY4eTME."/Yq7))I`7,^/_*Aj!sh!!)dK"86bOe~
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0
+
JSon Web Tokens (JWT)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
JSon Web Token
• Pronounced “JOT”
• Fancy JSON map
• Base64 URL Encoded
• Digitally Signed (RSA-SHA256, HMAC-SHA512, etc)
• Built-in expira?on
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Access Token Previously
• 6Fe4jd7TmdE5yW2q0y6W2w
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Access Token Now
• eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi
10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hbWUiOiJzb
m9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRw
czovL2RlbW8uc3VwZXJiaXouY29tL29hdXRoMi90b2tlbiI
sInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaW
VuZCJdLCJleHAiOjE0NzQyODA5NjMsImlhdCI6MTQ3NDI3O
TE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMz
IIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8
DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1Ta
Elxc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadhVDaiqmhct0
98ocefuv08TdzRxqYoEqYNo
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Access Token Now
• header (JSON > Base64 URL Encoded)
• describes how the token signature can be checked
• payload (JSON > Base64 URL Encoded)
• Basically a map of whatever you want to put in it
• Some standard entries such as expira?on
• signature (Binary > Base64 URL Encoded
• The actual digital signature
• made exclusively by the /oauth2/token endpoint
• If RSA, can be checked by anyone
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
• { "alg": “RS256", "typ": “JWT" }
• {
"token-type": "access-token",
"username": "snoopy",
"animal": "beagle",
"iss": "https://demo.superbiz.com/oauth2/token",
"scopes": [
“twitter”, "mans-best-friend"
],
"exp": 1474280963,
"iat": 1474279163,
"jti": "66881b068b249ad9"
}
• DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv
0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzl
LJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
SDJUG
#RESTSecurity @dblevins @tomitribe
Subtle But High Impact
Architectural Change
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
What we had
(quick recap)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Pull User Info
From IDP
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Generate an
Access Token
(pointer)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Insert both
into DB
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Send Access Token (pointer)
to client
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Results
Client Holds Pointer Server Holds State
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
What we can do now
(Hello JWT!)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Pull User Info
From IDP
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Format the data
as JSON
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
RSA-SHA 256
sign JSON private
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Insert only
pointer
into DB
(for revocation)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
(LDAP)
Send Access Token (state)
to client
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Client Holds State Server Holds Pointer
Desired
Results
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 - Password Grant
(LDAP)
(Token ID Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
Verify
Password
Generate
Signed
Token
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.
eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hb
WUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3M
iOiJodHRwczovL2RlbW8uc3VwZXJiaXouY29tL29hdXRoM
i90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0
LWZyaWVuZCJdLCJleHAiOjE0NzQyODA5NjMsImlhdCI6M
TQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ
9.DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8
OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaO
EUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadh
VDaiqmhct098ocefuv08TdzRxqYoEqYNo",
"expires_in":3600,
"refresh_token":"eyJhbGctGzv3JOkF0XG5Qx2TlKWIAkF0X.
eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5hb
WUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3M
iOiJodHRwczovL",
}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Message with JWT
POST /painter/color/palele HTTP/1.1

Host: api.superbiz.io

Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXR
va2VuIiwidXNlcm5hbWUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRwczovL2RlbW8uc3VwZXJ
iaXouY29tL29hdXRoMi90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaWVuZCJdLCJleHAiOjE0NzQy
ODA5NjMsImlhdCI6MTQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMzIIsC0j8z3icRdYO1GaMGl
6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZ
vzlLJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
User-Agent: curl/7.43.0

Accept: */*

Content-Type: applica?on/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 + JWT
Tokens Sent
3000 TPS
(HTTP+SSL)
0.55 TPS
(refresh token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
3000 TPS
(signature verifica?on)
12000 TPS
(signature verifica?on)(private key)
(public key)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“Hey, give me all
of Joe’s salary
information.”
“Not a chance!”
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“Hey, give me all
of Joe’s salary
information.”
“Sure thing!”
Every Microservice Has the Gateway's Public Key
SDJUG
#RESTSecurity @dblevins @tomitribe
Latveria Attacks
(again)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 + JWT
Valid
Tokens Sent
3000 TPS
(HTTP+SSL)
0.55 TPS
(refresh token checks)
Password Sent
1000/daily
(HTTP+SSL)
(LDAP)
4 hops
12000 TPS
backend
9000 TPS
(signature verifica?on)
12000 TPS
(signature verifica?on)
Invalid
Tokens Sent
6000 TPS
(HTTP+SSL)
(private key)
(public key)
SDJUG
#RESTSecurity @dblevins @tomitribe
HTTP Signatures
(Amazon EC2 style API Security)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
HTTP Signatures
• No “secret” ever hits the wire
• Signs the message itself
• Proves iden?ty
• Prevents message tampering
• Symmetric or Asymmetric signatures
• IETF Drat
• hlps://tools.ieu.org/html/drat-cavage-hlp-signatures
• Extremely simple
• Does NOT eliminate benefits of JWT
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Signature Message
POST /painter/color/palele HTTP/1.1

Host: api.superbiz.io

Authoriza?on: Signature keyId=“my-key-name",
algorithm="hmac-sha256",
headers="content-length host date (request-target)”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: applica?on/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Signature closeup
Signature
keyId=“my-key-name",
algorithm="hmac-sha256",
headers="content-length host date (request-target)”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="

