Authenticating requests from mobile (iPhone) app t

2019-03-07 16:27发布

问题:

I'm designing a web site that will have a mobile companion (initally iPhone only). The web site will be an ASP.Net MVC 3 application. I'll also have an ASP.Net Web API site (MVC 4) to expose services to the iPhone application. The iPhone app will have its own form to capture username and password from the user and send that to the web API in JSON headers.

I want to consider security from the start rather than an after thought. I'm not a security expert by any means. I've done a good deal of research to see how other's are handling authentication of a mobile application client from a web service. I think I've come up with a decent solution that doesn't involve hooking into to third party oAuths.

I would greatly appreciate any and all opinions, advice, criticism and general WTFs that any of you can offer. :)

My biggest concerns are:

  1. Ensuring that calls made to the web API are authorized
  2. Minimizing the risk of replay attacks (hence timestamps in the calls below)

The iPhone app will be developed as such:
Two strings are hard-coded into the iPhone app (same values for every user):

  1. Application ID
    This is a string that is used to identify the type of client that is accessing the web API (iPhone, Android, Windows phone, etc).

  2. Application's Hashing Salt
    This is a string that is used to salt hashes for user-agnostic requests.

Two strings are stored in the iPhone app's local database (values unique to each user):

  1. API User Access Token
    This is a string (token) provided to the client by the web API upon successful authentication and allows the client to access the web API without sending the username and password in each request.
  2. User's Hashing Salt
    This is a string that is used to salt hashes for requests made against established user accounts.



The iPhone will make calls to the web API in the following manner:

API Method: Create Account
Client Sends:

  • New Account Data (Username, Password, First Name, Last Name, etc..)
  • Application ID
  • UTC Timestamp
  • Hash of UTC Timestamp + Application ID salted with Application's Hashing Salt

API Returns:

  • New User's Hashing Salt

    The idea here is that, when creating an account, I can use the application's hardcoded salt since it's not a huge security risk if that salt ever got out (through decompilation or some other means).

    But for methods that access and modify the user's data I'll use a salt that is owned only by that user so it can't be used by an attacker to impersonate others.


API Method: Get Account
(Used for getting user's hashing salt for accounts that were created on the web site but haven't yet been synced on the iPhone. This happens when a user tries to log in on the iPhone and iPhone detects that it has no record for that username.)

Client Sends:

  • Username
  • Password (hashed with Application's Hashing Salt)
  • Application ID
  • UTC Timestamp
  • Hash of UTC Timestamp + Application ID salted with Application's Hashing Salt

API Returns:

  • Existing User's Hashing Salt


API Method: Log In (Authenticate)
Client Sends:

  • Username
  • Password (hashed with User's Hashing Salt)
  • Application ID
  • UTC Timestamp
  • Hash of UTC Timestamp + Application ID salted with User's Hashing Salt

API Returns:

  • API User Access Token


API Method: Any Command (i.e. Create Post, Update Profile, Get Messages, etc...)
Client Sends:

  • Command Data
  • API User Access Token
  • Application ID
  • UTC Timestamp
  • Hash of UTC Timestamp + Application ID + API User Access Token salted with User's Hashing Salt

回答1:

My suggestions

  1. Authentication and Authorization. Build it on 2 different servers(In some projects I have used 3 as well). Reverse proxy servers are really good with this. Authenticate on one server and authorize it on the other.

This is the most important step I think that is needed in mobile security that use Web APIs.

  1. Encapsulate everything.

  2. Use SSL for all secure information. In my case I use it for everything.

  3. For your timestamp select a suitable time for which you can have authorization. Do not make this very short as your app will become slow or too long as network sniffers can access the packets.

If you want a 3 server architecture For your requests have an application key as well that you use to generate a access key (from Server 1). This access key will authenticate your requests which after successful authentication(from server 2) you can use that key to authorize your requests from another server(server 3)

The requests you have mentioned are standard norms. Don't really see a problem with that.



回答2:

I did it using asp.net mvc 4.0/web api basic membership. you may find it helpful.

Yeah, Use SSL for sure

https://github.com/aamir-poswal/Mobile-Apps-Authentication-Authorization-ASP.NET-WEB-MVC-4.0



回答3:

In VS 2013 you can use the "Asp MVC SPA Application" template to generate a working implementation that is generating a Oauth2 token bearer on login and authorizing it for WebApi controller calls using [Authorize] attributes. It uses Membership and Entity Framework to store users and hashes locally in a SQL Server. Just delete the asp mvc parts you don't need and keep the Auth part for WebApi. More details here: http://msdnrss.thecoderblogs.com/2013/09/understanding-security-features-in-the-spa-template-for-vs2013-rc/