-
Notifications
You must be signed in to change notification settings - Fork 475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sample configuration for Shibboleth v3 #520
Comments
There's not. You should ask the owner of that IIS server to check their logs and see why it's returning a 400 error. |
After few days (even nights!) I came out with this configuration that seems to be working fine with Shibbolet v3.4.6:
I do hope this will help someone else facing the same issue. |
I would suggest that you create a PR with an adjustment to the readme file following this example. |
@giacomobartoli based on infromation at the pictures you posted in the first message situation seemed/seems to be that
So I would have said that
In fact your followup post does not rule out aforementioned scenario because that post is basically just (insecure) vanilla passport-saml configuration without information of IdP side endpoints. Why is it insecure?
and passport-saml/src/passport-saml/saml.ts Lines 1187 to 1203 in 932da9d
So authentication response message could be used multiple times and even after Configuration lacks other checks also, like validateInResponseTo, audience etc. BTW. you had obscured information (domain name) from images you had attached to first post. Maybe due security reasons(?) but you did not obscure image which contains SAMLRequest query param value as-is. Content of that query parameter is just deflated+base64 encoded XML string(*) and it would be trivial to extract obscured domain from information provided at that image (assuming that image is from same samltracer message as other images). (*) see passport-saml/src/passport-saml/saml.ts Lines 495 to 500 in 932da9d
and passport-saml/src/passport-saml/saml.ts Line 464 in 932da9d
|
@srd90 you're right. To make it work I had to change the binding request from HTTP-POST to HTTP-REDIRECT and I have already changed the acceptedClockSkewMs flag. Let's say that at the beginning I just tried to make it work, even by attempts. Then I improved the configuration gradually.. step by step. For sure, my PR wouldn't incluse those mistakes. However, I must admit I was not aware of the queryParam request (taken from SAML tracer plugin) would reveal the original data since it is made by the XML original string (base64 and deflated). So.. thank you for the information :-) |
Very helpful @srd90 ! |
The reason why I rushed to comment Another reason for rushing was that there is/was danger that someone finds @giacomobartoli 's configuration set and does not try to understand side-effects of copy pasting those values as-is into somewhere. It seems that unsecure configuration set has been reused: brenapp/cu-smart-native@8cee0e0 Based on commit comment the config values were taken as if those are THE way to use Shibboleth IdP (ping @MayorMonty consider changing at least accepted clock skew value to >= 0 and enable audience verification ). Reason for adding this comment to this issue is to ”provide learning experience” how it is bad idea to copy paste security related stuff without understanding what is being copied. In this particular case one project turned off |
Is there any sample config for using passport-saml with Shibboleth?
I tried all possible combinations with passport-saml but I keep running into error 400 bad request.
This is my request according to SAML tracer plugin:
And this is the response:
The text was updated successfully, but these errors were encountered: