Securely transmitting information between services and authorization can be achieved with using JSON Web Tokens. JWTs are an open, industry standard RFC 7519 method for representing claims securely between two parties. Here’s a short explanation and guide of what they are, their use and how to generate the needed things.
“JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.”
jwt.io
You should read the introduction to JWT to understand it’s role and there’s also a handy JWT Debugger to test things. For more detailed info you can read a JWT handbook.
In short, authorization and information exchange are some scenarios where JSON Web Tokens are useful. They essentially encode any sets of identity claims into a payload, provide some header data about how it is to be signed, then calculate a signature using one of several algorithms and append that signature to the header and claims. JWTs can also be encrypted to provide secrecy between parties. When a server receives a JWT, it can guarantee the data it contains can be trusted because it’s signed by the source.
Usually two algorithms are supported for signing JSON Web Tokens: RS256 and HS256. RS256 generates an asymmetric signature, which means a private key must be used to sign the JWT and a different public key must be used to verify the signature.
JSON Web Key
JSON Web Key (JWK) provides a mechanism for distributing the public keys that can be used to verify JWTs. The specification is used to represent the cryptographic keys used for signing RS256 tokens. This specification defines two high level data structures: JSON Web Key (JWK) and JSON Web Key Set (JWKS):
- JSON Web Key (JWK): A JSON object that represents a cryptographic key. The members of the object represent properties of the key, including its value.
- JSON Web Key Set (JWKS): A JSON object that represents a set of JWKs. The JSON object MUST have a keys member, which is an array of JWKs. The JWKS is a set of keys containing the public keys that should be used to verify any JWT.
In short, the service signs JWT-tokens with it’s private key (in this case PKCS12 format) and the receiving service checks the signature with the public key which is in JWK format.
Generating keys and certificate for JWT
In this example we are using JWTs for information exchange as they are a good way of securely transmitting information between parties. Because JWTs can be signed—for example, using public/private key pairs — you can be sure the senders are who they say they are. Additionally, as the signature is calculated using the header and the payload, you can also verify that the content hasn’t been tampered with.
Generate the certificate for JWT with OpenSSL, in this case self-signed is enough:
$ openssl genrsa -out private.pem 4096
Generate public key from earlier generated private key for if pem-jwk needs it, it isn’t needed otherwise
$ openssl rsa -in private.pem -out public.pem -pubout
If you try to insert private and public keys to PKCS12 format without a certificate you get an error:
openssl pkcs12 -export -inkey private.pem -in public.pem -out keys.p12
unable to load certificates
Generate self-signed certificate with aforesaid key for 10 years. This certificate isn’t used for anything as the counterpart is JWK with just public key, no certificate.
$ openssl req -key private.pem -new -x509 -days 3650 -subj "/C=FI/ST=Helsinki/O=Rule of Tech/OU=Information unit/CN=ruleoftech.com" -out cert.pem
Convert the above private key and certificate to PKCS12 format
$ openssl pkcs12 -export -inkey private.pem -in cert.pem -out keys.pfx -name "my alias"
Check the keystore:
$ keytool -list -keystore keys.pfx
OR
$ keytool -v -list -keystore keys.pfx -storetype PKCS12 -storepass
Enter keystore password:
Keystore type: PKCS12
Keystore provider: SUN
Your keystore contains 1 entry
1, Jan 18, 2019, PrivateKeyEntry,
Certificate fingerprint (SHA-256): 0D:61:30:12:CB:0E:71:C0:F1:A0:77:EB:62:2F:91:9B:55:08:FC:3B:A5:C8:B4:C7:B4:CD:08:E9:2C:FD:2D:8A
If you didn’t set alias for the key when creating the PKCS12 you can change it
keytool -changealias -alias "original alias" -destalias "my awesome alias" -keystore keys.pfx -storetype PKCS12 -storepass "password"
Now we finally get to the part where we generate the JWK. The final result is a JSON file which contains the public key from earlier created certificate in JWK-format so that the service can accept the signed tokens.
The JWK is in format of:
"
{
"keys": [
….,
{
"kid": "something",
"kty": "RSA",
"use": "sig",
"n": "…base64 public key values …",
"e": "…base64 public key values …"
}
]
}
"
Convert the PEM to JWK format with e.g. pem-jwk or with pem_to_jwks.py. The key is in pkcs12 format. The values for public key’s values n and e are extracted from private key with following commands. jq part extracts the public parts and excludes the private parts.
$ npm install -g pem-jwk
$ ssh-keygen -e -m pkcs8 -f private.pem | pem-jwk | jq '{kid: "something", kty: .kty , use: "sig", n: .n , e: .e }'
...
To check things, you can do the following.
Extract a private key and certificates from a PKCS12 file using OpenSSL:
$ openssl pkcs12 -in keys.p12 -out keys_out.txt
The private key, certificate, and any chain files will be parsed and dumped into the “keys_out.txt” file. The private key will still be encrypted.
To extract just the private key from p12 (key is still encrypted):
$ openssl pkcs12 -in keys.p12 -nocerts -out privatekey.pem
Decrypt the private key:
$ openssl rsa -in privatekey.pem -out privatekey_uenc.pem
Now if you convert the PEM to JWK you should get the same values as before.
More to read: JWTs? JWKs? ‘kid’s? ‘x5t’s? Oh my!
Leave a Reply