mirror of
https://github.com/versia-pub/docs.git
synced 2025-12-06 14:28:20 +01:00
157 lines
5.7 KiB
Plaintext
157 lines
5.7 KiB
Plaintext
export const metadata = {
|
|
title: 'Signatures',
|
|
description:
|
|
'Learn how signatures work, and how to implement them in your Lysand server.',
|
|
}
|
|
|
|
# Signatures
|
|
|
|
Lysand uses cryptographic signatures to ensure the integrity and authenticity of data. Signatures are used to verify that the data has not been tampered with and that it was created by the expected user. {{ className: 'lead' }}
|
|
|
|
<Note>
|
|
This part is very important! If signatures are implemented incorrectly in your server, **you will not be able to federate**.
|
|
|
|
Mistakes made in this section can lead to **security vulnerabilities** and **impersonation attacks**.
|
|
</Note>
|
|
|
|
## Signature Definition
|
|
|
|
A signature consists of a series of headers in an HTTP request. The following headers are used:
|
|
- **`Signature`**: The signature itself, encoded in the following format: `keyId="$keyId",algorithm="$algorithm",headers="$headers",signature="$signature"`.
|
|
- `keyId`: URI of the user that signed the request. Must be the Server Actor's URI if this request is not originated by user action.
|
|
- `algorithm`: Algorithm used to sign the request. Currently, only `ed25519` is supported.
|
|
- `headers`: List of headers that were signed. Should always be `(request-target) host date digest`.
|
|
- `signature`: The signature itself, encoded in Base64.
|
|
- **`Date`**: Date and time of the request, formatted as an [ISO 8601](https://en.wikipedia.org/wiki/ISO_8601) string.
|
|
|
|
Signatures are **required on ALL federation traffic**. If a request does not have a signature, it **MUST** be rejected. Specifically, signatures must be put on:
|
|
- **All POST requests**.
|
|
- **All responses to GET requests** (for example, when fetching a user's profile). In this case, the HTTP method used in the signature must be `GET`.
|
|
|
|
If a signature fails, is missing or is invalid, the server **MUST** return a `401 Unauthorized` HTTP status code.
|
|
|
|
### Calculating the Signature
|
|
|
|
Create a string containing the following (including newlines):
|
|
```
|
|
(request-target): $0 $1
|
|
host: $2
|
|
date: $3
|
|
digest: SHA-256=$4
|
|
```
|
|
|
|
<Note>
|
|
The last line of the string MUST be terminated with a newline character (`\n`).
|
|
</Note>
|
|
|
|
Where:
|
|
- `$0` is the HTTP method (e.g. `GET`, `POST`) in lowercase.
|
|
- `$1` is the path of the request, in standard URI format (don't forget to URL-encode it).
|
|
- `$2` is the hostname of the server (e.g. `example.com`, not `https://example.com` or `example.com/`).
|
|
- `$3` is the date and time of the request, formatted as an [ISO 8601](https://en.wikipedia.org/wiki/ISO_8601) string.
|
|
- `$4` is the SHA-256 hash of the request body, encoded in Base64.
|
|
|
|
Sign this string using the user's private key. The resulting signature should be encoded in Base64.
|
|
|
|
### Example
|
|
|
|
The following example is written in TypeScript using the WebCrypto API.
|
|
|
|
`@bob`, from `bob.com`, wants to sign a request to `alice.com`. The request is a `POST` to `/notes`, with the following body:
|
|
```json
|
|
{
|
|
"content": "Hello, world!"
|
|
}
|
|
```
|
|
|
|
Bob can be found at `https://bob.com/users/bf44e6ad-7c0a-4560-9938-cf3fd4066511`. His ed25519 private key, encoded in Base64 PKCS8, is `MC4CAQAwBQYDK2VwBCIEILrNXhbWxC/MhKQDsJOAAF1FH/R+Am5G/eZKnqNum5ro`.
|
|
|
|
Here's how Bob would sign the request:
|
|
```typescript
|
|
/**
|
|
* Using Node.js's Buffer API for brevity
|
|
* If using another runtime, you may need to use a different method to convert to/from Base64
|
|
*/
|
|
|
|
const content = JSON.stringify({
|
|
content: "Hello, world!",
|
|
});
|
|
|
|
const base64PrivateKey = "MC4CAQAwBQYDK2VwBCIEILrNXhbWxC/MhKQDsJOAAF1FH/R+Am5G/eZKnqNum5ro";
|
|
const privateKey = await crypto.subtle.importKey(
|
|
"pkcs8",
|
|
Buffer.from(base64PrivateKey, "base64"),
|
|
"Ed25519",
|
|
false,
|
|
["sign"],
|
|
);
|
|
|
|
const date = new Date().toISOString();
|
|
const digest = await crypto.subtle.digest(
|
|
"SHA-256",
|
|
new TextEncoder().encode(content)
|
|
);
|
|
|
|
const stringToSign =
|
|
`(request-target): post /notes\n` +
|
|
`host: alice.com\n` +
|
|
`date: ${date}\n` +
|
|
`digest: SHA-256=${Buffer.from(digest).toString("base64")}\n`;
|
|
|
|
const signature = await crypto.subtle.sign(
|
|
"Ed25519",
|
|
privateKey,
|
|
new TextEncoder().encode(stringToSign)
|
|
);
|
|
|
|
const base64Signature = Buffer.from(signature).toString("base64");
|
|
```
|
|
|
|
To send the request, Bob would use the following code:
|
|
|
|
```typescript
|
|
const headers = new Headers();
|
|
|
|
headers.set("Date", date);
|
|
headers.set("Signature", `keyId="https://bob.com/users/bf44e6ad-7c0a-4560-9938-cf3fd4066511",algorithm="ed25519",headers="(request-target) host date digest",signature="${base64Signature}"`);
|
|
headers.set("Content-Type", "application/json");
|
|
|
|
const response = await fetch("https://alice.com/notes", {
|
|
method: "POST",
|
|
headers,
|
|
body: content,
|
|
});
|
|
```
|
|
|
|
On Alice's side, she would verify the signature using Bob's public key. Here, we assume that Alice has Bob's public key stored in a variable called `publicKey` (during real federation, this would be fetched from Bob's profile).
|
|
|
|
```typescript
|
|
const method = request.method.toLowerCase();
|
|
const path = new URL(request.url).pathname;
|
|
const signature = request.headers.get("Signature");
|
|
const date = new Date(request.headers.get("Date"));
|
|
|
|
const [keyId, algorithm, headers, signature] = signature.split(",").map((part) => part.split("=")[1].replace(/"/g, ""));
|
|
|
|
const digest = await crypto.subtle.digest(
|
|
"SHA-256",
|
|
new TextEncoder().encode(await request.text())
|
|
);
|
|
|
|
const stringToVerify =
|
|
`(request-target): ${method} ${path}\n` +
|
|
`host: alice.com\n` +
|
|
`date: ${date.toISOString()}\n` +
|
|
`digest: SHA-256=${Buffer.from(digest).toString("base64")}\n`;
|
|
|
|
const isVerified = await crypto.subtle.verify(
|
|
"Ed25519",
|
|
publicKey,
|
|
Buffer.from(signature, "base64"),
|
|
new TextEncoder().encode(stringToVerify)
|
|
);
|
|
|
|
if (!isVerified) {
|
|
return new Response("Signature verification failed", { status: 401 });
|
|
}
|
|
``` |