Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure/obsolete default signature algorithm #415

Open
simongellis-attentive opened this issue Feb 20, 2024 · 1 comment
Open

Insecure/obsolete default signature algorithm #415

simongellis-attentive opened this issue Feb 20, 2024 · 1 comment

Comments

@simongellis-attentive
Copy link

If you don't provide a value for onelogin.saml2.security.signature_algorithm, this library defaults to signing requests with RSA-SHA1.

SHA-1 as a signature algorithm is obsolete. Wikipedia says that it is

recommended to remove SHA-1 from products as soon as possible and instead use SHA-2 or SHA-3. Replacing SHA-1 is urgent where it is used for digital signatures.

It would probably make more sense to default to SHA-256 instead.

@haavar
Copy link

haavar commented Feb 22, 2024

I agree this is problematic. I think the defaults should change. I discovered that our configuration signed the authN requests with SHA1, and it seems like ADFS will need to sign the authN response with SHA1 when the request is signed with SHA1.

I think the default should also change to not allow SHA1 signatures in the response. Someone spoofing a response worries me more than someone spoofing a request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants