-
Notifications
You must be signed in to change notification settings - Fork 48
/
README
597 lines (492 loc) · 29.2 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
Macaroons are Better Than Cookies!
==================================
This library provides an implementation of macaroons[1], which are flexible
authorization tokens that work great in distributed systems. Like cookies,
macaroons are bearer tokens that enable applications to ascertain whether their
holders' actions are authorized. But macaroons are better than cookies!
Why Macaroons?
--------------
Macaroons are great for authorization because they're similar enough to cookies
to be immediately usable by developers, but they include several features not
present in cookies or other token-based authorization schemes. In particular:
- Delegation with Contextual Caveats (i.e., confinement of the usage context):
Macaroons support delegation. Give your macaroon to another user, and they
can act on your behalf, with the same authority. Cookies permit delegation
as well, but the remaining features of macaroons make it much more safe and
practical to pass around macaroons than cookies. In particular, macaroons
can limit when, where, and by whom the delegated authority can be exercised
(e.g., within one minute, from a machine that holds a certain key, or by a
certain logged-in user), by using attenuation and third-party caveats.
- Attenuation: Macaroons enable users to add caveats to the macaroon that
attenuate how, when, and where it may be used. Unlike cookies, macaroons
permit their holder to attenuate them before delegating. Whereas cookies and
authorization tokens enable an application to get access to all of your data
and to perform actions on your behalf with your full privileges, macaroons
enable you to restrict what they can do. Those questionable startups that
"just want the address book, we swear it," become a whole lot more secure
when the target application supports macaroons, because macaroons enable you
to add caveats that restrict what the application can do.
- Proof-Carrying: Macaroons are efficient, because they carry their own proof
of authorization---cryptographically secured, of course. A macaroon's
caveats are constructed using chained HMAC functions, which makes it really
easy to add a caveat, but impossible to remove a caveat. When you attenuate
a macaroon and give it to another application, there is no way to strip the
caveats from the macaroon. It's easy for the entity that created a macaroon
to verify the embedded proof, but others cannot.
- Third-Party Caveats: Macaroons allow caveats to specify predicates that are
enforced by third parties. A macaroon with a third-party caveat will only be
authorized when the third party certifies that the caveat is satisfied. This
enables loosely coupled distributed systems to work together to authorize
requests. For example, a data store can provide macaroons that are
authorized if and only if the application's authentication service says that
the user is authenticated. The user obtains a proof that it is
authenticated from the authentication service, and presents this proof
alongside the original macaroon to the storage service. The storage service
can verify that the user is indeed authenticated, without knowing anything
about the authentication service's implementation---in a standard
implementation, the storage service can authorize the request without even
communicating with the authentication service.
- Simple Verification: Macaroons eliminate complexity in the authorization
code of your application. Instead of hand-coding complex conditionals in
each routine that deals with authorization, and hoping that this logic is
globally consistent, you construct a general verifier for macaroons. This
verifier knows how to soundly check the proofs embedded within macaroons to
see if they do indeed authorize access.
- Decoupled Authorization Logic: Macaroons separate the policy of your
application (who can access what, when), from the mechanism (the code that
actually upholds this policy). Because of the way the verifier is
constructed, it is agnostic to the actual underlying policies it is
enforcing. It simply observes the policy (in the form of an embedded proof)
and certifies that the proof is correct. The policy itself is specified when
macaroons are created, attenuated, and shared. You can easily audit this
code within your application, and ensure that it is upheld everywhere.
The rest of this document walks through the specifics of macaroons and see just
how easy authorization can be. So pour a fresh cup of espresso to enjoy
alongside your macaroons and read on!
Installing Macaroons
--------------------
This library makes it easy to get started with using macaroons in your
service. To use the library you must first install it. You'll need to
somehow install libbsd[2]. It's packaged in some Linux distributions, and can
be installed from source on most *NIX platforms. Once you have libbsd
installed, installing macaroons is straight forward. If you're installing
from git you'll need to install autoconf, automake, libtool, and
autoconf-archive and execute the first command. if you're installing from a
release tarball, you should skip the first command and start with configure.
$ autoreconf -i # only when installing from Git
$ ./configure --enable-python-bindings
$ make
# make install
This will install macaroons onto your system and give you both the C and Python
interfaces to libmacaroons. In the rest of this document, we'll show examples
using the Python interface, but the code could easily be translated into C.
