Skip to content

StephSanchez/plug_hmac_auth

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HMAC Authentication Plug

Elixir CI Hex.pm License: MIT

Plug support for HMAC authentication. This is used for authentication between server sides.

plug_hmac_auth

Installation

This package can be installed by adding plug_hmac_auth to your list of dependencies in mix.exs:

def deps do
  [
    {:plug_hmac_auth, "~> 0.1.0"}
  ]
end

Usage

HTTP GET SAMPLE (readable request)

This sample is provided using Javascript

const uuid = require('uuid');
const cryptoJS = require("crypto-js");
const moment = require("moment");

const nonce = uuid.v4();
const client_id = 'USE YOUR CLIENT ID';
const host = "localhsot";
const method = "GET";
const epoch = moment().unix();
const path = request.url.getPath();
// payload format
// host: ${host}; method: ${method}; request_path /sample/sample/id; query_string ; nonce: holaf6; timestamp: 1693860698
var payload = `host: ${host}; method: ${method}; request_path: ${path}; query_string ; nonce: ${nonce}; timestamp: ${epoch}`;
console.log(payload);

// Accordind to your configuration :hmac_hash_algo
var authorize = cryptoJS.HmacSHA512(payload, 'USE YOUR PRIVATE KEY').toString(cryptoJS.enc.Base64);

headers.add([{
    key: "Authorization",
    value: authorize
},{
    key: "X-Authorization-Id",
    value: client_id
},{
    key: "X-Authorization-Nonce",
    value: nonce
},{
    key: "X-Authorization-Timestamp",
    value: epoch
}]);

HTTP POST SAMPLE (writable request)

this sample is provided usins javascript

const uuid = require('uuid');
const cryptoJS = require("crypto-js");
const moment = require("moment");

const nonce = uuid.v4();
const client_id = 'USE YOUR CLIENT ID';
const host = "localhost"
const method = "POST";

const epoch = moment().unix();
const body_hash = CryptoJS.MD5(request.body.toString()).toString()
const path = request.url.getPath();
// payload format
// host: localhost; method: POST; request_path: /sample/sample; body_hash: f6ec8fd8d77bf5e19f6a28a37353d6ef; nonce: holaf7; timestamp: 1694248700
var payload = `host: ${host}; method: ${method}; request_path: ${path}; body_hash: ${body_hash}; nonce: ${nonce}; timestamp: ${epoch}`;

// Accordind to your configuration :hmac_hash_algo
var authorize = cryptoJS.HmacSHA512(payload, 'USE YOUR PRIVATE KEY').toString(cryptoJS.enc.Base64);

headers.add([{
    key: "Authorization",
    value: authorize
},{
    key: "X-Authorization-Id",
    value: client_id
},{
    key: "X-Authorization-Nonce",
    value: nonce
},{
    key: "X-Authorization-Timestamp",
    value: epoch
}]);

PlugHmacAuthExampleWeb.Endpoint

We use some raw data as payload to verify the request from client.

For those GET requests, we use query string as payload.

For other requests, we use raw body as payload. But the raw body of request can only be read once. That means we can't read the raw body after the Plug.Parsers. Instead of the original body reader provided by Plug.Parsers, we need to use a custom body reader to cache the raw body.

plug Plug.Parsers,
  parsers: [:urlencoded, :multipart, :json],
  pass: ["*/*"],
  json_decoder: Phoenix.json_library(),
  body_reader: {PlugHmacAuth.BodyReader, :read_body, []}

PlugHmacAuthExampleWeb.Router

In the router module of your web site, define a new pipeline to enable the plug of HMAC authentication:

pipeline :plug_hmac_auth do
    plug(PlugHmacAuth,
      log: true,
      key_access_id: "X-Authorization-Id",
      key_signature: "Authorization",
      key_nonce: "X-Authorization-Nonce",
      key_timestamp: "X-Authorization-Timestamp",
      hmac_hash_algo: :sha512,
      secret_handler: SampleApp.Handlers.SecretHandler,
      error_handler: SampleApp.Handlers.AuthErrorHandlers,
      nonce_handler: SampleApp.Handlers.NonceHandler,
      timestamp_handler: SampleApp.Handlers.TimestampHandler
      request_context_handler: SampleApp.Handlers.RequestContextHandler
    )
  end

Module PlugHmacAuth needs these options:

  • log: [true| false] to enable log in module, default value is false
  • key_access_id: The key of access_id in the HTTP request header.
  • key_signature: The key of signature in the HTTP request header.
  • key_nonce: The key of nonce in the HTTP request header. The nonce global attribute is a content attribute defining a cryptographic nonce ("number used once") which can be used by Content Security Policy to determine whether or not a given fetch will be allowed to proceed for a given element.
  • key_timestamps: The Key timestamps in the HTTP request header. The timestamp global attribute includes information about the time when the HTTP request was sent. It helps in managing cache mechanisms, handling resource updates, and ensuring synchronization between the client and server.
  • hmac_hash_algo: The algorithm of HMAC.
  • secret_handler: Secret handler is the module to get the secret by given access_id.
  • error_handler: Error handler is the module to handle the unauthorized request.
  • nonce_handler : Nonce handler to determine unicity of a request
  • timestamp_handler : Timestamps handler to determine the validity of a request
  • request_context_handler : Request Context handler to offer the possiblity to add a user context within the request context.

HMAC hash algorithm

Here lists the algorithms current supported.

Secret Handler

We need to implement the callback function of get_secret_key/1 to let authenticator know how to get the secret key by given access id.

Error Handler

We need to implement the callback function of auth_error/2 to let the authenticator know how to handle the unauthorized request.

Nonce handler

We need to implement the callback function of validate_nonce_key/1 to let the authenticator know how to handle the request unicity. We need to implement the callback function of store_nonce_key to let the authenticator know how to store the nonce. The nonce is store only if the payload verification match.

Timestamp Handler

We need to implement the callback function of validate_timestamp_key/1 to let the authenticator know how to handle the request validity. the timestamp is a Unix Timestamp.

Request Context handler

We need to implement the callback function of assign_context/2 to let the authenticator know how to handle the request contexte. the first parameter is the %Plug.Conn{}. The second one is the access_id of the request.

Nota:

If you do not specify a custom handler, the system defaults to using PlugHmacAuth.DefaultRequestContextHandler, which intercepts the pipeline and adds the client access key to the x_client_id tag.

Documentation

See HexDocs.

Reference

About

Plug support for HMAC authentication.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Elixir 100.0%