A pluggable module implementation of Token Binding for the Apache HTTPd web server version 2.4.x.
This module implements the Token Binding protocol as defined in https://github.com/TokenBinding/Internet-Drafts on HTTPs connections setup to mod_ssl
running in an Apache webserver.
It then sets environment variables and headers with the results of that process so that other modules and applications running on top of (or behind) it can use that to bind their tokens and cookies to the so-called Token Binding ID. The environment variables/headers are:
Sec-Provided-Token-Binding-ID
The Provided Token Binding ID that the browser uses towards your Apache server conforming to draft-ietf-tokbind-ttrp-06.Sec-Referred-Token-Binding-ID
The Referred Token Binding ID (if any) that the User Agent used on the "leg" to a remote entity that you federate with conforming to draft-ietf-tokbind-ttrp-06.Sec-Token-Binding-Context
The key parameters negotiated on the Provided Token Binding ID conforming to draft-campbell-tokbind-tls-term-00 (with aSec-
prefix added to the header).TB_SSL_CLIENT_CERT_FINGERPRINT
The base64url-encoded SHA256 hash of the DER representation of the X.509 Client Certificate used on the SSL connection to the server, see https://www.ietf.org/id/draft-ietf-oauth-mtls-12
There’s a sample Dockerfile
under test/docker
to get you to a quick functional server setup with all of the prerequisites listed above. It reverse proxies requests to http://httpbin.org/headers
to show the resulting request headers.
Build and run this container on a Docker-equipped system with ./autogen.sh && ./configure && make docker
and then browse to https://localhost:4433`.
An application running on or behind the Apache server can leverage the environment variable or HTTP headers that mod_token_binding
provides. The hard protocol security bits are dealt with by mod_token_binding
and a trivial 2-step implementation process remains for the application itself. See below for a sample in PHP:
- at session creation time: put the Token Binding ID provided in the environment variable set by mod_token_binding into the session state
$tokenBindingID = apache_getenv('Sec-Provided-Token-Binding-ID');
if (isset($tokenBindingID)) {
$_SESSION['TokenBindingID'] = $tokenBindingID;
}
- on subsequent requests: check the Token Binding ID stored in the session or token against the (current) Token Binding ID provided in an environment variable
if (array_key_exists('TokenBindingID', $_SESSION)) {
$tokenBindingID = apache_getenv('Sec-Provided-Token-Binding-ID');
if ($_SESSION['TokenBindingID'] != tokenBindingID) {
session_abort();
}
}
mod_auth_openidc
Since version 2.3.1 mod_auth_openidc can be configured to use the negotiated environment variables to bind its session (and state) cookie(s) to the TLS connection and to perform OpenID Connect Token Bound Authentication for an ID Token as defined in http://openid.net/specs/openid-connect-token-bound-authentication-1_0.html using its OIDCTokenBindingPolicy
directive as described in https://github.com/zmartzone/mod_auth_openidc/blob/v2.3.5/auth_openidc.conf#L211.
Since version 2.3.9rc5 mod_auth_openidc can be configured to use the TB_SSL_CLIENT_CERT_FINGERPRINT
environment variable to verify that an access token presented to it in OAuth 2.0 Resource Server mode contains a hash of the certificate in the cnf
claim.
- OpenSSL >= 1.1.1 (for extended master secret and unpatched tls extensions resume support)
- HTTPd >= 2.4.26 with mod_ssl (for OpenSSL 1.1.x support)
- Google's Token Bind library
with a patch to expose thegetNegotiatedVersion
function and to use the OpenSSL 1.1.x API for custom extensions: https://github.com/zmartzone/token_bind/tree/openssl-1.1.1
Edit the configuration file for your web server. Depending on your distribution, it may be named '/etc/apache/httpd.conf' or something different.
You need to add a LoadModule directive for mod_token_binding. This will look similar to this:
LoadModule token_binding_module /usr/lib/apache2/modules/mod_token_binding.so
You can then optionally configure mod_token_binding with specific configuration primitives.
For an exhaustive overview of all configuration primitives, see token_binding.conf
in this directory.
That file can also function as an include file for Apache.
For generic questions, see the Wiki pages with Frequently Asked Questions at:
https://github.com/zmartzone/mod_token_binding/wiki
Any questions/issues should go to issues tracker.
For commercial Support contracts, Professional Services, Training and use-case specific support you can contact:
sales@zmartzone.eu
This software is open sourced by ZmartZone IAM. For commercial support you can contact ZmartZone IAM as described above in the Support section.