Creating Your First Macaroon
----------------------------
Imagine that you ran a bank, and were looking to use macaroons as the basis of
your authorization logic. Assuming you already installed libmacaroons, you can
create a macaroon like this:
>>> import macaroons
>>> secret = 'this is our super secret key; only we should know it'
>>> public = 'we used our secret key'
>>> location = 'http://mybank/'
>>> M = macaroons.create(location, secret, public)
We've created our first macaroon!
You can see here that it took three pieces of information to create a macaroon.
We start with a secret. Here, we just have English text, but in reality we
would want to use something more random and less predictable (see below for a
suggestion on how to generate one). The public portion tells us which secret we
used to create the macaroon, but doesn't give anyone else a clue as to the
contents of the secret. Anyone in possession of the macaroon can see the public
portion:
>>> M.identifier
'we used our secret key'
This public portion, known as the macaroon's identifier, can be anything that
enables us to remember our secret. In this example, we know that the string 'we
used our secret key' always refers to this secret. We could just as easily keep
a database mapping public macaroon identities to private secrets, or encrypt the
public portion using a key known only to us. The only requirement here is that
our application be able to remember the secret given the public portion, and
that no one else is able to guess the secret.
Our macaroon includes some additional information that enables us to add caveats
and figure out where the macaroon should be used. The macaroon's location gives
a hint to the user about where the macaroon is accepted for authorization. This
hint is a free-form string maintained to help applications figure out where to
use macaroons; the libmacaroons library (and by extension, the Python bindings)
do not ascribe any meaning to this location.
Each macaroon also has a signature that is the key used to add caveats and
verify the macaroon. The signature is computed by the macaroons library, and is
unique to each macaroon. Applications should never need to directly work with
the signature of the macaroon. Any entity in possession of the macaroon's
signature should be assumed to possess the macaroon itself.
Both of these pieces of information are publicly accessible:
>>> M.location
'http://mybank/'
>>> M.signature
'e3d9e02908526c4c0039ae15114115d97fdd68bf2ba379b342aaf0f617d0552f'
We can share this macaroon with others by serializing it. The serialized form
is pure-ASCII, and is safe for inclusion in secure email, a standard HTTPS
cookie, or a URL. We can get the serialized form with:
>>> M.serialize(format=1)
'MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVzZWQgb3VyIHNlY3JldCBrZXkKMDAyZnNpZ25hdHVyZSDj2eApCFJsTAA5rhURQRXZf91ovyujebNCqvD2F9BVLwo'
Of course, this serialized form can be displayed in a more human-readable form
for easy debugging:
>>> print M.inspect()
location http://mybank/
identifier we used our secret key
signature e3d9e02908526c4c0039ae15114115d97fdd68bf2ba379b342aaf0f617d0552f
Adding Caveats
--------------
At this point, we have an unconstrained macaroon that authorizes everything
within our bank. In practice, such a macaroon is dangerous, because very few
people should hold such power. Let's add a caveat to our macaroon that
restricts it to just the account number 3735928559.
>>> M = M.add_first_party_caveat('account = 3735928559')
This new macaroon includes the same identifier and location that our old
macaroon from our initial macaroon, but includes the additional caveat that
restricts the bank account. The signature of this new macaroon is different,
and incorporates the new caveat we've just added. An entity in possession of
this new macaroon cannot simply remove our new caveat to construct the old
macaroon:
>>> print M.inspect()
location http://mybank/
identifier we used our secret key
cid account = 3735928559
signature 1efe4763f290dbce0c1d08477367e11f4eee456a64933cf662d79772dbb82128
Of course, we can add a few more caveats, and the macaroon's signature will
change with each of them.
>>> M = M.add_first_party_caveat('time < 2020-01-01T00:00')
>>> M.signature
'b5f06c8c8ef92f6c82c6ff282cd1f8bd1849301d09a2db634ba182536a611c49'
>>> M = M.add_first_party_caveat('email = [email protected]')
>>> M.signature
'ddf553e46083e55b8d71ab822be3d8fcf21d6bf19c40d617bb9fb438934474b6'
>>> print M.inspect()
location http://mybank/
identifier we used our secret key
cid account = 3735928559
cid time < 2020-01-01T00:00
cid email = [email protected]
signature ddf553e46083e55b8d71ab822be3d8fcf21d6bf19c40d617bb9fb438934474b6
The combination of all caveats in this macaroon authorize [email protected] to
access account 3735928559 until the end of 2019. Alice may present this
macaroon to the bank any time she wishes to prove to the bank that she is
authorized to access her account. Ideally, she'll transmit the serialized form
of the macaroon to the bank:
>>> msg = M.serialize(format=1)
>>> # send msg to the bank
Verifying Macaroons
-------------------
Our bank application's purpose is to protect users accounts from unauthorized
access. For that reason, it cannot just accept anything that looks like a
macaroon---that would defeat the point of using macaroons in the first place.
So how can we ensure that only authorized users access the bank?
We can determine whether a request is authorized through a process called
verification. First, we construct a verifier that can determine whether the
caveats on macaroons are satisfied. We can then use our verifier to determine
whether a given macaroon is authorized in the context of the request. For
example, our bank account application knows the account number specified in the
request, and can specify ``account = #'' when building the verifier. The
verifier can then check that this matches the information within the macaroon,
and authorize the macaroon if it does indeed match.
Let's walk through the verification process for Alice's macaroon that we
constructed in the previous section. The first step, of course, is for the bank
to deserialize the macaroon from the message. This converts the macaroon into a
form we can work with.
>>> M = macaroons.deserialize(msg)
>>> print M.inspect()
location http://mybank/
identifier we used our secret key
cid account = 3735928559
cid time < 2020-01-01T00:00
cid email = [email protected]
signature ddf553e46083e55b8d71ab822be3d8fcf21d6bf19c40d617bb9fb438934474b6
We have the same macaroon that Alice believes authorizes her to access her own
account, but we must verify this for ourselves. One (very flawed) way we could
try to verify this macaroon would be to manually parse it and authorize the
request if its caveats are true. But handling things this way completely
sidesteps all the crypto-goodness that macaroons are built upon.
Another approach to verification would be to use libmacaroons's built-in
verifier to process the macaroon. The verifier hides many of the details of the
verification process, and provides a natural way to work with many kinds of
caveats. The verifier itself is constructed once, and may be re-used to verify
multiple macaroons.
>>> V = macaroons.Verifier()
>>> V # doctest: +ELLIPSIS
<macaroons.Verifier object at ...>
Let's go ahead and try to verify the macaroon to see if the request is
authorized. To verify the request, we need to provide the verifier with Alice's
macaroon, and the secret that was used to construct it. In a real application,
we would retrieve the secret using ``M.identifier''; here, we know the secret
and provide it directly. A verifier can only ever successfully verify the
macaroon when provided with the macaroon and its corresponding secret---no
secret, no authorization.
Intuitively, our verifier should say that this macaroon is unauthorized because
our verifier cannot prove that any of the caveats we've added are satisfied. We
can see that it fails just as we would expect:
>>> V.verify(M, secret)
Traceback (most recent call last):
Unauthorized: macaroon not authorized
We can inform the verifier of the caveats used by our application using two
different techniques. The first technique is to directly provide the verifier
with the caveats that match the context of the request. For example, every
account-level action in a typical banking application is performed by a specific
user and targets a specific account. This information is fixed for each
request, and is known at the time of the request. We can tell the verifier
directly about these caveats like so:
>>> V.satisfy_exact('account = 3735928559')
>>> V.satisfy_exact('email = [email protected]')
Caveats like these are called ``exact caveats'' because there is exactly one way
to satisfy them. Either the account number is 3735928559, or it isn't. At
verification time, the verifier will check each caveat in the macaroon against
the list of satisfied caveats provided to ``satisfy_exact''. When it finds a
match, it knows that the caveat holds and it can move onto the next caveat in
the macaroon.
Generally, you will specify multiple true statements as exact caveats, and let
the verifier decide which are relevant to each macaroon at verification time.
If you provide all exact caveats known to your application to the verifier, it
becomes trivial to change policy decisions about authorization. The server
performing authorization can treat the verifier as a black-box and does not need
to change when changing the authorization policy. The actual policy is enforced
when macaroons are minted and when caveats are embedded. In our banking
example, we could provide some additional satisfied caveats to the verifier,
to describe some (or all) of the properties that are known about the current
request. In this manner, the verifier can be made more general, and be
"future-proofed", so that it will still function correctly even if somehow
the authorization policy for Alice changes; for example, by adding the three
following facts, the verifier will continue to work even if Alice decides to
self-attenuate her macaroons to be only usable from her IP address and browser:
>>> V.satisfy_exact('IP = 127.0.0.1')
>>> V.satisfy_exact('browser = Chrome')
>>> V.satisfy_exact('action = deposit')
Although it's always possible to satisfy a caveat within a macaroon by providing
it directly to the verifier, doing so can be quite tedious. Consider the caveat
on access time embedded within Alice's macaroon. While an authorization routine
could provide the exact caveat ``time < 2020-01-01T00:00'', doing so would
require inspecting the macaroon before building the verifier. Just like using
MD5 to hash passwords, inspecting a macaroon's structure to build a verifier for
it is considered to be very bad practice, and should be violently demonized in
Hacker News discussions with vague, slightly inaccurate allusions to pbkdf2.
So how can we tell our verifier that the caveat on access time is satisfied? We
could provide many exact caveats of the form ``time < YYYY-mm-ddTHH:MM'', but
this reeks of inefficiency. The second technique for satisfying caveats provides
a more general solution.
Called ``general caveats'', the second technique for informing the verifier that
a caveat is satisfied allows for expressive caveats. Whereas exact caveats are
checked by simple byte-wise equality, general caveats are checked using an
application-provided callback that returns true if and only if the caveat is
true within the context of the request. There's no limit on the contents of a
general caveat, so long as the callback understands how to determine whether it
is satisfied.
We can verify the time caveat on Alice's macaroon by writing a function that
checks the current time against the time specified by the caveat:
>>> import datetime
>>> def check_time(caveat):
... if not caveat.startswith('time < '):
... return False
... try:
... now = datetime.datetime.now()
... when = datetime.datetime.strptime(caveat[7:], '%Y-%m-%dT%H:%M')
... return now < when
... except:
... return False
...
This callback processes all caveats that begin with ``time < '', and returns
True if the specified time has not yet passed. We can see that our caveat does
indeed return True when the caveat holds, and False otherwise:
>>> check_time('time < 2020-01-01T00:00')
True
>>> check_time('time < 2014-01-01T00:00')
False
>>> check_time('account = 3735928559')
False
We can provide the ``check_time'' function directly to the verifier, so that it
may check time-based predicates.
>>> V.satisfy_general(check_time)
It's finally time to verify our macaroon! Now that we've informed the verifier
of all the various caveats that our application could embed within a macaroon,
we can expect that the verification step will succeed.
>>> V.verify(M, secret)
True
More importantly, the verifier will also work for macaroons we've not yet seen,
like one that only permits Alice to deposit into her account:
>>> N = M.add_first_party_caveat('action = deposit')
>>> V.verify(N, secret)
True
Equally important is the verifier's ability to reject improper macaroons because
they are not authorized. An improper macaroon could have additional caveats not
known to the verifier, or have false general caveats. Worse, an unauthorized
macaroon could be an attempt by a determined attacker to break into our bank.
The verifier we've built will reject all of these scenarios:
>>> # Unknown caveat
>>> N = M.add_first_party_caveat('OS = Windows XP')
>>> V.verify(N, secret)
Traceback (most recent call last):
Unauthorized: macaroon not authorized
>>> # False caveat
>>> N = M.add_first_party_caveat('time < 2014-01-01T00:00')
>>> V.verify(N, secret)
Traceback (most recent call last):
Unauthorized: macaroon not authorized
>>> # Bad secret
>>> V.verify(M, 'this is not the secret we were looking for')
Traceback (most recent call last):
Unauthorized: macaroon not authorized
>>> # Incompetent hackers trying to change the signature
>>> N = macaroons.deserialize('MDAxY2xvY2F0aW9uIGh0dHA6Ly9teWJhbmsvCjAwMjZpZGVudGlmaWVyIHdlIHVzZWQgb3VyIHNl\nY3JldCBrZXkKMDAxZGNpZCBhY2NvdW50ID0gMzczNTkyODU1OQowMDIwY2lkIHRpbWUgPCAyMDIw\nLTAxLTAxVDAwOjAwCjAwMjJjaWQgZW1haWwgPSBhbGljZUBleGFtcGxlLm9yZwowMDJmc2lnbmF0\ndXJlID8f19FL+bkC9p/aoMmIecC7GxdOcLVyUnrv6lJMM7NSCg==\n')
>>> print N.inspect()
location http://mybank/
identifier we used our secret key
cid account = 3735928559
cid time < 2020-01-01T00:00
cid email = [email protected]
signature 3f1fd7d14bf9b902f69fdaa0c98879c0bb1b174e70b572527aefea524c33b352
>>> M.signature == N.signature
False
>>> V.verify(N, secret)
Traceback (most recent call last):
Unauthorized: macaroon not authorized
Using Third-Party Caveats
-------------------------
Like first-party caveats, third-party caveats restrict the context in which a
macaroon is authorized, but with a different form of restriction. Where a
first-party caveat is checked directly within the verifier, a third-party caveat
is checked by the third-party, who provides a discharge macaroon to prove that
the original third-party caveat is true. The discharge macaroon is recursively
inspected by the verifier; if it verifies successfully, the discharge macaroon
serves as a proof that the original third-party caveat is satisfied. Of course,
nothing stops discharge macaroons from containing embedded first- or third-party
caveats for the verifier to consider during verification.
Let's rework the above example to provide Alice with access to her account only
after she authenticates with a service that is separate from the service
processing her banking transactions.
As before, we'll start by constructing a new macaroon with the caveat that is
limited to Alice's bank account.
>>> secret = 'this is a different super-secret key; never use the same secret twice'
>>> public = 'we used our other secret key'
>>> location = 'http://mybank/'
>>> M = macaroons.create(location, secret, public)
>>> M = M.add_first_party_caveat('account = 3735928559')
>>> print M.inspect()
location http://mybank/
identifier we used our other secret key
cid account = 3735928559
signature 1434e674ad84fdfdc9bc1aa00785325c8b6d57341fc7ce200ba4680c80786dda
So far, so good. Now let's add a third party caveat to this macaroon that
requires that Alice authenticate with ``http://auth.mybank/'' before being
authorized access to her account. To add a third-party caveat we'll need to
specify a location hint, generate a secret, and somehow be able to identify this
secret later. Like the location used when creating a macaroon, the location
used when adding a third-party caveat is simply a hint to the application that
is uninterpreted by libmacaroons.
The secret and identity are handled differently than during creation, however,
because they need to be known to the third party. To do this, we'll provide the
third-party with a randomly generated ``caveat_key'' and the predicate we wish
for it to check. In response, it will give us an identifier that we can embed
within the macaroon. Later, when we need to construct a discharge macaroon, we
can provide it with just this identifier, from which it can recall the key and
predicate to check.
Here's what this looks like in code:
>>> # you'll likely want to use a higher entropy source to generate this key
>>> caveat_key = '4; guaranteed random by a fair toss of the dice'
>>> predicate = 'user = Alice'
>>> # send_to_auth(caveat_key, predicate)
>>> # identifier = recv_from_auth()
>>> identifier = 'this was how we remind auth of key/pred'
>>> M = M.add_third_party_caveat('http://auth.mybank/', caveat_key, identifier)
>>> print M.inspect()
location http://mybank/
identifier we used our other secret key
cid account = 3735928559
cid this was how we remind auth of key/pred
vid AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA027FAuBYhtHwJ58FX6UlVNFtFsGxQHS7uD_w_dedwv4Jjw7UorCREw5rXbRqIKhr
cl http://auth.mybank/
signature d27db2fd1f22760e4c3dae8137e2d8fc1df6c0741c18aed4b97256bf78d1f55c
We now have a macaroon with a third-party caveat. The most interesting thing to
note about this macaroon is that it includes no information that reveals the
predicate it encodes. The third-party service knows the key and the predicate,
and internally associates them with the identifier, but the identifier itself is
arbitrary and betrays no information about the predicate to others. The service
at ``http://auth.mybank/'' can authenticate that the user is Alice, and provide
proof that the caveat is satisfied, without revealing Alice's identity. Other
services can verify M and its associated discharge macaroon, without knowing the
predicates the third-parties verified.
