On Thu, Oct 06, 2022 at 01:37:39PM -0400, Viktor Dukhovni wrote: > It is possible that your resolver has fallen victim to the RHEL/Fedora > "crypto policy" changes that by default disable (i.e. make fail) > RSAwithSHA1 signature validation. > > https://lwn.net/Articles/887832/ > https://bugzilla.redhat.com/show_bug.cgi?id=2073066 > > > Checking with my local resolver (unbound), > > > > dig +ad +noall +comment +ans +auth -t tlsa > > _25._tcp.christopher-ew.state.gov > > ;; Got answer: > > ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 491 > > ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, > > ADDITIONAL: 1 > > > > ;; OPT PSEUDOSECTION: > > ; EDNS: version: 0, flags:; udp: 1232 > > All the resolvers I've tried work. There's likely some FAQ or other > documentation from RedHat about what you need to do to be able to > continue to resolve DNSSEC zones signed with the deprecated, but still > in use at some domains, algorithms 5 and 7 (RSA SHA1). > > https://stats.dnssec-tools.org/explore/?state.gov > > There may a more recent version of unbound that detects the lack of > support and considers algorithms 5 and 7 as unsupported, and > corresponding zones as "insecure" rather than "bogus". > > At https://stats.dnssec-tools.org you'll see that there ~155k zones > that use algorithms 5 or 7, out of ~19.6 million zones total.
All that said, if the issue really were algorithm 5/7 breakage, you wouldn't have been able to resolve the MX records for state.gov, so likely the issue is still in your resolver, but something else... -- Viktor.