Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support ECDSA #153

Open
d4l3k opened this issue Jun 5, 2018 · 8 comments
Open

Support ECDSA #153

d4l3k opened this issue Jun 5, 2018 · 8 comments

Comments

@d4l3k
Copy link

d4l3k commented Jun 5, 2018

It'd be really nice if this library supported ECDSA keys in addition to just RSA.

My application already has certificate infrastructure using Let's encrypt, but the keys are all ECDSA which makes it a pain to use this library.

The SAML spec supports ECDSA. I'm not sure how official https://kantarainitiative.github.io/SAMLprofiles/fedinterop.html is, but it states that SAML implementations should support ECDSA.

@crewjam
Copy link
Owner

crewjam commented Nov 1, 2019

sounds good, I don't know how many IDPs/SPs actually support ECDSA. I think we'd want some examples to get started. :)

@ZackaryWelch
Copy link

Want to call for support for this again. Would be nice to have a variety of different key types supported.

@john-floren-gravwell
Copy link

We've recently run into this ourselves. Curious if anyone's experimented with it or if it's firmly in "do it yourself if you want it so badly" territory?

@crewjam
Copy link
Owner

crewjam commented Apr 3, 2023

A PR for ECDSA support would be welcome. :)

@crewjam
Copy link
Owner

crewjam commented Apr 3, 2023

Also #503 might be relevant, although I haven't had a chance to review it yet.

@mdwn
Copy link
Contributor

mdwn commented Apr 4, 2023

russellhaering/goxmldsig#89, which is pulled in by #503, supports ECDSA. So this should be covered once the PR is in.

@mdwn
Copy link
Contributor

mdwn commented Apr 20, 2023

@d4l3k @ZackaryWelch @john-floren-gravwell Hey all, #503 is in which supports ECDSA. I imagine this can be closed.

@john-floren-gravwell
Copy link

Finally got around to looking at it (tempus fugit) but it looks like #503 is for the IdP code, not the SP code.

We had the following issue: samlsp.Options expects a Key field, a *rsa.PrivateKey, to sign requests. Up until now we've just been grabbing the RSA private key from the SP's TLS cert... but if you generate ECDSA certs instead, you're out of luck!

Is there a way to make the service provider code work with ECDSA that I'm just overlooking, or will this require another PR?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants