Skip to content

Commit

Permalink
deploy: 25f9042
Browse files Browse the repository at this point in the history
  • Loading branch information
tvdijen committed Jun 3, 2024
1 parent 06c1636 commit 8283816
Show file tree
Hide file tree
Showing 2 changed files with 45 additions and 0 deletions.
41 changes: 41 additions & 0 deletions contrib_modules/negotiate/negotiate.html
Original file line number Diff line number Diff line change
Expand Up @@ -180,6 +180,7 @@ <h2 id="negotiatenegotiate">
<span class="x"> 'realms' =&gt; [</span>
<span class="x"> '*' =&gt; 'ldap',</span>
<span class="x"> ],</span>
<span class="x"> 'allowedCertificateHashes' =&gt; [],</span>
<span class="x"> 'fallback' =&gt; 'crypto-hash',</span>
<span class="x"> 'spn' =&gt; null,</span>
<span class="x">],</span>
Expand Down Expand Up @@ -333,6 +334,46 @@ <h3 id="enablingdisabling-negotiate-from-a-web-browser">
The help text in the JSON files should be locally overwritten to fully
explain which clients are accepted by Negotiate.
</p>
<h3 id="channel-binding">
Channel binding
</h3>
<p>
A shortage of Kerberos-over-HTTP is that there are no distinguished SPN's for HTTP- and HTTPS-services
<a href="https://techcommunity.microsoft.com/t5/iis-support-blog/how-to-use-spns-when-you-configure-web-applications-thatare/ba-p/324648">
1
</a>
.
This means that a ticket that's being transmitted over an insecure HTTP-connection can also be used for
HTTPS-connections to the same host. Besides this, Kerberos is also known to be vulnerable for MitM-attacks
where the service-label of the SPN can be altered when an alternative service is available on the same host
<a href="https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html">
2
</a>
.
</p>
<p>
To prevent this, certificate-based channel binding is supported by this module as of version v1.1.6.
Syntax for this is:
</p>
<div class="highlight">
<pre><span></span><code><span class="x">'enforceChannelBinding' =&gt; true,</span>
<span class="x">'allowedCertificateHashes' =&gt; [&lt;SHA-256 finterprint 1&gt;, &lt;SHA-256 fingerprint 2&gt;],</span>
</code></pre>
</div>
<p>
Usually this array will contain just the one fingerprint for the current HTTPS-certificate of this IdP, but multiple can be
used in a certificate-rollover situation.
If the
<code>
enforceChannelBinding
</code>
setting is set to
<code>
true
</code>
, clients that do not provide binding-info will automatically be sent
to the fallback authsource.
</p>
<h3 id="logoutlogin-loop-and-reauthenticating">
Logout/Login loop and reauthenticating
</h3>
Expand Down
4 changes: 4 additions & 0 deletions devel/simplesamlphp-upgrade-notes-2.0.html
Original file line number Diff line number Diff line change
Expand Up @@ -142,6 +142,10 @@ <h2 id="functional-changes">
a real value manually. Dynamic records are no longer loaded from the database. See the "Upgrading and EntityIDs"
section at the end of the document for more information.
</li>
<li>
EntityIDs are now checked for validity in accordance to SAML 2.0 Core specification, section 8.3.6 Entity Identifier:
"... The syntax of such an identifier is a URI of not more than 1024 characters in length."
</li>
<li>
Modules must be enabled through the
<code>
Expand Down

0 comments on commit 8283816

Please sign in to comment.