Letterbook.NSign.AspNetCore
0.19.1
dotnet add package Letterbook.NSign.AspNetCore --version 0.19.1
NuGet\Install-Package Letterbook.NSign.AspNetCore -Version 0.19.1
<PackageReference Include="Letterbook.NSign.AspNetCore" Version="0.19.1" />
paket add Letterbook.NSign.AspNetCore --version 0.19.1
#r "nuget: Letterbook.NSign.AspNetCore, 0.19.1"
// Install Letterbook.NSign.AspNetCore as a Cake Addin #addin nuget:?package=Letterbook.NSign.AspNetCore&version=0.19.1 // Install Letterbook.NSign.AspNetCore as a Cake Tool #tool nuget:?package=Letterbook.NSign.AspNetCore&version=0.19.1
NSign.AspNetCore
Middleware for ASP.NET Core services to verify signatures on incoming HTTP requests and sign outgoing HTTP responses.
Usage
Verifying signatures on incoming request messages
To have incoming request messages' signatures verified, configure the middleware for the corresponding endpoints as in
the following example. Please don't forget to adapt endpoint filtering, required signature components as well as
signature parameters to your use case. Also make sure that the TagsToVerify
is updated to include the tags used by the
callers to identify their signatures.
# Service configuration
services
.Configure<RequestSignatureVerificationOptions>((options) =>
{
options.TagsToVerify.Add("caller-id");
options.RequiredSignatureComponents.Add(SignatureComponent.RequestTargetUri));
options.RequiredSignatureComponents.Add(SignatureComponent.ContentType));
options.CreatedRequired =
options.ExpiresRequired =
options.KeyIdRequired =
options.AlgorithmRequired =
options.TagRequired = true;
options.MaxSignatureAge = TimeSpan.FromMinutes(5);
options.VerifyNonce = (SignatureParamsComponent signatureParams) =>
{
Console.WriteLine($"Got signature with tag={signatureParams.Tag} and nonce={signatureParams.Nonce}.");
// TODO: Actually verify that the nonce was never used before and return false if it was.
return true;
};
})
;
# Middleware configuration - register signature verification before the actual middleware/controller handling the request:
app.UseWhen(ctx => ctx.Request.Path.StartsWithSegments("/webhooks"), builder => builder.UseSignatureVerification());
app.MapControllers();
You will also need to configure a signature provider that actually verifies the signatures on the requests. See NSign.SignatureProviders for currently available standard implemenations. You can do so for instance as follows:
services
.AddSignatureVerification(new RsaPssSha512SignatureProvider(
new X509Certificate2(@"path\to\certificate.cer"), "the-key-id"))
;
NOTE: The signature provider only requires access to the public key when asymmetric signatures are used. It must have access to the shared key when symmetric signatures are used.
Signing outgoing response messages
To have outgoing response messages signed, configure the middleware for the corresponding endpoints as in the following example. Please don't forget to adapt endpoint filtering, required signature components as well as signature parameters to your use case.
# Service configuration
services
.ConfigureMessageSigningOptions((options) =>
{
options
.WithMandatoryComponent(SignatureComponent.Status)
.WithMandatoryComponent(SignatureComponent.Path)
.WithMandatoryComponent(SignatureComponent.ContentType)
// Include the 'x-my-header' signature from the response in the signature too, if present.
.WithOptionalComponent(new HttpHeaderComponent("x-my-header"))
;
options.SignatureName = "resp";
options.SetParameters = (sigParams) =>
{
sigParams
.WithCreatedNow()
.WithExpires(TimeSpan.FromMinutes(5))
.WithTag("server-signed")
;
};
})
.ValidateOnStart()
;
# Middleware configuration - register response signing before the actual middleware/controller handling the request:
app.UseWhen(ctx => ctx.Request.Path.StartsWithSegments("/signed-responses"), builder => builder.UseResponseSigning());
app.MapControllers();
You will also need to configure a signature provider that actually signs response messages. See NSign.SignatureProviders for currently available standard implemenations. Register a signature provider for instance as follows:
services
.AddResponseSigning(new RsaPssSha512SignatureProvider(
new X509Certificate2(@"path\to\certificate.pfx", "PasswordForPfx"),
"my-cert"))
;
NOTE: The signature provider must have access to the private key when asymmetric signatures are used. It must have access to the shared key when symmetric signatures are used.
Further Information
See also:
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 is compatible. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- Letterbook.NSign.Abstractions (>= 0.19.1)
- StructuredFieldValues (>= 0.5.3)
-
net7.0
- Letterbook.NSign.Abstractions (>= 0.19.1)
- StructuredFieldValues (>= 0.5.3)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
0.19.1 | 271 | 10/23/2023 |