Re: BIND 9.18.6 disables RSASHA1 at runtime?

2022-09-05 Thread Petr Menšík

On 9/2/22 14:23, Bjørn Mork wrote:

Mark Andrews  writes:


We don’t log rsamd5 is disabled now ec or ed curves when they are not
supported by the crypto provider. Why should rsasha1 based algs be
special?

Because RSASHA1 validation still is a MUST in RFC8624? MD5 is and ED is
not.

I don't know if disabled EC curves is a real world problem, but
ECDSAP256SHA256 is also a MUST and should get the same treatment.

IMHO you should not allow the server to start up with a non-compliant
configuration without making sure the adminstrator is aware of the
problem.  A log warning is sort of a minimum.  Personally I'd prefer the
server to die by default.  It is unsuitable as a validating resolver and
forcing adminstrators to find that out the hard way is not very nice.


Bjørn


I do not think all servers should fail to start on CentOS Stream 9, 
RHEL9 and derivates. Yes, I have hit too it does not report at all which 
algorithms are ready to use. But DEFAULT crypto policy on those 
distributions simply do not allow validation of SHA-1 based signatures 
to succeed. It is suitable for all other algorithms so I disagree that 
without algorithms 5 and 7 it is not usable at all. Majority of secured 
domains use stronger algorithms already.


I think it might report at least single line with a list of successfuly 
initialized algorithms. So it would not report RSASHA1 is not available, 
but a list of algorithms which are available in this build AND runtime 
environment. I think such list would be short enough.


Administrators should be aware of those issues by reading release notes 
on affected distributions. They should not be surprised so much.


Regards,
Petr

--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.18.6 disables RSASHA1 at runtime?

2022-09-05 Thread Bjørn Mork
Petr Menšík  writes:

> It is suitable for all other algorithms so I disagree that 
> without algorithms 5 and 7 it is not usable at all. Majority of
> secured domains use stronger algorithms already.

Would it be the same if it worked for a majority of TLDs?  Say "nz" as
an arbitrary example. Would still work fine for a majority of users.  It
would probably take me some time before I noticed.  After all, I rarely
have a need to look up "nz" domains.  And when it occasionally failed I'd
probably never would have blamed Redhat.

IMHO BIND without RSASHA1 is useless as a validating resolver as long as
there are RSASHA1 signed zones out there.  At least as long as this is
still allowed.  And it is.  Hence the MUST validate.

The classical example of a failing domain is
https://dnsviz.net/d/paypal.com/dnssec/

Maybe acceptable for you?  Definitely not for me or my customers.  I
want DNSSEC validation on that domain. I'd certainly prefer a stronger
algorithm. But that's not an option, is it?

So, yes, I prefer to be forced to acknowledge this issue.  And refusing
to start without some form of explicit adminstrator action is the only
way that works in my experience.  Not enough admins read logs ;-)



Bjørn
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.18.6 disables RSASHA1 at runtime?

2022-09-05 Thread Ondřej Surý
Petr,

care to prepare a MR for this? After all, it's RedHat who is making us all to 
go through this mess.

Ondrej
--
Ondřej Surý (He/Him)
ond...@isc.org

My working hours and your working hours may be different. Please do not feel 
obligated to reply outside your normal working hours.

> On 5. 9. 2022, at 9:56, Petr Menšík  wrote:
> 
> I think it might report at least single line with a list of successfuly 
> initialized algorithms. So it would not report RSASHA1 is not available, but 
> a list of algorithms which are available in this build AND runtime 
> environment. I think such list would be short enough.



signature.asc
Description: Message signed with OpenPGP
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.18.6 disables RSASHA1 at runtime?

2022-09-05 Thread Mark Andrews


> On 5 Sep 2022, at 18:41, Bjørn Mork  wrote:
> 
> Petr Menšík  writes:
> 
>> It is suitable for all other algorithms so I disagree that 
>> without algorithms 5 and 7 it is not usable at all. Majority of
>> secured domains use stronger algorithms already.
> 
> Would it be the same if it worked for a majority of TLDs?  Say "nz" as
> an arbitrary example. Would still work fine for a majority of users.  It
> would probably take me some time before I noticed.  After all, I rarely
> have a need to look up "nz" domains.  And when it occasionally failed I'd
> probably never would have blamed Redhat.
> 
> IMHO BIND without RSASHA1 is useless as a validating resolver as long as
> there are RSASHA1 signed zones out there.  At least as long as this is
> still allowed.  And it is.  Hence the MUST validate.

It does validate.   Remember the results of validation are secure, insecure,
or bogus. The point of the change is ensure that lookups DO NOT FAIL because
the OS has removed / disabled support for RSASHA1.  Without the change lookups
failed with SERVFAIL unless you explicitly said to disable RSASHA1 and
NSEC3RSASHA1.  With the change they validate as insecure.

> The classical example of a failing domain is
> https://dnsviz.net/d/paypal.com/dnssec/


> Maybe acceptable for you?  Definitely not for me or my customers.  I
> want DNSSEC validation on that domain. I'd certainly prefer a stronger
> algorithm. But that's not an option, is it?

What records in paypal.com do you or your customers actually depend upon
being signed?  Paypal’s web servers depend on CAs not the DNS to provide
trust anchors.  It's not their SMTP servers as paypalcorp.com is not signed.

Yes, I’d like Paypal to have moved to something that is not RSASHA1 based
for DNSSEC but at the moment, for all practical uses, whether the zone
validates as secure or insecure doesn’t matter.

> So, yes, I prefer to be forced to acknowledge this issue.  And refusing
> to start without some form of explicit adminstrator action is the only
> way that works in my experience.  Not enough admins read logs ;-)
> 
> 
> 
> Bjørn
> -- 
> Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
> this list
> 
> ISC funds the development of this software with paid support subscriptions. 
> Contact us at https://www.isc.org/contact/ for more information.
> 
> 
> bind-users mailing list
> bind-users@lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742  INTERNET: ma...@isc.org

-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.18.6 disables RSASHA1 at runtime?

2022-09-05 Thread Bjørn Mork
Mark Andrews  writes:

> What records in paypal.com do you or your customers actually depend upon
> being signed?  Paypal’s web servers depend on CAs not the DNS to provide
> trust anchors.  It's not their SMTP servers as paypalcorp.com is not signed.

OK, let's just hope no CA runs Redhat then.


Bjørn
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: Mailing list questions (DMARC, ARC, more?)

2022-09-05 Thread Alessandro Vesely

On Sun 04/Sep/2022 14:17:25 +0200 Benny Pedersen wrote:

ARC-Authentication-Results: i=1; mx.pao1.isc.org;
  dmarc=pass (p=none dis=none) header.from=tana.it;
  spf=pass smtp.mailfrom=tana.it;
  dkim=permerror (0-bit key) header.d=tana.it header.i=@tana.it



That stanza is faulty.  The key at epsilon._domainkey.tana.it is 256 bits, like 
all ed25519 keys, not 0.  Presumably ISC's DKIM filter doesn't support RFC8463.




  header.b=j8VJHYFh; dkim=pass (1152-bit key;
  unprotected) header.d=tana.it header.i=@tana.it header.b=DBspF3JP



The second signature, rsa, succeeds.  However, why unprotected?  Presumably the 
library used by ISC's DKIM filter doesn't support DNSSEC.




you have a invalid dkim signing, fix that



Nothing to fix on my side.



note you on top of that dkim double sign

one is working, one is failing



That's why I put two.


Best
Ale
--





--
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users