-
Notifications
You must be signed in to change notification settings - Fork 475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bumped xml-crypto from 1.5.3 to 2.0.0 #470
Conversation
Patches signature validation bypass using injected HMAC-SHA1 signature
I note that this is a semver major change. Are there any API or behavioral changes that we depend on that were changed? What is more, since our default is HMAC-SHA1, should we change our default, or even deprecate SHA1 (which would be a semver major for us)? |
The Deprecating SHA1 would be ideal, simply because SHA256 is more collision resistant. Therefore, for the long-term, I would recommend using RSA-SHA256 as the signature algorithm, as it is more likely than HMAC-SHA1 to stay supported in the near future. For the short-term, it is possible to upgrade To enable HMAC-SHA1 with |
Shouldn't |
Yes @damien-git , |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- Need to explicitly enable support for SHA1
- Need to update
package-lock.json
- Need to delete
yarn.lock
I'm eager to get this security update out as well, so I'm starting on the changes recommended by @cjbarth now. |
I've pushed package-lock.json / yarn.lock updates. Testing found that I'm going to get some lunch and will release within a couple of hours. |
@cjbarth I may be missing something, but I have not found any explicit setting of HMAC-SHA1 as the default signing algorithm in |
@keiferc It was my mistake. You are correct. |
Patches signature validation bypass using injected HMAC-SHA1 signature. Patch is rolled out in xml-crypto 2.0.0