Bug 1066603
| Summary: | [RFE] dhcpd is not able to use HMAC-SHA1 or better for dyndns updates | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Tuomo Soini <tis> |
| Component: | dhcp | Assignee: | Pavel Zhukov <pzhukov> |
| Status: | CLOSED WONTFIX | QA Contact: | Release Test Team <release-test-team-automation> |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | 6.8 | CC: | jkoncick, jpopelka, thozza, tis |
| Target Milestone: | rc | Keywords: | FutureFeature, Reopened |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Enhancement | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-09-05 14:35:13 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Tuomo Soini
2014-02-18 17:19:52 UTC
(In reply to Tuomo Soini from comment #0) > I'd propose dhcp update to later version which is capable to use more secure > hmac-sha1, hmac-sha256 and hmac-sha512 algoritms. Do you know which version has this implemented ? I found https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/797356 where comment #5 says that 4.2.4 still lacks the support. I don't really know - according source code 4.3.0 already supports hmac-sha256. Really? Now I looked into 4.3.0 code and I found those:
common/dns.c:116
* or by the IANA. Currently only the HMAC-MD5... key type is
* supported.
omapip/isclib:282
/* We only support HMAC_MD5 currently */
if (strcasecmp(algorithm, DHCP_HMAC_MD5_NAME) != 0) {
return(DHCP_R_INVALIDARG);
}
dhcpctl/remote.c:40
(currently, only "hmac-md5" is supported).
For me it seems that hmac-sha256 and others are not supported.
Actually yes - they only support sha256 for other things but not HMAC-SHA1 or HMAC-SHA256 - how stupid. Thanks both for the investigation. I'm afraid I have to close this ticket as we can't implement such a security sensitive feature alone - this has to be implemented upstream first - closing as UPSTREAM then. You can suggest it upstream via dhcp-bugs but be aware that it probably won't get much attention if it's not backed up with patches. I'd like to reopen this issue. HMAC-MD5 is by no means secure, neither is HMAC-SHA1 any more. This issue is fixed by upstream now so I'd suggest backporting this fix. Upstream commit e4a2cb79b2679738f56b3803a44c9899f6982c09. Red Hat Enterprise Linux 6 transitioned to the Production 3 Phase on May 10, 2017. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available. The official life cycle policy can be reviewed here: http://redhat.com/rhel/lifecycle This issue does not appear to meet the inclusion criteria for the Production Phase 3 and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL: https://access.redhat.com |