Chilkat Examples

ChilkatHOME.NET Core C#Android™AutoItCC#C++Chilkat2-PythonCkPythonClassic ASPDataFlexDelphi ActiveXDelphi DLLGoJavaLianjaMono C#Node.jsObjective-CPHP ActiveXPHP ExtensionPerlPowerBuilderPowerShellPureBasicRubySQL ServerSwift 2Swift 3,4,5...TclUnicode CUnicode C++VB.NETVBScriptVisual Basic 6.0Visual FoxProXojo Plugin

PHP Extension Examples

Web API Categories

ASN.1
AWS KMS
AWS Misc
Amazon EC2
Amazon Glacier
Amazon S3
Amazon S3 (new)
Amazon SES
Amazon SNS
Amazon SQS
Async
Azure Cloud Storage
Azure Key Vault
Azure Service Bus
Azure Table Service
Base64
Bounced Email
Box
CAdES
CSR
CSV
Certificates
Cloud Signature CSC
Code Signing
Compression
DKIM / DomainKey
DNS
DSA
Diffie-Hellman
Digital Signatures
Dropbox
Dynamics CRM
EBICS
ECC
Ed25519
Email Object
Encryption
FTP
FileAccess
Firebase
GMail REST API
GMail SMTP/IMAP/POP
Geolocation
Google APIs
Google Calendar
Google Cloud SQL
Google Cloud Storage
Google Drive
Google Photos
Google Sheets
Google Tasks
Gzip
HTML-to-XML/Text
HTTP

HTTP Misc
IMAP
JSON
JSON Web Encryption (JWE)
JSON Web Signatures (JWS)
JSON Web Token (JWT)
Java KeyStore (JKS)
MHT / HTML Email
MIME
MS Storage Providers
Microsoft Graph
Misc
NTLM
OAuth1
OAuth2
OIDC
Office365
OneDrive
OpenSSL
Outlook
Outlook Calendar
Outlook Contact
PDF Signatures
PEM
PFX/P12
PKCS11
POP3
PRNG
REST
REST Misc
RSA
SCP
SCard
SFTP
SMTP
SSH
SSH Key
SSH Tunnel
ScMinidriver
Secrets
SharePoint
SharePoint Online
Signing in the Cloud
Socket/SSL/TLS
Spider
Stream
Tar Archive
ULID/UUID
Upload
WebSocket
XAdES
XML
XML Digital Signatures
XMP
Zip
curl
uncategorized

 

 

 

(PHP Extension) HTTP Public Key Pinning

Demonstrates how to specify a TLS pinset that lists the pre-known valid and accepted TLS server certificate public keys. When a TLS pinset is specified, the Chilkat TLS client software will reject TLS connections (inside the TLS handshake) when the server provides a certificate having a public key not listed in the pinset. This makes it possible to reject the connection at the earliest possible time, before any information (such as the HTTP request) has been sent to the server.

What is Pinning?

Pinning is the process of associating a host with their expected X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a pinset. In this case, the advertised identity must match one of the elements in the pinset. A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since preloading the certificate or public key out of band usually means the attacker cannot taint the pin. ..

Beginning in Chilkat v9.5.0.55, TLS public key pinning is implemented by (1) making it possible to easily get the SPKI fingerprint of a certificate, and (2) adding the TlsPinSet property to classes that can establish TLS connections.

Get SPKI Fingerprint using OpenSSL

This example shows how Chilkat can be used to obtain the server's public key SPKI fingerprint. OpenSSL can also get the fingerprint with these two commands (shown for the domain ssllabs.com) :

openssl x509 -noout -in ssllabs.com.pem -pubkey | openssl asn1parse -noout -inform pem -out ssllabs.com.key
openssl dgst -sha256 -binary ssllabs.com.key | openssl enc -base64

Chilkat PHP Downloads

PHP Extension for Windows, Linux, MacOS,
Alpine Linux, Solaris

<?php

// The version number (9_5_0) should match version of the Chilkat extension used, omitting the micro-version number.
// For example, if using Chilkat v9.5.0.48, then include as shown here:
include("chilkat_9_5_0.php");

// This example requires the Chilkat API to have been previously unlocked.
// See Global Unlock Sample for sample code.

$httpA = new CkHttp();

// To do public key pinning, the SPKI fingerprint would be obtained beforehand -- perhaps
// at design time, or possibly at the time of the 1st connection (where the SPKI fingerprint
// is persisted for future use).  Note:  "If the certificate or public key is added upon first
// encounter, you will be using key continuity. Key continuity can fail if the attacker has a 
// privileged position during the first first encounter." 
// See https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning
// sslCert is a CkCert
$sslCert = $httpA->GetServerSslCert('www.ssllabs.com',443);
if ($httpA->get_LastMethodSuccess() == false) {
    print $httpA->lastErrorText() . "\n";
    exit;
}

// The GetSpkiFingerprint method returns the SPKI Fingerprint suitable for use in pinning.
print 'SPKI Fingerprint: ' . $sslCert->getSpkiFingerprint('sha256','base64') . "\n";

// ------------------------------------------------------------------------------------

// At the time of writing this example (on 19-Dec-2015) the sha256/base64 SPKI fingerprint
// for the ssllabs.com server certificate is: xkWf9Qfs1uZi2NcMV3Gdnrz1UF4FNAslzApMTwynaMU=

$httpB = new CkHttp();

// Set the TlsPinSet.  The format of the TlsPinSet string is:
//  "hashAlg, encoding, fingerprint1, fingerprint2, ..."
$httpB->put_TlsPinSet('sha256, base64, xkWf9Qfs1uZi2NcMV3Gdnrz1UF4FNAslzApMTwynaMU=');

// Our object will refuse to communicate with any TLS server where the server's public key
// does not match a pin in the pinset.

// This should be OK (assuming the ssllabs.com server certificate has not changed since
// the time of writing this example).
$html = $httpB->quickGetStr('https://www.ssllabs.com/');
if ($httpB->get_LastMethodSuccess() == false) {
    print $httpB->lastErrorText() . "\n";
    exit;
}

print 'Success.  The HTTP GET worked because the server's certificate had a matching public key.' . "\n";

// This should NOT be OK because owasp.org's server certificate will not have a matching public key.
$html = $httpB->quickGetStr('https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning');
if ($httpB->get_LastMethodSuccess() == false) {
    print 'Good, this connection was rejected...' . "\n";
}
else {
    print 'This was not supposed to happen!' . "\n";
    exit;
}


?>

 

© 2000-2024 Chilkat Software, Inc. All Rights Reserved.