Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encrypted API calls #548

Closed
wlandau opened this issue Oct 19, 2022 · 4 comments
Closed

Encrypted API calls #548

wlandau opened this issue Oct 19, 2022 · 4 comments

Comments

@wlandau
Copy link

wlandau commented Oct 19, 2022

In paws, what would it take to encrypt API calls so the information in the request is protected in transit? For my situation, the payload will contain a public IP address that connects back to the local machine (either the actual public IP or a temporary one-time IP in a Docker container). I am not sure if the API requests I have performed have actually performed public-key cryptography on the packets before sending them over the network. (Is AWS_SECRET_ACCESS_KEY actually a private key? Is the encryption as good as TLS?)

@davidkretch
Copy link
Member

The communication between you and AWS should be encrypted transparently using https.

This is set in resolver_endpoint which constructs the URL for the API endpoint:

endpoint <- gsub("^(.+://)?", sprintf("%s://", scheme), endpoint)
. It has optional parameter scheme with default argument "https", but it is only called from one place which never changes the default away from https.

Then httr's VERB handles all the communication with AWS; because the URL specifies https, it should use https to communicate with AWS.

The API key is not used to encrypt traffic though, just to authenticate yourself when making API requests.

@wlandau
Copy link
Author

wlandau commented Oct 23, 2022

Got it, thanks.

And for https, is it possible to make TLS mutually authenticated, or does that involve lower-level setup with AWS and the local machine?

@davidkretch
Copy link
Member

davidkretch commented Oct 23, 2022 via email

@wlandau
Copy link
Author

wlandau commented Oct 23, 2022

Thanks for explaining, David. Sounds like the network security is automatic in both directions.

@wlandau wlandau closed this as completed Oct 23, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants