Skip to content

danielballan/auth-adventures

Repository files navigation

Adventures in Authentication

This is a series of examples of escalating complexity, demonstrating authentication schemes with Python servers and clients. It is not intended for use, only for study.

Setup

This installs the requirements for running the Python examples, as well the commandline tools HTTPie and jq used in the narrative below.

git clone https://github.com/danielballan/auth-adventures
pip install -r requirements.txt

Run the following examples from the repository root.

Example 0: No Authentication

uvicorn public:app --reload

Request /data. It succeeds. Life without security is simple.

$ http :8000/data
HTTP/1.1 200 OK
content-length: 16
content-type: application/json
date: Wed, 16 Nov 2022 17:33:10 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ]
}

Example 1: Single-user API key

export API_KEY=secret
uvicorn single_user:app --reload

Request /data. The server rejects our request with 401 Unauthorized.

$ http :8000/data
HTTP/1.1 401 Unauthorized
content-length: 15
content-type: application/json
date: Wed, 16 Nov 2022 20:32:43 GMT
server: uvicorn

{
    "error": "..."
}

Do that again showing the headers in our request.

$ http -phHb :8000/data
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 401 Unauthorized
content-length: 15
content-type: application/json
date: Wed, 16 Nov 2022 17:43:15 GMT
server: uvicorn

{
    "error": "..."
}

Add a header formed like Authorization:Apikey {API key}.

$ http -phHb :8000/data 'Authorization:Apikey secret'
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Authorization: Apikey secret
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 200 OK
content-length: 16
content-type: application/json
date: Wed, 16 Nov 2022 20:43:45 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ]
}

Add a query parameter api_key={API key}.

$ http -phHb :8000/data?api_key=secret
GET /data?api_key=secret HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 200 OK
content-length: 16
content-type: application/json
date: Wed, 16 Nov 2022 20:44:27 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ]
}

Observations:

  • The interaction is fundamentally simple compared to what's to come below.
  • The ergonomics for the user are just OK. The user has to handle a long random string (secret).
  • Placing the key in the header is more secure (it will not be captured in logs or saved in web browser history).
  • Placing the key in the URL is often easier.
  • The API key only applies to this service; it won't give access to other resources that this user can access.
  • API keys are generally valid for months, because updating them is a manual process, so if it leaks the time window of risk is large.
  • The user directly handles the secret. People are liable to leak this by putting it public scripts or notebooks or showing it in recorded talks.

Example 2: HTTP Basic (on every request)

In HTTP Basic we send the username and password, encoded but not encrypted.

uvicorn http_basic:app --reload

Request /data. The server rejects our request with 401 Unauthorized.

$ http :8000/data
HTTP/1.1 401 Unauthorized
content-length: 15
content-type: application/json
date: Wed, 16 Nov 2022 17:42:03 GMT
server: uvicorn

{
    "error": "..."
}

Do that again showing the headers in our request.

$ http -phHb :8000/data
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 401 Unauthorized
content-length: 15
content-type: application/json
date: Wed, 16 Nov 2022 17:43:15 GMT
server: uvicorn

{
    "error": "..."
}

Provide credentials via "HTTP basic".

$ http -phHb :8000/data --auth dallan:password
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Authorization: Basic ZGFsbGFuOnBhc3N3b3Jk
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 200 OK
content-length: 36
content-type: application/json
date: Wed, 16 Nov 2022 17:44:54 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ],
    "who_am_i": "dallan"
}

The string dallan:password was base64-encoded and placed in the Authorization header like Authorization: Basic {base64-encoded username:password}.

If we send the wrong password, the request is, correctly, rejected.

$ http -phHb :8000/data --auth dallan:wrong_password
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Authorization: Basic ZGFsbGFuOndyb25nX3Bhc3N3b3Jk
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 401 Unauthorized
content-length: 15
content-type: application/json
date: Wed, 16 Nov 2022 17:48:21 GMT
server: uvicorn

{
    "error": "..."
}

We can connect from Python using httpx, which accepts (username, password) and performs Basic auth.

In [1]: from httpx import Client

In [2]: client = Client(base_url="http://localhost:8000")

In [3]: client.get("/data")
Out[3]: <Response [401 Unauthorized]>

In [4]: client.get("/data", auth=("dallan", "password"))
Out[4]: <Response [200 OK]>

In [5]: client.auth = ("dallan", "password")

In [6]: client.get("/data")
Out[6]: <Response [200 OK]>

In [7]: client.get("/data").json()
Out[7]: {'data': [1, 2, 3], 'who_am_i': 'dallan'}

Observations:

  • HTTP is a stateless protocol, so we have to send some form of proof that we are authenticated in every single request.
  • Unlike an API key, this credential was created by the user. It may be relatively easy to guess, compared to a random API key. It also might grant access to other services.
  • We have to send the password on every request. This means that our client program has to retain it or else prompt us to re-enter it.

Example 3: HTTP Basic into OAuth2

export SECRET_KEYS=secret
uvicorn http_basic_into_oauth2:app --reload

This time, send credentials to a dedicated /login route. Capture the output in a file.

$ http POST :8000/login --auth dallan:password > tokens.json
$ jq . < tokens.json
{
  "refresh_token": "eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAicmVmcmVzaCIsICJleHAiOiAxNjY5ODMxMjQwfQ.Un9hUs-xS64nqc-aOjM4QeaeCkJs-55OPtch4NE6a_Y",
  "access_token": "eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAiYWNjZXNzIiwgImV4cCI6IDE2Njg2MjE2NTB9.aCtlXCYRBIZpaqgRf_bI0RVwSvOBx_Ul6vvKtWhqm1Y"
}

Extract the access token to construct a header like Authorization: Bearer {access_token}.

$ http -pHhb :8000/data "Authorization:Bearer $(jq -r '.access_token' < tokens.json)"
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Authorization: Bearer eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAiYWNjZXNzIiwgImV4cCI6IDE2Njg2MjIxMzJ9.Fm14DLBFf1_OFaSvdTzSoBBeeBrWpQb2BO3kA-pgwJc
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 200 OK
content-length: 36
content-type: application/json
date: Wed, 16 Nov 2022 18:08:42 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ],
    "who_am_i": "dallan"
}

When the access token expires, exchange the refresh token for a new pair of tokens.

$ http POST :8000/refresh <<< $(jq -r . < tokens.json) > tokens.json

The httpx client enables us to implement this refresh flow using a coroutine.

$ python client_refresh_flow.py
Username: dallan
Password: password
<Response [200 OK]>
<Response [200 OK]>
<Response [200 OK]>
<Response [200 OK]>
<Response [200 OK]>
<Response [200 OK]>
...

Watching the server logs while this runs:

INFO:     127.0.0.1:35098 - "POST /login HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
Token expired at 2022-11-16 16:11:24
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 401 Unauthorized
INFO:     127.0.0.1:35098 - "POST /refresh HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK
INFO:     127.0.0.1:35098 - "GET /data HTTP/1.1" 200 OK

We see that the access token periodicially expires and a new one is obtained. This exchange happens transpently to the user, who sees only the success requests after the failing ones are retried.

We can do the same in a web app.

cd webapp/
npm install
npm run serve

Navigate to http://localhost:8001. Open the Developer Tools (Ctrl+Shift+I) and open the Network tab. Enter dallan and password and click Log in. Click Load Data repeatedly. Observe how credentials are periodically refreshed, exactly as in the Python-based example previously.

Observations:

  • This is much more complex to implement, thought the final user experience is nicer.
  • "Use it or lose it." As long as the client is being frequently used, the session is refreshed and there is no need to log in again. It only expires if it is unused for the duration of the refresh token's lifetime.
  • We only handle the credential once and then we can forget it.
  • The user does not directly handle the tokens, so they are unlikely to be leaked. And if the tokens are leaked, they time window of risk is shorter than for an API key.

Next Steps:

  • Give the refresh token a "session ID" so that it can be revoked and given a maximum lifetime.
  • Give each refresh token an incrementing number so that each one can only be used once.
  • Enable an authenticated user to create API keys specific to them.

Example 4: External OIDC into OAuth2 Code Flow

In Example 3, we passed our credentials directly to the server. In this example, we will open a web browser to give our credentials to a trusted third party service, which will then communicate with the server directly to verify our identity using OAuth2 "code flow".

Start an OIDC provider using the Docker image qlik/simple-oidc-provider. This will stand in for an external identity provider like Google, Globus, ORCID, GitHub, etc.

docker run --rm -p 9000:9000 -v $(pwd):/config -e CONFIG_FILE=/config/oidc_provider_config.json -e USERS_FILE=/config/users.json qlik/simple-oidc-provider:0.2.4

Note: The version of the Docker image is intentionally tagged 0.2.4. The latest tag does not work; the failure seems to be related to an experimental feature in that version.

export SECRET_KEYS=secret
uvicorn external_oidc_into_oauth2:app --reload

Note: At startup, the example_oidc_into_oauth2 server downlaods some information from the OIDC provider. It must be started after the OIDC provider, and if the OIDC provider is ever restarted, the server must be restarted too.

Back in the web app we started in Example 3, follow the link.

  • Link navigates browser to third party.
  • Third party authenticates us and generates a short-lived, single-use code.
  • Third party redirects browser back to web app, with code.
  • Web app sends code to server.
  • Server sends code to third party.
  • Third party sends user info (e.g. username) to server.
  • Server sends tokens to browser.
  • We proceed as in Example 3, using access and refresh tokens.

Observations:

  • This is complicated!
  • But it is a standard, and in fact it is the most secure variant of the standard.

Example 5: External OIDC into OAuth2 Device Code Flow

Example 4 relies on everything happening the browser. Crucially, the third party transfers a code to our app by redirecting the user's browser. That won't work if the program we are trying to authenticate is not a web app. By design, browsers cannot get data out---they can stash files on disk or otherwise pass data other programs on the system.

Enter "Device Code Flow". This is the same process that is used when we link "smart" devices (like TVs) to online accounts.

We will use the same server as in Example 4.

$ http POST :8000/authorize > info.json
$ jq . < info.json
{
  "authorization_uri": "http://localhost:9000/auth?client_id=example_client_id&response_type=code&scope=openid&redirect_uri=http%3A%2F%2Flocalhost%3A8000%2Fdevice_code_callback",
  "verification_uri": "http://localhost:8000/token",
  "interval": 2,
  "device_code": "3dc36914977264d501e1a60f29cf626c2f4cadee8e290e5385b4f38c1ef64543",
  "expires_in": 900,
  "user_code": "47C68550"
}

The server logs show that a PendingSession was created.

Created PendingSession(user_code='A2E403CA', device_code='6fd0ee106c2ba246d98b65e43fe7f4caa5edf9426651743551d05b9c0b98fb3d', deadline=datetime.datetime(2022, 11, 16, 21, 33, 18, 467853), username=None)

Navigate a browser to authorization_uri.

$ xdg-open $(jq -r .authorization_uri < info.json)

Log in with [email protected] and password. When prompted "Enter code", enter the user_code from info.json. You should see a confirmation message in the browser.

The pending session is now verified, as the server logs show.

Verified PendingSession(user_code='A2E403CA', device_code='6fd0ee106c2ba246d98b65e43fe7f4caa5edf9426651743551d05b9c0b98fb3d', deadline=datetime.datetime(2022, 11, 16, 21, 33, 18, 467853), username='dallan')

Collect the tokens. This can only be done once.

$ http --form POST :8000/token "device_code=$(jq -r '.device_code' < info.json)" > tokens.json
$ jq . < tokens.json
{
  "refresh_token": "eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAicmVmcmVzaCIsICJleHAiOiAxNjY5ODYwMzI1fQ.43-h1tgz1ZeFay9fO6N7avh-12Yx5TNr8uLr87d0w9k",
  "access_token": "eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAiYWNjZXNzIiwgImV4cCI6IDE2Njg2NTA3MzV9.bM8LXqaVtamakcJDPZ5taJlWylramFl3PKbmRwDvp-s"
}

The server logs confirm that the lifecycle of this PendingSession is complete.

Used PendingSession(user_code='A2E403CA', device_code='6fd0ee106c2ba246d98b65e43fe7f4caa5edf9426651743551d05b9c0b98fb3d', deadline=datetime.datetime(2022, 11, 16, 21, 33, 18, 467853), username='dallan')

And now access and refresh work as in Example 3:

$ http POST :8000/refresh <<< $(jq -r . < tokens.json) > tokens.json
$ http -pHhb :8000/data "Authorization:Bearer $(jq -r '.access_token' < tokens.json)"
GET /data HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
Authorization: Bearer eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJIUzI1NiJ9.eyJzdWIiOiAiZGFsbGFuIiwgInR5cGUiOiAiYWNjZXNzIiwgImV4cCI6IDE2Njg2NTA4MzZ9.trYhD8yHW7cvK4_JagnUziu2KtqzAdjci65jXf0kxY4
Connection: keep-alive
Host: localhost:8000
User-Agent: HTTPie/1.0.3

HTTP/1.1 200 OK
content-length: 36
content-type: application/json
date: Thu, 17 Nov 2022 02:07:14 GMT
server: uvicorn

{
    "data": [
        1,
        2,
        3
    ],
    "who_am_i": "dallan"
}

Run the whole process again from Python:

python client_device_code_flow.py
You have 900 seconds to enter the code

    204A18A4

after authorizing at the URL:

    http://localhost:9000/auth?client_id=example_client_id&response_type=code&scope=openid&redirect_uri=http%3A%2F%2Flocalhost%3A8000%2Fdevice_code_callback

Waiting........
Logged in!
<Response [200 OK]>
{'data': [1, 2, 3], 'who_am_i': 'dallan'}

Observations:

  • This is really complicated to implement!
  • The ergonomics for the user are pretty good.
  • This works even if the user's browser and the user's Python process are on different machines/networks (such as with a remote Jupyter session).

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published