Skip to content

Bugfix: Continue unencrypted if no encryption key is available#2204

Closed
tvdijen wants to merge 1 commit intomasterfrom
bugfix/encrypted-assertions
Closed

Bugfix: Continue unencrypted if no encryption key is available#2204
tvdijen wants to merge 1 commit intomasterfrom
bugfix/encrypted-assertions

Conversation

@tvdijen
Copy link
Copy Markdown
Member

@tvdijen tvdijen commented Aug 13, 2024

See: https://groups.google.com/g/simplesamlphp/c/PVX0f99OJqg

We can set assertion.encrypted all we want on our IdP-side, but if the SP doesn't provide a key it's useless. Instead of failing the hard way, see if the SP is willing to accept an unencrypted assertion.

Alternative: add another configuration flag that enforces the use of encryption. This could be a more generic flag to enforce SAML2INT compliance.

@tvdijen tvdijen requested a review from thijskh August 13, 2024 07:47
@thijskh
Copy link
Copy Markdown
Member

thijskh commented Aug 13, 2024

I'm not such a fan of silent fallthrough to unencrypted. If the user explicitly set encryption on in the config, it would violate the principle of least surprise that attribute values are revealed if metadata is missing a required cert. I think the fail safe approach is that if encryption is explicitly requested but not possible, to give a clear error and not not encrypt things the user wanted encrypted.

The suggested optionalEncryption approach in the linked mail thread sounds like a much safer approach and keeps the ability for admins to indicate whether they always want their data to be encrypted, or if they just want opportunistic encryption.

@tvdijen tvdijen closed this Aug 13, 2024
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 12, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants