-
Notifications
You must be signed in to change notification settings - Fork 436
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AuthnRequest sent via HTTP-Redirect is signed twice (embedded and detached) #819
Comments
hello @vladimir-mencl-eresearch, quick notes on the subject
Those split the sign flag into |
Hi @c00kiemon5ter , Thanks for the reply. And thanks for the points to I'll try tackling this in SATOSA. Enjoy your holiday! Cheers, |
Fixes IdentityPython#819 (again) The prepare_for_negotiated_authenticate method has sign parameter defaulting to None. The logic setting sign_redirect and sign_post does not properly handle the three-state aspects that sign has with None mixed True and False. Python evalutes `None and <any value>` as None, so as a result, None gets passed forboth sign_redirect and sign_post. However, None is interpreted by Entity._message as "sign if self.should_sign". As a result, for Redirect binding, the authentication request gets signed both in XML and in HTTP parameter (recurrence of IdentityPython#819). Fix this by passing an explicit False for exactly one of the branches (sign_post for REDIRECT binding and sign_redirect for all other bindings), passing through value of `sign` for the other branch.
Code Version
7.0.1
Expected Behavior
With saml2_backend.yaml
config.sp_config.services.sp.authn_requests_signed
set to True, an AuthnRequest should get signed only with a detached signature inhttp_redirect_message
.Current Behavior
An AuthnRequest gets signed with an embedded signature in entity.py
_message
, and also gets a detached signature inhttp_redirect_message
.Possible Solution
The Entity
_message
method looks at thesign
parameter andshould_sign
attribute - and when in determines the message should be sign, it creates an embedded XML signature.While this is the right thing for the general case, it is not suitable for messages sent over
BINDING_HTTP_REDIRECT
(binding urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
), as they get a detached signature.I thought about solving this in
client_base.py
create_authn_request
by settingsign=False
if the binding isBINDING_HTTP_REDIRECT
- but this method is actually NOT receiving the binding the current call runs over, it only gets the binding the response should be sent over.One option would be to change the signature of
create_authn_request
to also accept current_binding as a named parameter - and suppress signing based on that.I have been able to force the correct behaviour in SATOSA directly by changing satosa.backends.saml2
authn_request
to supress signing of the AuthnRequest message object for Redirect binding:... but I think it should be solved in pysaml2.
Your toughts, @c00kiemon5ter ?
Cheers,
Vlad
Steps to Reproduce
authn_requests_signed = true
).The text was updated successfully, but these errors were encountered: