-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
consider upgrading passport-saml
to 3.x
#288
Comments
We need to understand more about the major change "node-saml separation" and its impact |
@christian-hawk you wrote that Fixed pasport-saml 3.0.0 changelog (node-saml/passport-saml#605) says:
Which is related to issue node-saml/passport-saml#523 (see also node-saml/passport-saml#523 (comment)) BTW. I hope that https://gluu.org/docs/gluu-server/4.2/authn-guide/inbound-saml-passport/ page's picture https://gluu.org/docs/gluu-server/4.2/img/user-authn/passport/saml_provider.png does not implicate that administrator could remove |
@srd90 thanks so much for the contribution.
thanks for that mate.
What you mean here is that you hope we keep Your contribution is really appreciated @srd90 . |
@christian-hawk I don't know whether it was or wasn't already required field (i.e. whether Gluu would refuse to accept configuration without UI screenshot https://gluu.org/docs/gluu-server/4.2/img/user-authn/passport/saml_provider.png gives an impression that one could remove If removal of gluu-passport/server/providers.js Line 119 in c2bc8aa
ends up being executed with providerOptions value which does not contain field cert , e.g.:
const samlStrategy = new Strategy({
entryPoint: 'https://idp.example.com/idp/profile/SAML2/POST/SSO',
identifierFormat: 'urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
authnRequestBinding: 'HTTP-POST',
issuer: 'urn:test:example'
// Notice absence of cert property
}, verify) then there would be major security issue because end users could intercept SAML login response and modify SAML login response assertions (i.e. impersonate anyone) because Disclaimer: |
@srd90 thanks for providing such detailed information. Sorry I didn't checked it out yet, but we will soon, as we need to upgrade as passport-saml is about to release important patch related to
I may be wrong but as far as I know saml specs allow trust relations without signing responses, but I agree that I would never want to accept unsigned responses. |
@christian-hawk maybe I wasn't clear enough because it is not just response level signature checking which is disabled under the conditions communicated above. Assertion level signature checking is also disabled. I.e. in the big picture ”response signature” checking is completely disabled. Did you read node-saml/passport-saml#523 ? Let me highlight few points.
If passport-saml version < 3.0.0 is configured without gluu-passport uses (at the moment) passport-saml version < 3.0.0 and furthermore gluu's admin UI screenshots implicates that one might be able to remove btw. I tried to install gluu stack to check how it behaves when one clicks |
@srd90 thanks again for your rich collaboration on this issue. I haven't read node-saml/passport-saml#523 , thanks for that. Also found node-saml/passport-saml#547 till now.
Yes right now We can start patching passport independently of oxtrust .
It's usually simple, you can |
closed by #332 |
Passport SAML has been updated to 3.x.
Changelog is not clear about the current breaking changes, opened an issue about it: node-saml/passport-saml#597
There is already a PR ( node-saml/passport-saml#605 ) to fix changelog, currently offering the following changes: https://github.com/node-saml/passport-saml/blob/changelog/CHANGELOG.md
On debendabot automatic PR we can see that tests break because
cert
now is required. This is also not specified in their changelog.My suggestion is lower priority in this till breaking changes are clear.
The text was updated successfully, but these errors were encountered: