Why should someone block all methods other than GET and POST in a RESTful application?

TL;DR:
Is there a valid reason to demand a software vendor to stop using HTTP PUT and DELETE methods in a web application and use only GET and POST? The application uses frameworks to whitelist allowed request paths and methods.
In other w… Continue reading Why should someone block all methods other than GET and POST in a RESTful application?

How can I secure a REST service intended to be used by my customers’ customers via their public website?

I am developing a service with an associated REST API for customers (companies which have their own websites) to use. In other words, one of my customers would typically make the REST call directly from their website (i.e. t… Continue reading How can I secure a REST service intended to be used by my customers’ customers via their public website?

Bloom filter to prevent replay attacks in signed HTTP requests

I’m thinking about an authentication sheme of a REST API in a setting where the only thing the server stores about a client, is their public key (the asymmetric encryption scheme should not matter). So I’ve come up with a scheme where the … Continue reading Bloom filter to prevent replay attacks in signed HTTP requests

Are REST Authentication schemes that expose shared key protected against reverse proxies acting as bad user agents?

Recently a situation arose where a client wants a public API that doesn’t require registration or login by the user (no password). The security team has identified that the server-side API needs to implement an authentication… Continue reading Are REST Authentication schemes that expose shared key protected against reverse proxies acting as bad user agents?