mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 03:05:51 +03:00
[PR #2399] [MERGED] ensure DNSKEY is validated with a KSK #3013
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#3013
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/hickory-dns/hickory-dns/pull/2399
Author: @japaric
Created: 8/30/2024
Status: ✅ Merged
Merged: 9/3/2024
Merged by: @listochkin
Base:
main← Head:ja-ensure-dnskey-is-signed-with-ksk📝 Commits (4)
ab828eddns-test: double sign the DNSKEY record set609ff76dns-test: add DNSKEY::calculate_key_tagebd3019conformance: DNSKEY was signed with ZSK24e1c22do not validate DNSKEY RRSIGs using a ZSK📊 Changes
9 files changed (+149 additions, -7 deletions)
View changed files
📝
conformance/Cargo.lock(+9 -2)📝
conformance/packages/conformance-tests/src/resolver/dnssec/scenarios/bogus.rs(+97 -2)📝
conformance/packages/dns-test/Cargo.toml(+1 -0)📝
conformance/packages/dns-test/src/record.rs(+32 -0)📝
conformance/packages/dns-test/src/zone_file/signer.rs(+1 -1)📝
crates/proto/src/rr/dnssec/rdata/dnskey.rs(+6 -0)📝
crates/proto/src/xfer/dnssec_dns_handle.rs(+2 -0)📝
tests/ede-dot-com/Cargo.lock(+1 -0)📝
tests/ede-dot-com/src/lib.rs(+0 -2)📄 Description
ports and fixes
no-rrsig-kskfromede-dot-comthis fixes the last two false positive scenarios in
ede-dot-comI think I spotted at least two more places where the lack of DNSKEY checks ("is this a ZSK?", "is this a KSK?") could cause issues. None of the remaining scenarios in
ede-dot-comhits those paths so I'll try to write some tests first before I add any additional check to the DNSSEC validation code.fixes #2389
this PR depends on #2396 so opening as a draft PR until that gets merged🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.