On Thu, Oct 06, 2022 at 12:19:48PM -0400, PGNet Dev wrote:

> I see lots of these,
> 
>       2022-10-05T17:30:13.277421-04:00 mx03 postfix/smtp-out-ext/smtp[8484]:
>         warning: DANE TLSA lookup problem:
>         Host or domain name not found.
>         Name service error for name=_25._tcp.christopher-ew.state.gov 
> type=TLSA:
>         Host not found, try again
> 
> I personally don't recall every seeing one of these DANE TLSA errors

It is possible that your resolver has fallen victim to the RHEL/Fedora
"crypto policy" changes that by default disable (i.e. make fail)
RSAwithSHA1 signature validation.

    https://lwn.net/Articles/887832/
    https://bugzilla.redhat.com/show_bug.cgi?id=2073066

> Checking with my local resolver (unbound),
> 
>       dig +ad +noall +comment +ans +auth -t tlsa 
> _25._tcp.christopher-ew.state.gov
>               ;; Got answer:
>               ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 491
>               ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, 
> ADDITIONAL: 1
> 
>               ;; OPT PSEUDOSECTION:
>               ; EDNS: version: 0, flags:; udp: 1232

All the resolvers I've tried work.  There's likely some FAQ or other
documentation from RedHat about what you need to do to be able to
continue to resolve DNSSEC zones signed with the deprecated, but still
in use at some domains, algorithms 5 and 7 (RSA SHA1).

    https://stats.dnssec-tools.org/explore/?state.gov

There may a more recent version of unbound that detects the lack of
support and considers algorithms 5 and 7 as unsupported, and
corresponding zones as "insecure" rather than "bogus".

At https://stats.dnssec-tools.org you'll see that there ~155k zones
that use algorithms 5 or 7, out of ~19.6 million zones total.

-- 
    Viktor.

Reply via email to