Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reject messages with insufficient signed headers #56

Open
brightbyte opened this issue Jun 19, 2024 · 0 comments
Open

Reject messages with insufficient signed headers #56

brightbyte opened this issue Jun 19, 2024 · 0 comments

Comments

@brightbyte
Copy link

brightbyte commented Jun 19, 2024

The server should be able to require the client to sign certain headers, and reject any messages in which these headers are unsigned.
For example, a server should be able to require a signed digest header for POST requests, and reject any message that doesn't have a signed digest header.

This protects against sloppy clients "leaving the door open": if a POST request with an unsigned digest is intercepted, the message body can be manipulated without invalidating the signature, and the forged message would be accepted.

This could be prevented by supplying a list of required headers to the constructors of the Verifier and Verification classes.
It might be useful to supply two sets of headers, one for requests without a body, and another for messages with a body. (Note that DELETE requests may or may not have a body).

For reference: https://datatracker.ietf.org/doc/html/rfc9421#verify-requirements

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant