Bug 1452091

Summary: [RFE] Backport "negative trust anchors" (IETF RFC 7646) from BIND 9.11
Product: Red Hat Enterprise Linux 7 Reporter: Yogita <ysoni>
Component: bindAssignee: Petr Menšík <pemensik>
Status: CLOSED ERRATA QA Contact: Petr Sklenar <psklenar>
Severity: medium Docs Contact: Filip Hanzelka <fhanzelk>
Priority: medium    
Version: 7.3CC: pemensik, psklenar, salmy, stefan.lasche, thozza
Target Milestone: rcKeywords: FutureFeature
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: bind-9.9.4-65.el7 Doc Type: Release Note
Doc Text:
DNSSEC validation can be disabled for selected domains Previously, if DNSSEC validation was enabled and a specific domain was failing, no hosts in that domain could be reached. With this release, you can configure exemptions from DNS Security Extensions (DNSSEC) validation for selected zones if the validation fails because of incorrect configuration, not an attack. The addresses of the hosts in the failing domain are resolved as unsigned and can be reached, while all other names are validated for security risks.
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-10-30 10:18:33 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1487823, 1569466, 1572647, 1633158    
Bug Blocks: 1420851, 1465928, 1534569, 1549614    
Attachments:
Description Flags
NTA backport to BIND 9.9 patch none

Description Yogita 2017-05-18 10:40:34 UTC
Description of problem:
RFE -  bind package to include features of ISC BIND (BIND 9.11)

Version-Release number of selected component (if applicable):
bind-9.9.4-38.el7_3.3.x86_64

Business justification on this in Customer's words -
~~~
The business justification is mainly security/compliance related. As stated in Case 01183581, our security regulations require us to enable DNSSEC validation in our DNS resolvers.
However, the BIND versions in RedHat can only enable DNSSEC validation on a global level (for all queries - without exceptions). Unfortunately, some of our customer's internal domains will fail dnssec validation, because they use dns names that are not registered officially. Since we need access to these domains, we currently can not enable DNSSEC validation on our resolvers :(

The current bind911 version has more fine grained DNSSEC validation features, called "negative trust anchors" (see IETF RFC 7646). This would enable us to use finally enable DNSSEC for all queries, while we can still disable DNSSEC validation for specific domains known to be failing validation due to administrative error rather than because of a spoofing attack.

The new bind version would help us comply with our (and our customer's) compliance regulations and significantly raise the security level of the whole corporate network.
~~~

Additional info:
rpm -q bind --changelog  <--Doesnt show that "RFC 7646" is included in RHEL7 bind package

see IETF RFC 7646  --> https://tools.ietf.org/html/rfc7646

Comment 3 Petr Menšík 2017-05-19 14:58:40 UTC
Note that there is one problem with nta feature, similar to NZF. It cannot change directory used to store files containing nta exception. However default directory is /var/named, which is by default read only and protected by selinux policy to write. Even if I backport NTA from upstream, this is not solved in upstream.

Comment 9 Petr Menšík 2017-11-09 15:02:59 UTC
Created attachment 1349991 [details]
NTA backport to BIND 9.9 patch

This version does not solve missing rights to write file into home directory. May fail to provide full list of NTA domains via rndc nta -dump. Workaround is to use rndc secroots, where all entries would be always listed into dumped file. Upstream relies on dynamic isc_buffer_t, which is not yet implemented in 9.9 and backport of it seems too invasive to me.

Comment 30 errata-xmlrpc 2018-10-30 10:18:33 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:3136