In order for instances to verify each other's identity, a weak authentication mechanism is used, based on a simple DNS dialback negotiation. The process goes roughly like this:
auth
endpoint listed in its instance metadataNote that the dialback process is unidirectional, meaning that it only verifies identity for one of the two instances (A in this example) and must be repeated in the other direction if needed.
Step 1. A sends a GET request to B's auth
endpoint with the query parameters phase=dialback
and target=<endpoint>
, where <endpoint>
is A's own dialback receiver endpoint. B does not need to send any response.
Step 2. B sends a POST request to the endpoint given by A in step 1, with the request body set to the application/x-www-form-urlencoded
form data parameters origin=<host>
and secret=<secret>
, where <host>
is B's hostname (including port number after a colon if needed) and <secret>
is a cryptographically secure random string. A does not need to send any response.
Step 3. A, now knowing the secret given by B in step 2, sends another GET request to B's auth
endpoint, this time with the query parameters phase=token
and secret=<secret>
. B responds with the JSON encoded data {“token”: “<token>”, “expires”: “<expiry>”}
, where <token>
is a new cryptographically secure random string and <expiry>
is an ISO 8601 formatted timestamp for when the token will expire (indicating that A should refresh the token before this point).
todo: refreshing? errors? authenticated requests?