Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Flag to disable disallowAlg http://www.w3.org/2000/09/xmldsig#rsa-sha1 #92

Closed
nodesocket opened this issue Jan 12, 2023 · 8 comments
Closed

Comments

@nodesocket
Copy link

Due to upgrading to the latest version of FusionAuth 1.42.0, this following issue affects us and our end users. FusionAuth/fusionauth-site#1202

Is there a Helm flag to disable disallowAlg http://www.w3.org/2000/09/xmldsig#rsa-sha1? We need a automated way of making this change to support our legacy SAML customers.

@mooreds
Copy link
Contributor

mooreds commented Jan 12, 2023

I thought that as of version 1.42.0 we used an image that enables that rsa-sha1 algorithm. That is what FusionAuth/fusionauth-issues#1814 was about, and that landed in 1.37.

Just so I'm clear, @nodesocket , you are trying to use the standard FusionAuth docker image, verison 1.42.0, which you are finding doesn't allow your users to use the rsa-sha1 algorithm?

@nodesocket
Copy link
Author

@mooreds thanks for the reply. I did not realize that the image should already manually enable rsa-sha1. We will verify, thanks.

@mooreds
Copy link
Contributor

mooreds commented Jan 17, 2023

Great, let us know.

@mysterio21
Copy link

We are facing this issue with the hosted version, is there a way to enable it for legacy SAML providers on the fusionauth hosted service?

@mooreds
Copy link
Contributor

mooreds commented Mar 11, 2023

@mysterio21 are you saying you are using FusionAuth cloud and need this behavior? If so, please file a support ticket: https://account.fusionauth.io/account/support/ asking for this. Please include the version of FusionAuth you are running, and feel free to reference this issue.

If you are saying something else and I am misunderstanding, please explain further.

@mysterio21
Copy link

@mooreds - That is correct. We have just created a ticket in the support.

FusionAuth™ version 1.43.0

@robotdan
Copy link
Member

Related

I believe the Java XML sig library is enabling secure validation by default which disables this alg. Java is really trying to keep us from using this algorithm. Why this is still in use.. I have no idea. 🤷

Needs some investigation, will likely work it via the above linked GH issue.

@robotdan
Copy link
Member

Closing. This is a FusionAuth configuration issue, that will be addressed via FusionAuth/fusionauth-issues#2160.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants