-
Notifications
You must be signed in to change notification settings - Fork 475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Invalid RSAES-OAEP padding" Error #76
Comments
Well, this is the error message you receive when the encrypted assertion does not match the private key you have supplied. I.e., your shibboleth provider has a public key for you that does not match the decryptionPvk you are supplying. Not sure if that is what you are seeing here, but the poor error message has bitten me several times in the past, I've been meaning to look into what we can do to give a better error here. (it is being passed up from the underlying xmlenc library, not something generated directly by passport-saml) |
I've confirmed with my identity provider that the correct public key is on file. |
Then the next debugging step that comes to mind would be to step into the xmlenc It's definitely an error from the crypto layer, so if the right public key and private key are being used, I'd look at whether the private key is being loaded correctly, whether there is anything unusual about the format of those keys, etc. |
You are correct. The XML module (xml-encryption) passes the encrypted data and private key to the 'forge' package: Where the error is eventually thrown here: I might try re-generating a new public/private key pair, and coordinating with the IdP. However, I don't know what else could be causing this, but it isn't your package. |
For anyone who comes across this, try regenerating your keys and certificate-- that was my issue. Also, try configuring with something like testshib.org (see #10) first before having to annoy your IdP Admin to reload your metadata frequently :) |
I should put something about how useful testshib can be for debugging in the docs. I'll file a bug for that. |
Can someone point me in the direction of how to add aes256-cbc Assertion encryption support... i see this lib but not sure how to put it all together |
Here's my SAML Configuration:
Routes:
General error catcher:
Shibboleth processes the request and a
SAMLResponse
is present in the header of callback route,/login/callback
.An error is thrown at
passport.authenticate('saml', {failureRedirect: '/login/fail'})
in the/
route.Console log:
Any ideas?
The text was updated successfully, but these errors were encountered: