#3202: JWT: ESxxx signature must include padding for ECDSA R and S values

This commit is contained in:
Günter Obiltschnig 2021-02-06 11:32:04 +01:00
parent 340165e5fb
commit 3e0c80d8a8
3 changed files with 149 additions and 2 deletions

View File

@ -222,6 +222,11 @@ public:
class ECDSAAlgorithm: public Algorithm class ECDSAAlgorithm: public Algorithm
{ {
public: public:
enum
{
RS_PADDING = 32
};
ECDSAAlgorithm(const std::string& digestType): ECDSAAlgorithm(const std::string& digestType):
_digestType(digestType) _digestType(digestType)
{ {
@ -237,11 +242,16 @@ public:
ecdsa.update(payload); ecdsa.update(payload);
Poco::Crypto::ECDSASignature ecdsaSig(ecdsa.signature()); Poco::Crypto::ECDSASignature ecdsaSig(ecdsa.signature());
Poco::DigestEngine::Digest jwtSig(ecdsaSig.rawR()); Poco::DigestEngine::Digest rawR(ecdsaSig.rawR());
Poco::DigestEngine::Digest rawS(ecdsaSig.rawS()); Poco::DigestEngine::Digest rawS(ecdsaSig.rawS());
Poco::DigestEngine::Digest jwtSig;
jwtSig.reserve(RS_PADDING*2);
for (std::size_t i = rawR.size(); i < RS_PADDING; i++) jwtSig.push_back(0);
jwtSig.insert(jwtSig.end(), rawR.begin(), rawR.end());
for (std::size_t i = rawS.size(); i < RS_PADDING; i++) jwtSig.push_back(0);
jwtSig.insert(jwtSig.end(), rawS.begin(), rawS.end()); jwtSig.insert(jwtSig.end(), rawS.begin(), rawS.end());
return jwtSig;
return jwtSig;
} }
bool verify(const Signer& signer, const std::string& header, const std::string& payload, const Poco::DigestEngine::Digest& signature) bool verify(const Signer& signer, const std::string& header, const std::string& payload, const Poco::DigestEngine::Digest& signature)
@ -498,6 +508,7 @@ Poco::DigestEngine::Digest Signer::decode(const std::string& signature)
digest.push_back(static_cast<unsigned char>(static_cast<unsigned>(ch))); digest.push_back(static_cast<unsigned char>(static_cast<unsigned>(ch)));
ch = decoder.get(); ch = decoder.get();
} }
return digest; return digest;
} }

View File

@ -441,6 +441,134 @@ void SignerTest::testVerifyES256()
} }
void SignerTest::testSignVerifyES384()
{
// Note: ECDSA is a strange beast and does not return a "known" signature.
// That's why we do the signing and verification in a single test.
Token token;
token.setType("JWT");
token.setSubject("1234567890");
token.payload().set("name", std::string("John Doe"));
token.setIssuedAt(Poco::Timestamp::fromEpochTime(1516239022));
std::istringstream privateKeyStream(ECDSA_PRIVATE_KEY);
Poco::SharedPtr<Poco::Crypto::ECKey> pKey = new Poco::Crypto::ECKey(0, &privateKeyStream);
Signer signer(pKey);
std::string jwt = signer.sign(token, Signer::ALGO_ES384);
std::istringstream publicKeyStream(ECDSA_PUBLIC_KEY);
pKey = new Poco::Crypto::ECKey(&publicKeyStream);
Signer verifier(pKey);
verifier.addAlgorithm(Signer::ALGO_ES384);
try
{
Token token2 = verifier.verify(jwt);
assert (token2.getAlgorithm() == "ES384");
assert (token2.getType() == "JWT");
assert (token2.getSubject() == "1234567890");
assert (token2.getIssuedAt().epochTime() == 1516239022);
assert (token2.payload().getValue<std::string>("name") == "John Doe");
}
catch (JWTException&)
{
fail("Verification must succeed");
}
}
void SignerTest::testVerifyES384()
{
std::string jwt("eyJhbGciOiJFUzM4NCIsInR5cCI6IkpXVCJ9.eyJpYXQiOjE1MTYyMzkwMjIsIm5hbWUiOiJKb2huIERvZSIsInN1YiI6IjEyMzQ1Njc4OTAifQ.ROGmzbopY2GfjSUKih4MmgZ5_1jLQdEc2db3ITYCDOZSHzeGM_14KtY-61qvx4BXxmeUiXfoInPZWlA75VL6dA");
std::istringstream publicKeyStream(ECDSA_PUBLIC_KEY);
Poco::SharedPtr<Poco::Crypto::ECKey> pKey = new Poco::Crypto::ECKey(&publicKeyStream);
Signer signer(pKey);
signer.addAlgorithm(Signer::ALGO_ES384);
try
{
Token token = signer.verify(jwt);
assert (token.getAlgorithm() == "ES384");
assert (token.getType() == "JWT");
assert (token.getSubject() == "1234567890");
assert (token.getIssuedAt().epochTime() == 1516239022);
assert (token.payload().getValue<std::string>("name") == "John Doe");
assert (token.signature() == "kLfRdCmR-qewMgzhCtqJrXVoagoh7es0yWsn3VunuS51FMBBcxLTKRDfdgHih0os4gvBdLMYkJu61_IQqoIYZw");
}
catch (JWTException&)
{
fail("Verification must succeed");
}
}
void SignerTest::testSignVerifyES512()
{
// Note: ECDSA is a strange beast and does not return a "known" signature.
// That's why we do the signing and verification in a single test.
Token token;
token.setType("JWT");
token.setSubject("1234567890");
token.payload().set("name", std::string("John Doe"));
token.setIssuedAt(Poco::Timestamp::fromEpochTime(1516239022));
std::istringstream privateKeyStream(ECDSA_PRIVATE_KEY);
Poco::SharedPtr<Poco::Crypto::ECKey> pKey = new Poco::Crypto::ECKey(0, &privateKeyStream);
Signer signer(pKey);
std::string jwt = signer.sign(token, Signer::ALGO_ES512);
std::istringstream publicKeyStream(ECDSA_PUBLIC_KEY);
pKey = new Poco::Crypto::ECKey(&publicKeyStream);
Signer verifier(pKey);
verifier.addAlgorithm(Signer::ALGO_ES512);
try
{
Token token2 = verifier.verify(jwt);
assert (token2.getAlgorithm() == "ES512");
assert (token2.getType() == "JWT");
assert (token2.getSubject() == "1234567890");
assert (token2.getIssuedAt().epochTime() == 1516239022);
assert (token2.payload().getValue<std::string>("name") == "John Doe");
}
catch (JWTException&)
{
fail("Verification must succeed");
}
}
void SignerTest::testVerifyES512()
{
std::string jwt("eyJhbGciOiJFUzUxMiIsInR5cCI6IkpXVCJ9.eyJpYXQiOjE1MTYyMzkwMjIsIm5hbWUiOiJKb2huIERvZSIsInN1YiI6IjEyMzQ1Njc4OTAifQ.8AYb9WDk3x2U-69Hi2DHou06L8VavXJlMqyH8dF-uiekm926CNM7D3pkgnWD6e_OfV_p2XIkdfIV018PjZtfuA");
std::istringstream publicKeyStream(ECDSA_PUBLIC_KEY);
Poco::SharedPtr<Poco::Crypto::ECKey> pKey = new Poco::Crypto::ECKey(&publicKeyStream);
Signer signer(pKey);
signer.addAlgorithm(Signer::ALGO_ES512);
try
{
Token token = signer.verify(jwt);
assert (token.getAlgorithm() == "ES512");
assert (token.getType() == "JWT");
assert (token.getSubject() == "1234567890");
assert (token.getIssuedAt().epochTime() == 1516239022);
assert (token.payload().getValue<std::string>("name") == "John Doe");
assert (token.signature() == "kLfRdCmR-qewMgzhCtqJrXVoagoh7es0yWsn3VunuS51FMBBcxLTKRDfdgHih0os4gvBdLMYkJu61_IQqoIYZw");
}
catch (JWTException&)
{
fail("Verification must succeed");
}
}
CppUnit::Test* SignerTest::suite() CppUnit::Test* SignerTest::suite()
{ {
CppUnit::TestSuite* pSuite = new CppUnit::TestSuite("SignerTest"); CppUnit::TestSuite* pSuite = new CppUnit::TestSuite("SignerTest");
@ -460,7 +588,11 @@ CppUnit::Test* SignerTest::suite()
CppUnit_addTest(pSuite, SignerTest, testVerifyRS384); CppUnit_addTest(pSuite, SignerTest, testVerifyRS384);
CppUnit_addTest(pSuite, SignerTest, testVerifyRS512); CppUnit_addTest(pSuite, SignerTest, testVerifyRS512);
CppUnit_addTest(pSuite, SignerTest, testSignVerifyES256); CppUnit_addTest(pSuite, SignerTest, testSignVerifyES256);
CppUnit_addTest(pSuite, SignerTest, testSignVerifyES384);
CppUnit_addTest(pSuite, SignerTest, testSignVerifyES512);
CppUnit_addTest(pSuite, SignerTest, testVerifyES256); CppUnit_addTest(pSuite, SignerTest, testVerifyES256);
CppUnit_addTest(pSuite, SignerTest, testVerifyES384);
CppUnit_addTest(pSuite, SignerTest, testVerifyES512);
return pSuite; return pSuite;
} }

View File

@ -43,6 +43,10 @@ public:
void testVerifyRS512(); void testVerifyRS512();
void testSignVerifyES256(); void testSignVerifyES256();
void testVerifyES256(); void testVerifyES256();
void testSignVerifyES384();
void testVerifyES384();
void testSignVerifyES512();
void testVerifyES512();
static CppUnit::Test* suite(); static CppUnit::Test* suite();