#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Signature Auth
Password Sent
0 TPS
(HTTP)
Signature (no auth)
3000 TPS
(LDAP or Keystore)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Signature Auth
Password Sent
0 TPS
(HTTP)
Signature Signature
3000 TPS
(LDAP or Keystore)
12000 TPS
(HTTP)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
“Hey, give me all
of Joe’s salary
information.”
“Hey, Larry!
Sure!”
Issue Returns
(bad)
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2.0 Proof-of-Possession
(JWT + HTTP Signatures)
SDJUG
#RESTSecurity @dblevins @tomitribe
Key Value
Iden?ty Informa?on
(JWT)
Key ID
Proof Of Iden?ty
(HTTP Signature)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
{ "alg": “RS256", "typ": “JWT" }
{ "token-type": "access-token",
"username": "snoopy",
"iss": "hlps://demo.superbiz.com/oauth2/token",
"scopes": ["twiler”, "mans-best-friend"],
"exp": 1474280963,
"iat": 1474279163,
"j?": "66881b068b249ad9"
}
DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc
0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksFX
GDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
Access Token
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
{ "alg": “RS256", "typ": “JWT" }
{ "token-type": "pop",
"cnf":{ "kid": "green-1234" }
"username": "snoopy",
"iss": "hlps://demo.superbiz.com/oauth2/token",
"scopes": ["twiler”, "mans-best-friend"],
"exp": 1474280963,
"iat": 1474279163,
"j?": "66881b068b249ad9"
}
DTfSdMzIIsC0j8z3icRdYO1GaMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc
0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaElxc43_Ocxm1F5IUNZvzlLJ_ksFX
GDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo
Access Token
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 - Password Grant
(LDAP)
(Token ID Store)
POST /oauth2/token
Host: api.superbiz.io
User-Agent: curl/7.43.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
Content-Length: 54
grant_type=password&username=snoopy&password=woodstock
Verify
Password
Generate
Signed
Token
HTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc
3MiOiJodHRwczovL3NlcnZlci5leGFtcGxlLmNvbSIsImV4cCI6M
TMxMTI4MTk3MCwiaWF0IjoxMzExMjgwOTcwLCJjbmYiOnsia2",
"token_type":"pop",
"expires_in":3600,
"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc
3MiOiJodHRwczovL2FzZGZhc2RzZGZzZXJ2ZXIuZXhhbXBsZS5
jb20iLCJleHAiOjEzMTEyODE5NzAsImlhdCI6MTMxMTI4MDk3M",
"key":"eyJrdHkiOiJvY3QiLCJ1c2UiOiJzaWciLCJraWQiOiJvcmFuZ
2UteXlqOUQwZWgiLCJrIjoiVlotMFFHTFoyUF9SUFVTVzEwQ0l1
MFdNeVhxLU5EMnBtRFl6QTBPVEtXVEhscDVpYWM1SzRWZWlS
ci1fQk9vWEo0WDJmU1R0NG5Id29fcXV0YTdqSkpLVDRQRVd5W
WFuQlNGc2kwRFc3b3dULUhFeEFHRHlKdEhVdE53NXhzczhOajZ
PeE5QdjZyUk9FLWtldmhMMndCOWNxZ2RJc2NidkRocmFzMzljd
2ZzIiwiYWxnIjoiSFMyNTYifQ"
}
Generate
HMAC
Key
(Key Store)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
JSON Web Key (encoded)
eyJrdHkiOiJvY3QiLCJ1c2UiOiJzaWciLCJraWQiOiJvcmFuZ2UteX
lqOUQwZWgiLCJrIjoiVlotMFFHTFoyUF9SUFVTVzEwQ0l1MFd
NeVhxLU5EMnBtRFl6QTBPVEtXVEhscDVpYWM1SzRWZWlSci
1fQk9vWEo0WDJmU1R0NG5Id29fcXV0YTdqSkpLVDRQRVd5
WWFuQlNGc2kwRFc3b3dULUhFeEFHRHlKdEhVdE53NXhzczh
OajZPeE5QdjZyUk9FLWtldmhMMndCOWNxZ2RJc2NidkRocm
FzMzljd2ZzIiwiYWxnIjoiSFMyNTYifQ
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
JSON Web Key (decoded)
{ "kty": "oct",
"use": "sig",
"kid": "orange-1234",
"k": "VZ-0QGLZ2P_RPUSW10CIu0WMyXq-ND2pmDYzA0OTKW
THlp5iac5K4VeiRr-_BOoXJ4X2fSTt4nHwo_quta7j
JJKT4PEWyYanBSFsi0DW7owT-HExAGDyJtHUtNw5xs
s8Nj6OxNPv6rROE-kevhL2wB9cqgdIscbvDhras39c
wfs",
"alg": "HS256"
}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Signed OAuth 2.0 Message
POST /painter/color/palele HTTP/1.1

Host: api.superbiz.io

Authoriza?on: Signature keyId=“orange-1234", algorithm="hmac-sha256",
headers="content-length host date (request-target)”,
signature="j050ZC4iWDW40nVx2oVwBEymXzwvsgm+hKBkuw04b+w="
Bearer: eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0b2tlbi10eXBlIjoiYWNjZXNzLXRva2VuIiwidXNlcm5h
bWUiOiJzbm9vcHkiLCJhbmltYWwiOiJiZWFnbGUiLCJpc3MiOiJodHRwczovL2RlbW8uc3VwZXJiaXouY29tL2
9hdXRoMi90b2tlbiIsInNjb3BlcyI6WyJ0d2l0dGVyIiwibWFucy1iZXN0LWZyaWVuZCJdLCJleHAiOjE0NzQyO
DA5NjMsImlhdCI6MTQ3NDI3OTE2MywianRpIjoiNjY4ODFiMDY4YjI0OWFkOSJ9.DTfSdMzIIsC0j8z3icRdY
O1GMGl6j1I_2DBjiiHW9vmDz8OAw8Jh8DpO32fv0vICc0hb4F0QCD3KQnv8GVM73kSYaOEUwlW0k1TaE
lxc43_Ocxm1F5IUNZvzlLJ_ksFXGDL_cuadhVDaiqmhct098ocefuv08TdzRxqYoEqYNo

