Welcome to the

DocuSign Blog

Securing Your Connect Webhook Listener

Your DocuSign Line of Business (LOB) application is ready for production. Your colleagues will send out DocuSign signature requests from within the app. Plus, your app shows the status of the signature requests and automatically notifies the back office when a contract is signed.

The status and back office notifications are handled by your app’s DocuSign Connect webhook listener. A listener is a web application with its own URL. The only thing special about a listener is that it never expects to be invoked by a person sitting at a web browser. Instead, it only expects to be called by the DocuSign platform’s Connect system.

How can we assure ourselves that only DocuSign will call our listener (access control) and that the client is guaranteed to be DocuSign (authentication)?

We’ll handle the two problems of access control and authentication by using the security principle of “Defense in Depth.” It’s also called the “Castle Approach,” after the multiple layers of defensive lines and techniques that any good castle is equipped with. (Moats, walls, towers, narrow circular stairs, drawbridges, etc.)

Please note that this post does not offer any guarantees. It only provides an overview of multiple and complex security issues. Your InfoSec group or consultants need to review your servers, networks, firewalls, and related systems.

Connect Webhooks: Everything’s Reversed

Normally, applications are the clients. They initiate requests to the DocuSign platform, the server. But for Connect webhook listeners, everything’s reversed. Your listener will be the server for the status update notifications sent as requests initiated by DocuSign. For the notification messages sent to your listener, DocuSign is the client.

The Moat: Check the Request Characteristics

Since we know the characteristics of the good requests from DocuSign, you should  configure your system to block any requests unless they are:

  • HTTPS requests to the standard port 443. The request’s origin port on the DocuSign system will vary. You can ask DocuSign to use a destination port other than 443 if necessary due to your firewall configuration. Contact DocuSign Customer Service for more information. Requesting DocuSign to use a different port is a process that will take several days to implement. Using a different port doesn’t add security but may be needed depending on your network configuration.
  • POST requests. The Connect service only initiates POST requests.

The Drawbridge: SSL/TLS

SSL/TLS connections encrypt all communications between the client and the server. They protect against Man in the Middle attacks.

DocuSign requires that SSL/TLS be used for Connect listeners in production. I suggest that you also use SSL/TLS during development with demo.docusign.net. In the future TLS will be required for the demo.docusign.net platform too.

Your server’s SSL certificate must be issued by a recognized root certificate authority (CA) to work with DocuSign. Specifically, your SSL certificate’s root CA must be in the Microsoft Trusted Root Certificate program used by DocuSign. A list of the program’s CAs and supported root certificates can be downloaded. The list is updated periodically.

DocuSign validates your listener’s cert. It does not check your listener’s identity. What this means in practice is that your listener’s SSL certificate cannot be self-signed. It must chain upward to a certificate in the Microsoft list. You can use a free SSL certificate from the Let’s Encrypt CA.

The Wall: Authentication and Access Control

There are two options for this part of your defenses. A Connect configuration can use either with DocuSign, but not both:

  • Use Mutual TLS to authenticate the client (DocuSign) and access control to ensure that only DocuSign can reach your listener. I covered Mutual TLS in this blog post.  This defense is implemented at the webserver or load balancer that negotiates the SSL/TLS connection with DocuSign.
  • Configure DocuSign to digitally sign the Connect notification messages. Then your app can verify the signature to assure itself that the message was sent by DocuSign and was not modified since it was sent. We’ll discuss this option in a future blog post.

The Portcullis: Use a Pre-shared Secret

This defense acts both as access control and authentication. The listener URL you provide to DocuSign can include one or more query parameters. DocuSign will include them during its POST request to your listener.

For access control, your listener will first check that the request includes the expected query parameter and reject all requests that don’t. For authentication, your listener will additionally check the value of the query parameter. Remember that you can encode any values for the name and value of the query parameter. For this example, we’re using “pw” as the name of the query parameter.

To use a pre-shared secret, just set the URL accordingly in the Connect configuration. For example, https://listener_url.example.com/listener?pw=secret

Remember that the complete URL, including its query parameters, is encrypted before it is sent across the internet. The URL and its query parameters are visible in various logs and configuration screens, including the Connect webhook configuration page.

Not Recommended: IP Whitelisting

In the 21st century, using Internet Protocol (IP) addresses as a form of authentication is not recommended by security experts. Instead, use Mutual TLS to authenticate DocuSign, your server’s client. Depending on the situation, IP addresses for SAAS services such as DocuSign may need to be changed. Using IP addresses for authentication creates a “brittle” system that will need to be updated if there’s a change.

Installation and Debugging Tips

Just as your defense is layered, it’s a good idea to layer your installation too. Add your defensive layers one by one, checking that they work as expected before adding another layer.

Monitoring

Just as all well-run castles have guards and watchers, you will need the same for your installation. Your system shouldn’t be considered secure unless you have a layered set of monitoring tools plus appropriate automatic and manual responses for different event types.

Load Testing

Depending on your Connect settings, each envelope may generate many different notification messages to your listener. And depending on your envelope volume, that could result in thousands or tens of thousands of notification messages being sent to your server by the DocuSign platform. DocuSign handles millions of messages a day; how many messages can your listener support?

The answer is to conduct some basic load tests of your listener. A blog post by 3Scale includes a useful overview of open source and SAAS load testers that can be used to test your listener.

Summary

Thanks for reading this far! Remember to have your plans and systems checked by your information security department or consultants.

Please let us know your experiences. Write us via apihelp@docusign.com. I’ll be speaking at our MOMENTUM ’17 conference in San Francisco from May 3-4. Developers can attend for free. Learn more and register for MOMENTUM ’17 here.

(Visited 400 times, 1 visits today)

2 Comments

  1. Regarding:
    “Configure DocuSign to digitally sign the Connect notification messages. Then your app can verify the signature to assure itself that the message was sent by DocuSign and was not modified since it was sent. We’ll discuss this option in a future blog post.”

    two questions:
    This option is only available using the SOAP interface?
    The only secure method using HTTPS/XML is mutual auth?

    • Larry Kluger

      February 15, 2017 at 1:47 am

      Re: is the option only available for the SOAP interface?

      I’d say yes and no. On the one hand, to enable the notification messages to be digitally signed, set your Connect configuration to send SOAP-formatted XML as shown below.

      But you do not need to use a SOAP library to process a SOAP XML. Just parse through the XML, ignoring the extra SOAP elements.

      Re: The only secure method using HTTPS/XML is mutual auth?
      You can use any non-SOAP or SOAP software with digitally signed messages.

      To enable digitally signed notification messages:
      1. Disable support for Mutual TLS by unchecking the “Sign Message with X509 Certificate” setting.
      2. Enable the SOAP format for the messages. Note that you do NOT need to use SOAP libraries for the messages. The XML will include additional SOAP elements but your app can skip those elements.
      3. Enable the “Include X509 Certificate in SOAP Header” option.

Leave a Reply

Your email address will not be published.

*