Getting a grasp on Heartbleed and IDPs
Wessel, Keith
kwessel at illinois.edu
Thu Apr 10 12:07:23 EDT 2014
Thanks, Scott, that sums things up exactly as I needed them.
Keith
-----Original Message-----
From: users-bounces at shibboleth.net [mailto:users-bounces at shibboleth.net] On Behalf Of Cantor, Scott
Sent: Thursday, April 10, 2014 11:05 AM
To: Shib Users
Subject: Re: Getting a grasp on Heartbleed and IDPs
On 4/10/14, 11:53 AM, "Wessel, Keith" <kwessel at illinois.edu> wrote:
>If the IDP¹s private key was exposed (through connections to Apache
>connections to 8443), what could a hacker do with it? Could they
>intercept assertaions from our IDP and decrypt them? In short, what is
>the IDP key and cert used for?
The attacker who stole the key can impersonate your IdP, full stop. They can issue signed assertions as your IdP's identity.
That specific case, you really have no recourse, you're stuck with a key rollover and getting the old one revoked (that is, get it out of the metadata).
-- Scott
--
To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net
More information about the users
mailing list