]> git.ipfire.org Git - thirdparty/knot-resolver.git/commit
lib/dnssec: conditionally ignore SHA1 DS, as SHOULD by RFC4509
authorVladimír Čunát <vladimir.cunat@nic.cz>
Thu, 20 Jan 2022 18:43:40 +0000 (19:43 +0100)
committerVladimír Čunát <vladimir.cunat@nic.cz>
Fri, 4 Feb 2022 14:31:56 +0000 (15:31 +0100)
commitd4e95821aecc313f7c37879b7b133a5766172032
tree313a5df5ea75d780ca89f3680807d6334afa6715
parentba846033a3c37815aadbdff02e98dacf369e4af3
lib/dnssec: conditionally ignore SHA1 DS, as SHOULD by RFC4509

We're a bit late with this ad-hoc rule; I think it was most useful
when SHA256 support in DS algorithms wasn't wide-spread yet.
(Note that DNSKEY algos have standardized no similar rule.)

Usage of SHA1 as DS algorithm is highly discouraged, but even at this
point it does *not* seem unsafe, in the sense of anyone publishing an
attack that would come anywhere close to breaking *this* usage of SHA1.
NEWS
lib/dnssec/signature.c