-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1400
      Shibboleth Identity Provider Security Advisory [13 August 2014]
                              15 August 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Shibboleth Identity Provider
Publisher:         Shibboleth
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Privileged Data         -- Remote with User Interaction
                   Provide Misleading Information -- Remote with User Interaction
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://shibboleth.net/community/advisories/secadv_20140813.txt

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Shibboleth Identity Provider Security Advisory [13 August 2014]

HTTPS Connections Via HTTP Resources Do Not Perform Hostname Verification
=========================================================================

The HttpResource and FileBackedHttpResource implementations in OpenSAML
and the IdP make use of the Jakarta Commons HttpClient version 3.x. When
used with an HTTPS scheme, HttpClient by default does not perform
verification of the server hostname against the server's X.509 certificate.
The lack of hostname verification means that while the connection between
the client and HTTPS server is encrypted, the client has no way to verify
it's actually communicating with the appropriate HTTPS server hosting the
resource data.

In the IdP, HttpResource and FileBackedHttpResource might commonly be used
within service.xml to enable fetching of remote configuration resources
for services from an HTTP server. They might less commonly be used in
relying-party.xml in conjunction with a ResourceBackedMetadataProvider.


Affected Versions
=================

Versions of the Identity Provider < 2.4.1

Versions of OpenSAML Java < 2.6.2


Recommendations
===============
IdP users: Upgrade to IdP 2.4.1 or greater, which globally configures
an appropriate hostname verifier for use with HttpClient. If this is
not feasible, and the only use of these resource types is with a
ResourceBackedMetadataProvider, then consider replacing the latter
with either a HTTPMetadataProvider or FileBackedHTTPMetadataProvider.

OpenSAML users: Upgrade to OpenSAML Java 2.6.2 or greater, which
globally configures an appropriate hostname verifier for use with
HttpClient.  If this is not feasible, it is also possible to replicate
in your own code the registration of the appropriate hostname-verifying
socket factory added in 2.6.2. See the HttpClient 3.x web site,
or contact the Shibboleth developer list for details.

Note that in IdP v2.4.0 and above, use of the HTTP metadata provider
configuration option 'disregardSslCertificate' will globally disable
HttpClient hostname verification as well as TLS certificate trust
evaluation. This would include the HttpResource hostname verification
being added in the 2.4.1 release.  This is a limitation caused by API
issues with HttpClient 3.x, and will be addressed in the 3.x version
of the Identity Provider. See the following related security advisory:
http://shibboleth.net/community/advisories/secadv_20130417.txt


Credits
=======
Kaspar Brand, SWITCH


URL for this Security Advisory
http://shibboleth.net/community/advisories/secadv_20140813.txt

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=20Eq
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ybre
-----END PGP SIGNATURE-----