Hello Bjørn.
No. Algorithm 5 and 7 are skipped earlier and should never reach the
code affected.
If the zone is signed only by SHA1 based algorithm, then it will be
considered insecure after receving DS record for it. It should not even
request DNSKEY for such zone and should not call any cryptographic
functions. Keys should be skipped even if zone would be signed by
multiple algorithms. Although I think it brings no benefit to dual sign
with the weakest possible algorithm and I hope nobody does it.
I think this should affect only special cases considered supported
algorithm (ie. not 5 or 7 on RHEL9+) and having special crafted DNSKEYs.
Common signed zone would not trigger any of this, it would have to be
something crafted to trigger unfixed code.
No crypto policy will change any of this, you do not have to lower your
security defaults to avoid that.
Please wait few days, proper fixed are on the way!
On 31/10/2025 12:37, Bjørn Mork wrote:
Time to re-evaluate the default SHA1 policies on RHEL...
Quoting fromhttps://bind9.readthedocs.io/en/v9.20.15/notes.html#security-fixes
DNSSEC validation fails if matching but invalid DNSKEY is found.
(CVE-2025-8677)
Previously, if a matching but cryptographically invalid key was
encountered during DNSSEC validation, the key was skipped and not
counted towards validation failures. named now treats such DNSSEC keys
as hard failures and the DNSSEC validation fails immediately, instead of
continuing with the next DNSKEYs in the RRset.
IIUC, this means that any zone with a RSASHA1 key will now fail
validation on Redhat systems using default policies, even if other keys
are present.
Is that correct? Is it intentional?
No, the description is intentionally a little vague to not help
attackers misusing known problem. But attack vector is not this simple
AFAIK.
If correct, then I believe it will break a number of zones with leftover
RSASHA1 keys and signatures. Anyone still having such keys in their
zones should purge them ASAP. And resolver operators running BIND on
RHEL9 should consider running
update-crypto-policies --set DEFAULT:SHA1
to prevent unexpected failures.
Bjørn
--
Petr Menšík
Senior Software Engineer, RHEL
Red Hat,https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from
this list.