Thanks! I now remember, I have seen Petr discussing something similar
on the Bind Users mailing list.

Josef

On Thu, Sep 8, 2022 at 9:20 AM Carsten Strotmann <cars...@strotmann.de> wrote:
>
> Hello Josef,
>
> On 8 Sep 2022, at 8:42, Josef Vybíhal via Unbound-users wrote:
>
> > Hello everyone,
> > maybe this will be obvious to some, but I have been scratching my head
> > about this since yesterday.
> >
> > In CentOS Stream 9, when unbound installed from Appstream, I see that
> > unbound returns insecure replies to clients. Which is not what I want,
> > nor what I am used to. I am thinking this might be a packaging bug,
> > compile option or config setting, but I can not figure out which and
> > where. I am testing with untouched rpm package config.
> >
> >
> > CentOS Stream 9 example:
> > [root@18 ~]# dig sigfail.verteiltesysteme.net @127.1 +short
> > 134.91.78.139
> > [root@18 ~]# unbound-host -C /etc/unbound/unbound.conf -v
> [...]
> > sigok.verteiltesysteme.net has address 134.91.78.139 (insecure)
> > sigok.verteiltesysteme.net has IPv6 address 2001:638:501:8efc::139 
> > (insecure)
> > sigok.verteiltesysteme.net has no mail handler record (insecure)
> > [root@18 ~]# unbound -V
> > Version 1.16.2
>
> Red Hat removed (almost all) SHA1 support from RHEL 9 (including CentOS), 
> which makes DNSSEC zones signed with RSASHA1 treated as insecure:
>
> <https://access.redhat.com/solutions/6955455>
>
> This affects the Red Hat build versions of Unbound and BIND 9 (as a resolver).
>
> SHA1 for DNSSEC use is on its path to be deprecated 
> <https://www.ietf.org/archive/id/draft-hardaker-dnsop-must-not-sha1-00.html>, 
> but there are still zones that have not migrated to stronger DNSSEC 
> algorithms.
>
> See the discussion on this mailing list for some background 
> <https://lists.nlnetlabs.nl/pipermail/unbound-users/2022-April/007709.html>
>
> Greetings
>
> Carsten

Reply via email to