The process for discharging third party caveats starts with the holder of the
initial root macaroon, Alice. Alice looks at the macaroon for the list of third
party caveat (location, identifier) pairs that must be addressed.
>>> M.third_party_caveats()
[('http://auth.mybank/', 'this was how we remind auth of key/pred')]
In a real application, we'd look at these third party caveats, and contact each
location to retrieve the requisite discharge macaroons. We would include the
identifier for the caveat in the request itself, so that the server can recall
the secret used to create the third-party caveat. The server can then generate
and return a new macaroon that discharges the caveat:
>>> D = macaroons.create('http://auth.mybank/', caveat_key, identifier)
>>> D = D.add_first_party_caveat('time < 2020-01-01T00:00')
>>> print D.inspect()
location http://auth.mybank/
identifier this was how we remind auth of key/pred
cid time < 2020-01-01T00:00
signature 2ed1049876e9d5840950274b579b0770317df54d338d9d3039c7c67d0d91d63c
This new macaroon enables the verifier to determine that the third party caveat
is satisfied. Our target service added a time-limiting caveat to this macaroon
that ensures that this discharge macaroon does not last forever. This ensures
that Alice (or, at least someone authenticated as Alice) cannot use the
discharge macaroon indefinitely and will eventually have to re-authenticate.
Once Alice has both the root macaroon and the discharge macaroon in her
possession, she can make the request to the target service. Making a request
with discharge macaroons is only slightly more complicated than making requests
with a single macaroon. In addition to serializing and transmitting all
involved macaroons, there is a preparation step that binds the discharge macaroons
to the root macaroon. This binding step ensures that the discharge macaroon is
useful only when presented alongside the root macaroon. The root macaroon is
used to bind the discharge macaroons like this:
>>> DP = M.prepare_for_request(D)
If we were to look at the signatures on these prepared discharge macaroons, we
would see that the binding process has irreversibly altered their signature(s).
>>> D.signature
'2ed1049876e9d5840950274b579b0770317df54d338d9d3039c7c67d0d91d63c'
>>> DP.signature
'd115ef1c133b1126978d5ab27f69d99ba9d0468cd6c1b7e47b8c1c59019cb019'
The root macaroon ``M'' and its discharge macaroons ``MS'' are ready for the
request. Alice can serialize them all and send them to the bank to prove she is
authorized to access her account. The bank can verify them using the same
verifier we built before. We provide the discharge macaroons as a third
argument to the verify call:
>>> V.verify(M, secret, [DP])
True
Without the ``prepare_for_request'' call, the verification would fail:
>>> V.verify(M, secret, [D])
Traceback (most recent call last):
Unauthorized: macaroon not authorized
Choosing Secrets
----------------
For clarity, we've generated human-readable secrets that we use as the root keys
of all of our macaroons. In practice, this is terribly insecure and can lead to
macaroons that can easily be forged because the secret is too predictable. To
avoid this, we recommend generating secrets using a sufficient number of
suitably random bytes. Because the bytes are a secret key, they should be drawn
from a source with enough entropy to ensure that the key cannot be guessed
before the macaroon falls out of use.
The macaroons module exposes a constant that is the ideal number of bytes these
secret keys should contain. Any shorter is wasting an opportunity for security.
>>> macaroons.SUGGESTED_SECRET_LENGTH
32
To generate a suitable key is very simple using the python standard library:
>>> import os
>>> import binascii
>>> binascii.hexlify(os.urandom(macaroons.SUGGESTED_SECRET_LENGTH)) # doctest: +ELLIPSIS
'...'
Which gives a long string of hex bytes which can be passed into the create and
validate functions as-is.
Third-Party Caveats with Public Keys
------------------------------------
Public key cryptography can enable much more efficient schemes for adding
third-party caveats. In the above example where we added a third-party caveat,
the caveat's identifier was generated by the third party and retrieved with in
one round trip. We can eliminate the round trip when the third party has a
well-known public key. We can encrypt the caveat's secret, and the predicate to
be checked using this public key, and use the ciphertext directly as the
caveat's identifier. This saves a round trip, and frees the third party from
having to remember an association between identifiers and key/predicate pairs.
[1] http://research.google.com/pubs/pub41892.html
[2] https://libbsd.freedesktop.org/wiki/