Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate if we can move away from SHA1 #18

Open
3 tasks
sergei-maertens opened this issue Oct 27, 2022 · 0 comments
Open
3 tasks

Investigate if we can move away from SHA1 #18

sergei-maertens opened this issue Oct 27, 2022 · 0 comments

Comments

@sergei-maertens
Copy link
Member

Currently the default values for digest and signing algorithms are SHA1 and RSA_SHA1 (respectively). SHA1 however is deprecated (I suspect due to potential for hash collisions) and we'd like to use SHA256 or better as default value to encourage an acceptable secure default configuration.

However, there appears to be a SHA1 algo hardcoded somewhere in the python3-saml library for the single-logout flow that breaks using other algorithms than SHA1 based ones.

Tasks

  • Trace down hardcoded algorithm in python3-saml (we can do this in our fork)
  • See if we can parametrize or fix this
  • Make SHA256 the default values
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant