Does transmitting short, predictable plaintext along with the HMAC signature of that text present a security risk

In order to allow clients to verify responses originating from our server, we are generating an HMAC signature of the body and a timestamp, and attaching it as a header. The timestamp is also attached as a header. Clients will concatenate … Continue reading Does transmitting short, predictable plaintext along with the HMAC signature of that text present a security risk

I am signing (HMAC) outgoing webhooks to allow users to verify their source, should I also sign outgoing responses?

To allow api users to verify the authenticity of outgoing webhooks, I am using a similar model to slack:

Concatenate timestamp and body, HMAC with pre-shared key, add timestamp and HMAC digest to headers.
Recipient does the same, and com… Continue reading I am signing (HMAC) outgoing webhooks to allow users to verify their source, should I also sign outgoing responses?