Bug 1245250

Summary: [RFE] unbound does not support ECDSA DNSSEC keys (RFC 6605)
Product: Red Hat Enterprise Linux 7 Reporter: Petr Spacek <pspacek>
Component: unboundAssignee: Tomáš Hozza 🤓 <thozza>
Status: CLOSED ERRATA QA Contact: Radka Skvarilova <rskvaril>
Severity: high Docs Contact: Marc Muehlfeld <mmuehlfe>
Priority: high    
Version: 7.2CC: briang, jscotka, ondrej, ovasik, psimerda, rskvaril, thozza
Target Milestone: rcKeywords: FutureFeature, Patch
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: unbound-1.4.20-28.el7 Doc Type: Enhancement
Doc Text:
The Unbound DNS validating resolver now supports ECDSA cipher for DNSSEC This update enables the ECDSA cipher in the Unbound DNS validating resolver. As a result, the DNS resolver is now able to validate DNS responses signed using DNSSEC with ECDSA algorithm.
Story Points: ---
Clone Of:
: 1265605 (view as bug list) Environment:
Last Closed: 2016-11-04 06:04:36 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 1265605    
Bug Blocks: 1289025, 1305230    

Description Petr Spacek 2015-07-21 14:45:45 UTC
Description of problem:
Unbound in RHEL is compiled with option --disable-ecdsa which effectivelly disables support for RFC 6605.

This is going to cause interoperability problems in near future because ECDSA algorithms are going to be deployed at scale e.g. by Cloudflare.

Version-Release number of selected component (if applicable):
1.4.20-23

How reproducible:
100 %

Steps to Reproduce:
0. Install unbound with default configuration and run it
1. Attempt to validate domain which is DNSSEC-signed using one of ECDSA algorithms. See below.

Actual results:
$ dig @127.0.0.1 ds-4.alg-14-nsec.dnssec-test.org
[...]
;; flags: qr rd ra;

Flags in the answer do not contain AD bit, so apparently the answer was not validated by Unbound. The test domain is signed using ECDSA alg # 14:
http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1


Expected results:
$ dig @127.0.0.1 ds-4.alg-14-nsec.dnssec-test.org
[...]
;; flags: qr rd ra ad;

AD bit is set, i.e. the validation passed.

Additional info:
bind-9.9.4-18.el7_1.2.x86_64 in RHEL 7 supports ECDSA and validates the data properly. Not supporting ECDSA in Unbound will give uneven experience (interoperability problems aside).

Comment 10 errata-xmlrpc 2016-11-04 06:04:36 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2016-2407.html