Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable pkcs 1.5 #775

Closed
thalman opened this issue Apr 5, 2024 · 2 comments
Closed

Disable pkcs 1.5 #775

thalman opened this issue Apr 5, 2024 · 2 comments

Comments

@thalman
Copy link

thalman commented Apr 5, 2024

In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 v1.5 padding allowed an adaptive-chosen ciphertext attack; this attack fully breaks the confidentiality of TLS when used with RSA encryption. In 2018, Hanno Böck, Juraj Somorovsky, and Craig Young have shown 19 years later that many internet servers were still vulnerable to slight variations of the original attack.

After all these years it is shown that many implementation that thought to be fixed are still vulnerable. Red Hat security team recommends to disable support for this methods.

It should be of course fixed or disabled in used crypto libraries (e. g. openssl, gnutls...) but there are scenarios when it is not easy or possible to update those libraries and it will be beneficial to the users to prohibit it in xmlsec too.

@tomato42
Copy link

tomato42 commented Apr 5, 2024

While I haven't tested xmlsec specifically, there's a very long list of implementations that turned out to be vulnerable.

@lsh123
Copy link
Owner

lsh123 commented Apr 13, 2024

Added options to disable PKCS 1.5 at compile time (see PR #781).

@lsh123 lsh123 closed this as completed Apr 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants