On 9/2/22 14:23, Bjørn Mork wrote:
Mark Andrews <ma...@isc.org> writes:

We don’t log rsamd5 is disabled now ec or ed curves when they are not
supported by the crypto provider. Why should rsasha1 based algs be
special?
Because RSASHA1 validation still is a MUST in RFC8624? MD5 is and ED is
not.

I don't know if disabled EC curves is a real world problem, but
ECDSAP256SHA256 is also a MUST and should get the same treatment.

IMHO you should not allow the server to start up with a non-compliant
configuration without making sure the adminstrator is aware of the
problem.  A log warning is sort of a minimum.  Personally I'd prefer the
server to die by default.  It is unsuitable as a validating resolver and
forcing adminstrators to find that out the hard way is not very nice.


Bjørn

I do not think all servers should fail to start on CentOS Stream 9, RHEL9 and derivates. Yes, I have hit too it does not report at all which algorithms are ready to use. But DEFAULT crypto policy on those distributions simply do not allow validation of SHA-1 based signatures to succeed. It is suitable for all other algorithms so I disagree that without algorithms 5 and 7 it is not usable at all. Majority of secured domains use stronger algorithms already.

I think it might report at least single line with a list of successfuly initialized algorithms. So it would not report RSASHA1 is not available, but a list of algorithms which are available in this build AND runtime environment. I think such list would be short enough.

Administrators should be aware of those issues by reading release notes on affected distributions. They should not be surprised so much.

Regards,
Petr

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to