When Kindly sends data to external services (e.g. when triggering a webhook to a service owned by you), the payload will be authenticated with a hash-based message authentication code (HMAC).
The key used to create the HMAC is a shared secret, and you verify it by running the algorithm yourself with the payload and the key to re-create the HMAC.
This verifies that the sender of the message knows the secret key.
Secret key
The secret key used in the algorithm depends on which kind of request is being sent, and you can find your keys in the Kindly web interface.
If you suspect that the key might have been compromised, you can revoke it and issue a new key in the web interface.
Algorithm
The HMAC is created with the HMAC_SHA256 algorithm, then encoded in base 64.
The HMAC is attached to the request in the Kindly-HMAC header. You should also read the value of the Kindly-HMAC-algorithm request header and verify that it matches HMAC-SHA-256 (base64 encoded). If it becomes necessary to change the algorithm in the future, this value will change to let you know.
Verifying a HMAC-SHA256-value should be quite simple by using a crypto library in your preferred language.
JS/Node example
constCryptoJS=require('crypto-js');functionverifyHmac( receivedHmac,// received in Kindly-HMAC request header dataString,// received in request body (stringified JSON) key // shared secret, known by your service) {constgeneratedHmac=CryptoJS.HmacSHA256(dataString, key);constgeneratedHmacBase64=CryptoJS.enc.Base64.stringify(generatedHmac);return generatedHmacBase64 === receivedHmac;}// test the functionconstreceivedHmac="uEeD0Q7eW9btdx6LFvvlpwkzQBWdbknsQkg1C27Cx7Q=";constdataString='{"foo":1,"bar":2}';constkey="examplekey";if (!verifyHmac(receivedHmac, dataString, key)) {thrownewError("HMAC did not authenticate");}
Python example
The hashing algorithm works on bytes, so we make sure to do any necessary conversions from unicode str to bytes.
import base64import hashlibimport hmacdefverify_kindly_hmac(headers:dict,request_data:bytes,secret_key:str):# Note: HTTP headers are case insensitive alg = headers.get('kindly-hmac-algorithm') mac = headers.get('kindly-hmac')ifnot (alg and mac):print("HMAC was not provided")returnFalseif alg !="HMAC-SHA-256 (base64 encoded)":print("Unexpected HMAC algorithm")returnFalse msg = request_data key = secret_key.encode('utf-8') received_hmac_b64 = mac.encode('utf-8') generated_hmac = hmac.new(key=key, msg=msg, digestmod=hashlib.sha256).digest() generated_hmac_b64 = base64.b64encode(generated_hmac) match = hmac.compare_digest(received_hmac_b64, generated_hmac_b64)ifnot match:print('HMACs did not match: {}{}'.format(received_hmac_b64, generated_hmac_b64))returnFalsereturnTrue