Time to re-evaluate the default SHA1 policies on RHEL...

Quoting from https://bind9.readthedocs.io/en/v9.20.15/notes.html#security-fixes

 DNSSEC validation fails if matching but invalid DNSKEY is found. 
(CVE-2025-8677)

 Previously, if a matching but cryptographically invalid key was
 encountered during DNSSEC validation, the key was skipped and not
 counted towards validation failures. named now treats such DNSSEC keys
 as hard failures and the DNSSEC validation fails immediately, instead of
 continuing with the next DNSKEYs in the RRset.

IIUC, this means that any zone with a RSASHA1 key will now fail
validation on Redhat systems using default policies, even if other keys
are present.

Is that correct?  Is it intentional?

If correct, then I believe it will break a number of zones with leftover
RSASHA1 keys and signatures. Anyone still having such keys in their
zones should purge them ASAP.  And resolver operators running BIND on
RHEL9 should consider running

 update-crypto-policies --set DEFAULT:SHA1

to prevent unexpected failures.


Bjørn
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list.

Reply via email to