-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unexpected signing algorithm PS512 after the last updates #408
Comments
due to the security flow we are using and tokens are coming from TLS protected servers the signature (or lack thereof) should not affect the security. can you confirm the most recent working version please and if you use manual or auto-configuration? |
I am using the latest version offered. Do you mean automatic/manual? |
I mean which was the last version to not have this error. (does this actually prevent you logging in?) |
the warning (error logigng in?) may be addressed by https://github.com/jenkinsci/oic-auth-plugin/releases/tag/4.388.v4f73328eb_d2c and above. There is still no UI to be able to select a prefered algorithm though. |
I would disagree that this must not be implemented, and you can solve this multiple ways.
If a user wants to restrict the algorithms (using 1 or 2) it would be perfectly valid for them to do so. This is done daily by millions of TLS clients/servers! Just like TLS if the user has said Use X or Y and neither are available things will not work, but that would be an advance option that expects users to actually understand what they are doing option 3 is just a preference, so makes little point to me, if you can fall back to something else (less secure) and you are happy with that, what is the point saying I want X to begin with, you should just allow multiple things and the order of them should be important). |
Jenkins and plugins versions report
Environment
What Operating System are you using (both controller, and any agents involved in the problem)?
RedHat 8+9
Reproduction steps
Expected Results
working login like before
Actual Results
Stracktrace with:
2024-10-02T13:25:41+0200 jenkins[4112324]: com.google.api.client.auth.openidconnect.IdTokenVerifier$VerificationException: Unexpected signing algorithm PS512: expected either RS256 or ES256
2024-10-02T13:25:41+0200 jenkins[4112324]: at PluginClassLoader for oic-auth//com.google.api.client.auth.openidconnect.IdTokenVerifier.verifySignature(IdTokenVerifier.java:329)
2024-10-02T13:25:41+0200 jenkins[4112324]: at PluginClassLoader for oic-auth//com.google.api.client.auth.openidconnect.IdTokenVerifier.verifyOrThrow(IdTokenVerifier.java:284)
2024-10-02T13:25:41+0200 jenkins[4112324]: at PluginClassLoader for oic-auth//org.jenkinsci.plugins.oic.OicJsonWebTokenVerifier.verifyIdToken(OicJsonWebTokenVerifier.java:71)
Anything else?
Both algorithms has security problems. Only for PS512 are nothing problematic known.
The RS suites are potential vulnerable and the ES suites are based on the NIST curves.
See
https://www.scottbrady91.com/jose/jwts-which-signing-algorithm-should-i-use
https://safecurves.cr.yp.to/
Are you interested in contributing a fix?
No response
The text was updated successfully, but these errors were encountered: