Replies: 6 comments 4 replies
-
The DSA is not disabled by default and you should see it when you run './configure' . However you might have run into another potential security problem that I wanted to fix for a while and finally fixed recently. This change breaks API/ABI for obvious reasons and I wanted to do as many of the breaking changes at once as possible:
(see notes) |
Beta Was this translation helpful? Give feedback.
-
Thanks, I will check that.
Timothy Legge
***@***.***
***@***.***
…On Mon, Feb 27, 2023 at 12:53 AM lsh123 ***@***.***> wrote:
The DSA is not disabled by default and you should see it when you run
'./configure' . However you might have run into another potential security
problem that I wanted to fix for a while and finally fixed recently. This
change breaks API/ABI for obvious reasons and I wanted to do as many of the
breaking changes at once as possible:
- (API breaking change) Changed the key search to strict mode: only
keys referenced by KeyInfo are used. To restore the old "lax" mode set
XMLSEC_KEYINFO_FLAGS_LAX_KEY_SEARCH flag on xmlSecKeyInfoCtx or use
'--lax-key-search' option for XMLSec command line utility.
(see notes
<https://github.com/lsh123/xmlsec/blob/6e197072ee8355542a70404e660abc1a50f9dc45/docs/index.html#L82>
)
—
Reply to this email directly, view it on GitHub
<#556 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAH3N64WJMJTN323O324HF3WZQXNXANCNFSM6AAAAAAVI3WYPU>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Hi @lsh123 I found the issue: seems to cause my issue. xmlsec/src/openssl/signatures.c Line 847 in d3dda5d gets the size from the structure ctx but xmlsec/src/openssl/signatures.c Line 258 in d3dda5d If SHA_256 is enabled it overwrites the signature size for SHA1 40 with 64 (SHA256) This is incorrect since the size of the signature needed here depends on the size of the signature algorithm signature not whether one of the signatures are enabled. xmlsec/src/openssl/signatures.c Line 258 in d3dda5d Changing the following fixes my issue but is obviously incorrect. The signature size is depended on the algorithm
|
Beta Was this translation helpful? Give feedback.
-
Sorry this doesn't sound right... the code looks like this:
I.e. it is setting expected output length based on the transform (algorithm) that was used. This hints strongly that you are using DSA with SHA256 in the XML file. BTW, there are tests for both DSA-SHA1 and DSA-SHA256 in the xmlsec/tests/ folder and it all works correctly when both are enabled. |
Beta Was this translation helpful? Give feedback.
-
Hi
Yes, it was added mostly because it was not difficult to add and for
completeness. Not really something anyone should be using at this point.
Tim
Timothy Legge
***@***.***
***@***.***
…On Tue, Feb 28, 2023 at 10:08 AM lsh123 ***@***.***> wrote:
Glad you found it. While it's definitely more secure, DSA-SHA256 is not
very common and you might run into interoperability problems with other
systems.
—
Reply to this email directly, view it on GitHub
<#556 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAH3N6ZNDWYJBYXGHIW3PLTWZYBHRANCNFSM6AAAAAAVI3WYPU>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Hi
You make a valid point :-)
Timothy Legge
***@***.***
***@***.***
…On Tue, Feb 28, 2023 at 11:58 AM lsh123 ***@***.***> wrote:
"I changed the default signing algorithm in XML::Sig to sha256"
I was referring to making it default :)
—
Reply to this email directly, view it on GitHub
<#556 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAH3N6YDKO7OLENZAVVC2SDWZYODXANCNFSM6AAAAAAVI3WYPU>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
I seem to remember seeing something about DSA keys being disabled by default. Is that correct?
The latest compiled from the repo does not seem to support them any more. I realise they are not secure but being able to verify or decrypt was useful.
Beta Was this translation helpful? Give feedback.
All reactions