Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement support for DNSSEC algorithms ED25519 and ED448 #819

Open
ruifung opened this issue Jan 2, 2024 · 4 comments
Open

Implement support for DNSSEC algorithms ED25519 and ED448 #819

ruifung opened this issue Jan 2, 2024 · 4 comments

Comments

@ruifung
Copy link
Contributor

ruifung commented Jan 2, 2024

This was bought up during a discussion on the IPv6 discord server. It was bought up that apparently Technitium is lacking as a validating recursive resolver due to cryptographic algorithm support, so I looked into it and decided to file a issue here.


Technitium DNS appears to be lacking support for the newer DNSKEY algorithms. Specifically, ed25519 and ed448 which of which the former is recommended for signing support and the latter is recommended for validation support, as per RFC8624, section 3.1

References:
https://ed25519.no/
https://datatracker.ietf.org/doc/html/rfc8624#section-3.1

@ruifung ruifung changed the title Improve support for DNSSEC cryptographic algorithms for validation Implement support for ED25519 and ED448 for DNSSEC Jan 2, 2024
@ruifung ruifung changed the title Implement support for ED25519 and ED448 for DNSSEC Implement support for DNSSEC algorithms ED25519 and ED448 Jan 2, 2024
@ShreyasZare
Copy link
Member

Thanks for the post. These algorithms are planned but not available as they are not yet supported by .NET runtime since the algorithms are not natively available on some OS.

@ruifung
Copy link
Contributor Author

ruifung commented Jan 2, 2024

Of course it's microsoft. And it's been open since 2015 ffs.

@vincejv
Copy link

vincejv commented Dec 9, 2024

hello I think this is really a highly critical issue and I understand this is more of upstream rather than technitium... at the moment my nginx OCSP validation for my Let's encrypt certificate is not working with DNSSEC enabled for the following domain e5.o.lencr.org when checking technitium logs, DNSSEC says it's "Insecure"...

2024/12/09 11:55:57 [error] 12#12: e5.o.lencr.org could not be resolved (110: Operation timed out) while requesting certificate status, responder: e5.o.lencr.org, certificate: "/certs/cert.cer"
2024/12/09 11:55:59 [error] 8#8: e5.o.lencr.org could not be resolved (110: Operation timed out) while requesting certificate status, responder: e5.o.lencr.org, certificate: "/certs/cert.cer"

@ShreyasZare
Copy link
Member

hello I think this is really a highly critical issue and I understand this is more of upstream rather than technitium... at the moment my nginx OCSP validation for my Let's encrypt certificate is not working with DNSSEC enabled for the following domain e5.o.lencr.org when checking technitium logs, DNSSEC says it's "Insecure"...

Thanks for the feedback. This is not related to this current issue. The domain lencr.org is not DNSSEC signed which is why the status is Insecure.

2024/12/09 11:55:57 [error] 12#12: e5.o.lencr.org could not be resolved (110: Operation timed out) while requesting certificate status, responder: e5.o.lencr.org, certificate: "/certs/cert.cer"
2024/12/09 11:55:59 [error] 8#8: e5.o.lencr.org could not be resolved (110: Operation timed out) while requesting certificate status, responder: e5.o.lencr.org, certificate: "/certs/cert.cer"

You need to use the DNS Client tool on the DNS admin panel to check why the domain "e5.o.lencr.org" is not resolving. The output will give you clues and if there are any errors then check the DNS logs from admin panel to know what went wrong.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants