mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-30 14:07:59 +00:00
Require local KEYs for SIG(0) verification
This is additional hardening. There is no known use-case for KEY RRs from DNS cache and it potentially allows attackers to put weird keys into cache.
This commit is contained in:
committed by
Nicki Křížek
parent
d69fab1530
commit
9370acd3a7
@@ -3323,11 +3323,9 @@ dns_message_checksig(dns_message_t *msg, dns_view_t *view) {
|
||||
0, false, &keyset, NULL);
|
||||
|
||||
if (result != ISC_R_SUCCESS) {
|
||||
/* XXXBEW Should possibly create a fetch here */
|
||||
result = DNS_R_KEYUNAUTHORIZED;
|
||||
goto freesig;
|
||||
} else if (keyset.trust < dns_trust_secure) {
|
||||
/* XXXBEW Should call a validator here */
|
||||
} else if (keyset.trust < dns_trust_ultimate) {
|
||||
result = DNS_R_KEYUNAUTHORIZED;
|
||||
goto freesig;
|
||||
}
|
||||
|
Reference in New Issue
Block a user