Date: Mon, 19 Sep 2016 16:51:35 PDT
Accept: */*

Content-Type: applica?on/json

Content-Length: 46



{"color":{"b":0,"g":255,"r":0,"name":"green"}}
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
OAuth 2 + JWT + Signatures
Tokens Sent
3000 TPS
(HTTP+SSL)
0.55 TPS
(refresh token checks)
Password Sent
1000/daily
(HTTP+SSL)
OAuth 2
(LDAP)
4 hops
12000 TPS
backend
3000 TPS
(signature verifica?on)
12000 TPS
(signature verifica?on)
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
hlps://tools.ieu.org/html/drat-ieu-oauth-pop-key-distribu?on
Specification Reference
#RESTSecurity @dblevins @tomitribe
SDJUG
#RESTSecurity @dblevins @tomitribe
Observations
• HTTP Signatures the only HTTP friendly approach
• Signatures does not solve the “Iden?ty Load” problem
• OAuth 2 with JWT significantly improves IDP load
• Plain OAuth 2
• HTTP Session-like implica?ons
• OAuth 2 with JWT
• Signed cookie
• Signing key to the future
Thank You
Slides & Gateway Sign-up
https://tribestream.io/join-sdjug/
#RESTSecurity
SDJUG

More Related Content

PDF
2017 dev nexus_deconstructing_rest_security
PDF
Deconstructing and Evolving REST security
PDF
2016 JavaOne Deconstructing REST Security
PDF
2017 Devoxx MA Deconstructing and Evolving REST Security
PDF
2018 Denver JUG Deconstructing and Evolving REST Security
PDF
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
PDF
Stateless Microservice Security via JWT and MicroProfile - Mexico
PDF
Stateless Microservice Security via JWT and MicroProfile - Guatemala
2017 dev nexus_deconstructing_rest_security
Deconstructing and Evolving REST security
2016 JavaOne Deconstructing REST Security
2017 Devoxx MA Deconstructing and Evolving REST Security
2018 Denver JUG Deconstructing and Evolving REST Security
2018 ecuador deconstruyendo y evolucionando la seguridad en servicios rest
Stateless Microservice Security via JWT and MicroProfile - Mexico
Stateless Microservice Security via JWT and MicroProfile - Guatemala

What's hot (20)

PDF
Stateless Microservice Security via JWT and MicroProfile - ES
PDF
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
PDF
2018 Boulder JUG Deconstructing and Evolving REST Security
PDF
2018 jPrime Deconstructing and Evolving REST Security
PDF
Side-Channels on the Web: Attacks and Defenses
PDF
2018 JavaLand Deconstructing and Evolving REST Security
PDF
Dodging WebCrypto API Landmines
PDF
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
PDF
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
PDF
Don't Loose Sleep - Secure Your Rest - php[tek] 2017
PPTX
BrightonSEO Sep 2015 - HTTPS | Mark Thomas
PDF
Seguridad en microservicios via micro profile jwt
PDF
Html5 security
PDF
Security in Node.js
PDF
Building Fault Tolerant Microservices
PPTX
Async servers and clients in Rest.li
PPTX
JWTs and JOSE in a flash
PPTX
Building Secure User Interfaces With JWTs (JSON Web Tokens)
PDF
Deconstructing and Evolving REST Security
PPTX
Secure socket layer
 
Stateless Microservice Security via JWT and MicroProfile - ES
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 Boulder JUG Deconstructing and Evolving REST Security
2018 jPrime Deconstructing and Evolving REST Security
Side-Channels on the Web: Attacks and Defenses
2018 JavaLand Deconstructing and Evolving REST Security
Dodging WebCrypto API Landmines
Con Foo 2017 - Don't Loose Sleep - Secure Your REST
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
Don't Loose Sleep - Secure Your Rest - php[tek] 2017
BrightonSEO Sep 2015 - HTTPS | Mark Thomas
Seguridad en microservicios via micro profile jwt
Html5 security
Security in Node.js
Building Fault Tolerant Microservices
Async servers and clients in Rest.li
JWTs and JOSE in a flash
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Deconstructing and Evolving REST Security
Secure socket layer
 
Ad

Similar to 2018 SDJUG Deconstructing and Evolving REST Security (16)

PDF
2018 IterateConf Deconstructing and Evolving REST Security
PDF
2017 JavaOne Deconstructing and Evolving REST Security
PDF
2019 ITkonekt Stateless REST Security with MicroProfile JWT
PDF
Dublin JUG Stateless Microservice Security via JWT, TomEE and MicroProfile
PDF
2018 Madrid JUG Deconstructing REST Security
PDF
Jwt with flask slide deck - alan swenson
PDF
gRPC vs REST: let the battle begin!
PPTX
Django cryptography
PDF
Practical Cryptography
PPTX
Building Secure User Interfaces With JWTs
PDF
IoT Secure Bootsrapping : ideas
PPTX
CodeOne SF 2018 "Are you deploying and operating with security in mind?"
PDF
PPTX
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
PDF
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
PDF
Application Security around OWASP Top 10
2018 IterateConf Deconstructing and Evolving REST Security
2017 JavaOne Deconstructing and Evolving REST Security
2019 ITkonekt Stateless REST Security with MicroProfile JWT
Dublin JUG Stateless Microservice Security via JWT, TomEE and MicroProfile
2018 Madrid JUG Deconstructing REST Security
Jwt with flask slide deck - alan swenson
gRPC vs REST: let the battle begin!
Django cryptography
Practical Cryptography
Building Secure User Interfaces With JWTs
IoT Secure Bootsrapping : ideas
CodeOne SF 2018 "Are you deploying and operating with security in mind?"
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
DevOpsDays Chicago 2022 - Hands-on hacking containers and ways to prevent it
Application Security around OWASP Top 10
Ad

More from David Blevins (7)

PDF
DevNexus 2020 - Jakarta Messaging 3.x, Redefining JMS
PDF
2017 JCP EC: Configuration JSR
PDF
2015 JavaOne EJB/CDI Alignment
PDF
JavaOne 2013 - Apache TomEE, Java EE Web Profile {and more} on Tomcat
PDF
2011 JavaOne EJB with Meta Annotations
PDF
2011 JavaOne Apache TomEE Java EE 6 Web Profile
PDF
2011 JavaOne Fun with EJB 3.1 and OpenEJB
DevNexus 2020 - Jakarta Messaging 3.x, Redefining JMS
2017 JCP EC: Configuration JSR
2015 JavaOne EJB/CDI Alignment
JavaOne 2013 - Apache TomEE, Java EE Web Profile {and more} on Tomcat
2011 JavaOne EJB with Meta Annotations
2011 JavaOne Apache TomEE Java EE 6 Web Profile
2011 JavaOne Fun with EJB 3.1 and OpenEJB

Recently uploaded (20)

PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PPTX
Funds Management Learning Material for Beg
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
artificial intelligence overview of it and more
PPTX
innovation process that make everything different.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Introduction to Information and Communication Technology
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Module 1 - Cyber Law and Ethics 101.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Testing WebRTC applications at scale.pdf
Funds Management Learning Material for Beg
WebRTC in SignalWire - troubleshooting media negotiation
artificial intelligence overview of it and more
innovation process that make everything different.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
522797556-Unit-2-Temperature-measurement-1-1.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Introduction to Information and Communication Technology
An introduction to the IFRS (ISSB) Stndards.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
The Internet -By the Numbers, Sri Lanka Edition
PptxGenJS_Demo_Chart_20250317130215833.pptx
Internet___Basics___Styled_ presentation
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx

2018 SDJUG Deconstructing and Evolving REST Security