mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-22 18:19:42 +00:00
Completely remove the TKEY Mode 2 (Diffie-Hellman Exchanged Keying) from BIND 9 (from named, named.conf and all the tools). The TKEY usage is fringe at best and in all known cases, GSSAPI is being used as it should. The draft-eastlake-dnsop-rfc2930bis-tkey specifies that: 4.2 Diffie-Hellman Exchanged Keying (Deprecated) The use of this mode (#2) is NOT RECOMMENDED for the following two reasons but the specification is still included in Appendix A in case an implementation is needed for compatibility with old TKEY implementations. See Section 4.6 on ECDH Exchanged Keying. The mixing function used does not meet current cryptographic standards because it uses MD5 [RFC6151]. RSA keys must be excessively long to achieve levels of security required by current standards. We might optionally implement Elliptic Curve Diffie-Hellman (ECDH) key exchange mode 6 if the draft ever reaches the RFC status. Meanwhile the insecure DH mode needs to be removed.
108 lines
2.6 KiB
C
108 lines
2.6 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#include <openssl/bn.h>
|
|
#include <openssl/dh.h>
|
|
#include <openssl/ecdsa.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/opensslv.h>
|
|
#include <openssl/rsa.h>
|
|
|
|
/*
|
|
* Limit the size of public exponents.
|
|
*/
|
|
#ifndef RSA_MAX_PUBEXP_BITS
|
|
#define RSA_MAX_PUBEXP_BITS 35
|
|
#endif /* ifndef RSA_MAX_PUBEXP_BITS */
|
|
|
|
#if !HAVE_BN_GENCB_NEW
|
|
/* These are new in OpenSSL 1.1.0. */
|
|
static inline BN_GENCB *
|
|
BN_GENCB_new(void) {
|
|
return (OPENSSL_malloc(sizeof(BN_GENCB)));
|
|
}
|
|
|
|
static inline void
|
|
BN_GENCB_free(BN_GENCB *cb) {
|
|
if (cb == NULL) {
|
|
return;
|
|
}
|
|
OPENSSL_free(cb);
|
|
}
|
|
|
|
static inline void *
|
|
BN_GENCB_get_arg(BN_GENCB *cb) {
|
|
return cb->arg;
|
|
}
|
|
#endif /* !HAVE_BN_GENCB_NEW */
|
|
|
|
#if !HAVE_EVP_PKEY_GET0_RSA && OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
static inline const RSA *
|
|
EVP_PKEY_get0_RSA(const EVP_PKEY *pkey) {
|
|
return (pkey->type == EVP_PKEY_RSA ? pkey->pkey.rsa : NULL);
|
|
}
|
|
#endif
|
|
|
|
#if !HAVE_EVP_PKEY_GET0_EC_KEY && OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
static inline const EC_KEY *
|
|
EVP_PKEY_get0_EC_KEY(const EVP_PKEY *pkey) {
|
|
return (pkey->type == EVP_PKEY_EC ? pkey->pkey.ec : NULL);
|
|
}
|
|
#endif
|
|
|
|
#if !HAVE_RSA_SET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L
|
|
int
|
|
RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d);
|
|
|
|
int
|
|
RSA_set0_factors(RSA *r, BIGNUM *p, BIGNUM *q);
|
|
|
|
int
|
|
RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp);
|
|
|
|
void
|
|
RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e,
|
|
const BIGNUM **d);
|
|
|
|
void
|
|
RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q);
|
|
|
|
void
|
|
RSA_get0_crt_params(const RSA *r, const BIGNUM **dmp1, const BIGNUM **dmq1,
|
|
const BIGNUM **iqmp);
|
|
|
|
int
|
|
RSA_test_flags(const RSA *r, int flags);
|
|
#endif /* !HAVE_RSA_SET0_KEY && OPENSSL_VERSION_NUMBER < 0x30000000L */
|
|
|
|
#if !HAVE_ECDSA_SIG_GET0
|
|
void
|
|
ECDSA_SIG_get0(const ECDSA_SIG *sig, const BIGNUM **pr, const BIGNUM **ps);
|
|
|
|
int
|
|
ECDSA_SIG_set0(ECDSA_SIG *sig, BIGNUM *r, BIGNUM *s);
|
|
#endif /* !HAVE_ECDSA_SIG_GET0 */
|
|
|
|
#if !HAVE_ERR_GET_ERROR_ALL
|
|
unsigned long
|
|
ERR_get_error_all(const char **file, int *line, const char **func,
|
|
const char **data, int *flags);
|
|
#endif /* if !HAVE_ERR_GET_ERROR_ALL */
|
|
|
|
#if !HAVE_EVP_PKEY_EQ
|
|
#define EVP_PKEY_eq EVP_PKEY_cmp
|
|
#endif
|