-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCSP feature only supports SHA1 hashes #4595
Comments
I was not able to find relevant conversation on why we only support SHA1 for What is cert_id used for?The How it is used:Relevant code here
Impact of compromised
|
I synced up with the team regarding this issue and our recommended actions are as follows: We will improve error handling to ensure that error messages clearly indicate when an unsupported hashing algorithm is used, for instance, by displaying Update:
However, in OpenSSL 1.0.2, which we use, OCSP_SINGLERESP_get0_id(single) is not supported. Therefore, we would need a feature probe for this error catching to work across all environments. To avoid introducing complexity for this niche option, we will not be implementing the error catching. Instead, we will document this finding for developers and users. |
Security issue notifications
If you discover a potential security issue in s2n we ask that you notify
AWS Security via our vulnerability reporting page. Please do not create a public github issue.
Problem:
When debugging a RHEL9 build test failures in this PR, I noticed that we assume SHA1 is used to read and verify the response cert_id and therefore the test fails with an OCSP response generated with SHA256 hashed cert_id:
s2n-tls/tls/s2n_x509_validator.c
Lines 877 to 879 in ff03b94
There is no explicit mention of enforcing SHA1 in OCSP RFC
Solution:
Investigate why only SHA1 is supported for OSCP digest, and consider adding support for other hash algorithms.
If we decide not to implement them, document the reasons.
Requirements / Acceptance Criteria:
What must a solution address in order to solve the problem? How do we know the solution is complete?
Out of scope:
Is there anything the solution will intentionally NOT address?
The text was updated successfully, but these errors were encountered: