mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-09-01 15:05:23 +00:00
Require local KEYs for SIG(0) verification
This is additional hardening. There is no known use-case for KEY RRs from DNS cache and it potentially allows attackers to put weird keys into cache.
This commit is contained in:
committed by
Nicki Křížek
parent
d69fab1530
commit
9370acd3a7
@@ -3323,11 +3323,9 @@ dns_message_checksig(dns_message_t *msg, dns_view_t *view) {
|
|||||||
0, false, &keyset, NULL);
|
0, false, &keyset, NULL);
|
||||||
|
|
||||||
if (result != ISC_R_SUCCESS) {
|
if (result != ISC_R_SUCCESS) {
|
||||||
/* XXXBEW Should possibly create a fetch here */
|
|
||||||
result = DNS_R_KEYUNAUTHORIZED;
|
result = DNS_R_KEYUNAUTHORIZED;
|
||||||
goto freesig;
|
goto freesig;
|
||||||
} else if (keyset.trust < dns_trust_secure) {
|
} else if (keyset.trust < dns_trust_ultimate) {
|
||||||
/* XXXBEW Should call a validator here */
|
|
||||||
result = DNS_R_KEYUNAUTHORIZED;
|
result = DNS_R_KEYUNAUTHORIZED;
|
||||||
goto freesig;
|
goto freesig;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user