View Issue Details

IDProjectCategoryView StatusLast Update
0006767SymmetricDS ProImprovementpublic2025-04-04 15:30
Reporteremiller Assigned Toemiller  
Prioritynormal 
Status closedResolutionfixed 
Product Version3.16.0 
Target Version3.16.1Fixed in Version3.16.1 
Summary0006767: Sign SAML requests with SHA-256 instead of SHA-1
DescriptionThere's an open issue with the SAML library that SymmetricDS uses where it defaults to signing requests with SHA-1, which is an obsolete signature algorithm:

https://github.com/SAML-Toolkits/java-saml/issues/415

Some identity providers require a newer signature algorithm and will return a response of "urn:oasis:names:tc:SAML:2.0:status:Responder" if the request is signed with SHA-1, causing the SAML login to fail. Change the signature algorithm to SHA-256, which is not obsolete.
Tagssecurity

Relationships

related to 0006766 closedemiller Sign SAML requests with SHA-256 instead of SHA-1 

Activities

pbelov

2025-04-04 15:30

manager   ~0002775

Included in the 3.16.1 release

Issue History

Date Modified Username Field Change
2025-03-17 16:42 emiller New Issue
2025-03-17 16:42 emiller Status new => assigned
2025-03-17 16:42 emiller Assigned To => emiller
2025-03-17 16:42 emiller Tag Attached: security
2025-03-17 16:42 emiller Issue generated from: 0006766
2025-03-17 16:42 emiller Relationship added related to 0006766
2025-03-17 17:10 emiller Status assigned => resolved
2025-03-17 17:10 emiller Resolution open => fixed
2025-03-17 17:10 emiller Fixed in Version => 3.16.1
2025-04-04 15:30 pbelov Note Added: 0002775
2025-04-04 15:30 pbelov Status resolved => closed