You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SHA1 is broken, both in theory and in practice. Earlier this year, a team of researchers demonstrated a practical collision attack, producing two different files that hash to the same value: https://shattered.io/
Practical for a state sponsored adversary, and the ability to create an XML document which will have the same signature with a SAML Response that you want to forge is still a couple of years away, but definitely LGTM. Would you care to send us a PR with the default algorithms replaced ?
SHA1 is broken, both in theory and in practice. Earlier this year, a team of researchers demonstrated a practical collision attack, producing two different files that hash to the same value: https://shattered.io/
On the current
master
branch:https://github.com/rohe/pysaml2/blob/9cbbd9bd9f6bfa5e9ceace064dd1af4e2ff2f68c/src/saml2/xmldsig/__init__.py#L23
To fix this, SHA256 should be the default digest algorithm, and RSA-SHA256 the default signing algorithm.
Additionally, SHA1 is used for HMAC purposes, as HMAC-SHA1: https://github.com/rohe/pysaml2/blob/9cbbd9bd9f6bfa5e9ceace064dd1af4e2ff2f68c/src/saml2/xmldsig/__init__.py#L54
While the HMAC construction isn't obviously broken by the SHA1 developments above, it's probably a good idea to switch this to HMAC-SHA256 since there's no downside to simply using a stronger algorithm.
The text was updated successfully, but these errors were encountered: