Unsupported DNSSEC algorithms should not lead to SERVFAIL.

Petr Menšík pemensik at redhat.com
Tue Nov 4 11:05:33 UTC 2025


Yes, this is broken by recent 9.18.41 release and 9.20.15 release as well.

Domains signed by unsupported algorithm first, then supported algorithms 
second, incorrectly generate servfail.

This case happens on RHEL9 and RHEL10 by default, because they consider 
algorithm 5 and 7 insecure. This is discussed in thread RHEL9+, RSASHA1 
and CVE-2025-8677.

Temporary fix is enabling SHA1 verification again. On RHEL9 by choosing 
DEFAULT:SHA1 crypto policy. RHEL10+ does not have policy created for it, 
but you can enable only signatures by custom OPENSSL_CONF file with 
contents:

.include = /etc/ssl/openssl.cnf
[evp_properties]
rh-allow-sha1-signatures = yes

Or can you test by copr build of 9.20:

https://copr.fedorainfracloud.org/coprs/pemensik/bind-9.20/

Alternatively, patch your build with:

https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/11202

It does help on my build, even without SHA1 enabled policy enabled.

Thank you for sharing domain name with this problem, simplifies 
verification a lot.

I would suggest owners of that domain to switch to more recent 
algorithm. Algorithm 8 is supported even by our ancient bind 9.8.2rc2 in 
RHEL 6. I know no supported version, which would not support at least 
algorithm 8.

I see no point of double-signing algorithms 1 and 8. Instead 8 and 15, 
that would make more sense to me! If you can suggest it to owners of 
that zone, please do.

Sorry for inconveniences caused by security fixes. These cases did not 
yet had tests, which would capture the behaviour change.

Petr

On 30/10/2025 23:13, Kelsey Cummings wrote:
> Ondřej, any insight that you can shed into this behavior is 
> appreciated.  These two systems have identical configuration other 
> than local addressing and version of bind installed:
>
> # named -v && delv -v  && delv  usfca.edu. && dig @localhost usfca.edu
> BIND 9.18.41 (Extended Support Version) <id:1ed27e8>
> delv 9.18.41
> ;; validating usfca.edu/A: no valid signature found
> ;; no valid RRSIG resolving 'usfca.edu/A/IN': 69.12.208.107#53
> ;; algorithm is unsupported resolving 'usfca.edu/A/IN': 64.142.105.34#53
> ;; resolution failed: algorithm is unsupported
>
> ; <<>> DiG 9.18.41 <<>> @localhost usfca.edu
> ; (2 servers found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 12084
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 1232
> ; COOKIE: 63bbb3f67813f27e010000006903e1da959f03e4098ea706 (good)
> ;; QUESTION SECTION:
> ;usfca.edu.                     IN      A
>
> ;; Query time: 39 msec
> ;; SERVER: ::1#53(localhost) (UDP)
> ;; WHEN: Thu Oct 30 15:08:26 PDT 2025
> ;; MSG SIZE  rcvd: 66
>
>
> #  named -v && delv -v  && delv  usfca.edu. && dig @localhost usfca.edu
> BIND 9.18.28 (Extended Support Version) <id:1ed27e8>
> delv 9.18.28
> ; fully validated
> usfca.edu.              3372    IN      A       23.185.0.2
> usfca.edu.              3372    IN      RRSIG   A 5 2 3600 
> 20251103131709 20251030131458 43212 usfca.edu. 
> D0FH6+92IHpcStYKEYqH+A5yxo30Eb4mAuE6TKaA9CD2rGgsiP384UYx 
> Qp3xDwKQO0W3+G2w//FC5sEMZPYq6wYTrK3W/AnPUJHtVEVCDxbS5Gql 
> 910D2Px1G4QyZSbFnP/bvCGmr8ulALTPqa0IOvKXuzY2i7V/bieYZK9k 9ps=
> usfca.edu.              3372    IN      RRSIG   A 8 2 3600 
> 20251103131709 20251030131458 25299 usfca.edu. 
> ktVLOFl6EsRcCQPWtK4ApmnPr5/ETEfyiaXFQMFMgQ45kWuLjhUIBTUo 
> u8cV3/Z/jPa30kJKaldLi1vFrJJsvEpzrjw0n8ruuewYpfzokJVyg4k8 
> 4vyAiHkrzR1QMY8UXBTa5edG29p0CHqrx8Y+dMZHopwXve0NgzAWpNa3 vLI=
>
> ; <<>> DiG 9.18.28 <<>> @localhost usfca.edu
> ; (2 servers found)
> ;; global options: +cmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4655
> ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
>
> ;; OPT PSEUDOSECTION:
> ; EDNS: version: 0, flags:; udp: 1232
> ; COOKIE: 0ef1927ba6bb40c1010000006903e1e311aceb0f7252d3d6 (good)
> ;; QUESTION SECTION:
> ;usfca.edu.                     IN      A
>
> ;; ANSWER SECTION:
> usfca.edu.              3545    IN      A       23.185.0.2
>
> ;; Query time: 0 msec
> ;; SERVER: ::1#53(localhost) (UDP)
> ;; WHEN: Thu Oct 30 15:08:35 PDT 2025
> ;; MSG SIZE  rcvd: 82
>
>
>
> On 10/30/2025 2:39 PM, Ondřej Surý wrote:
>> No, you have not been caught by this. The issue you are referring to 
>> affects only a development
>> version of BIND 9 (9.21), so whatever you are experiencing is not 
>> related to this.
>>
>> You need to provide evidence (logs, reproducer) about what is going 
>> on, so we can help you
>> diagnose the issue you are experiencing.
>>
>> Ondrej
>> -- 
>> Ondřej Surý (He/Him)
>> ondrej at isc.org
>>
>> My working hours and your working hours may be different. Please do 
>> not feel obligated to reply outside your normal working hours.
>>
>
-- 
Petr Menšík
Senior Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB



More information about the bind-users mailing list