Package: libxmltooling1
Version: 1.0-2+lenny1
Severity: grave

Hi,

(elevated severity because of unrelated breakage in a security update)

libxmltooling 1.0-2+lenny1 security upgrade breaks Shibboleth SPs for IdPs
which have use="signing" in their IDPSSODescriptor's KeyDescriptor.

I've verified that with Shibboleth 1.3 and Shibboleth 2.1.3 IdPs, both with
PKIX and Inline keys. All the tests are being done in the Greek Research and
Technology Network (GRNET)'s federation[1]. You can see the metadata here[2].

1: http://aai.grnet.gr/
2: http://aai.grnet.gr/metadata.xml

Downgrading the package to 1.0-2 and restarting shibd fixes the problem.
Removing use="signing" from the KeyDescriptor also fixes it, but replacing it
with use="encryption" isn't (and shouldn't?). AttributeAuthorityDescriptor's
KeyDescriptor seems to be irrelevant.

I think the problem is in the following change:
   * SECURITY: Correctly honor the "use" attribute of <KeyDescriptor> SAML
     metadata to honor restrictions to signing or encryption.  This is a
     partial fix; the complete fix also requires a new version of the
     OpenSAML library.
(i.e. the getCredentialContext -> getCredentalContext)

This is backported from upstream's latest version but I haven't tested a
squeeze SP installation (and it's hard to).

I can, however, temporarily add you in a federation along with IdPs that
present the problem and also provide you demo credentials for them.

The debug log in both cases is:

bad:
----
XMLTooling.TrustEngine.ExplicitKey [1]: unable to validate signature, no 
credentials available from peer
XMLTooling.TrustEngine.PKIX [1]: validating signature using certificate from 
within the signature
XMLTooling.TrustEngine.PKIX [1]: signature verified with key inside signature, 
attempting certificate validation...
XMLTooling.TrustEngine.PKIX [1]: checking that the certificate name is 
acceptable
XMLTooling.TrustEngine.PKIX [1]: certificate subject: CN=a.host.name,O=Greek 
Research and Technology Network,C=GR
XMLTooling.TrustEngine.PKIX [1]: unable to match DN, trying TLS subjectAltName 
match
XMLTooling.TrustEngine.PKIX [1]: unable to match subjectAltName, trying TLS CN 
match
XMLTooling.TrustEngine.PKIX [1]: certificate name was not acceptable

good:
-----
OpenSAML.SecurityPolicyRule.XMLSigning [3]: validating signature profile
XMLTooling.KeyInfoResolver.Inline [3]: resolved 0 certificate(s)
XMLTooling.TrustEngine.ExplicitKey [3]: attempting to validate signature with 
the peer's credentials
XMLTooling.TrustEngine.ExplicitKey [3]: public key did not validate signature: 
Credential did not contain a verification key.
XMLTooling.TrustEngine.ExplicitKey [3]: no peer credentials validated the 
signature
XMLTooling.TrustEngine.PKIX [3]: validating signature using certificate from 
within the signature
XMLTooling.TrustEngine.PKIX [3]: signature verified with key inside signature, 
attempting certificate validation...
XMLTooling.TrustEngine.PKIX [3]: checking that the certificate name is 
acceptable
XMLTooling.TrustEngine.PKIX [3]: certificate subject: CN=a.host.name,O=Greek 
Research and Technology Network,C=GR
XMLTooling.TrustEngine.PKIX [3]: unable to match DN, trying TLS subjectAltName 
match
XMLTooling.TrustEngine.PKIX [3]: matched DNS/URI subjectAltName to a key name 
(a.host.name)
XMLTooling.TrustEngine.PKIX [3]: performing certificate path validation...

Thanks,
Faidon



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to