Hi There,
While trying to verify DANE compliance for a domain, we are facing RSA signature verification issue in FIPS mode for 1024 key sizes.
As per our understanding we could see in Non FIPS mode, (openssl) rsa_sign.c RSA_verify functions is taking care of signature verification and its passing.
In FIPS mode we see that unbound doesn’t call RSA_verify, could you help us understand if there is any other was verification takes place.
Below is the unbound query response for ietf.org.
Answer in Non FIPS mode:
<dns_reply rcode=0 q: an:[(‘MX’, ‘ietf.org’, 0, ‘SECURE’, 3963714400605L, (0, ‘mail.ietf.org’))] ns: ar:>
<dns_reply rcode=0 q: an:[(‘A’, ‘mail.ietf.org’, 0, ‘SECURE’, 3963714400605L, ‘4.31.198.44’)] ns: ar:>
<dns_reply rcode=0 q: an: ns: ar:>
<dns_reply rcode=0 q: an:[(‘TLSA’, ‘_25._tcp.mail.ietf.org’, 0, ‘SECURE’, 3969483822987L, ‘0301010c72ac70b745ac19998811b131d662c9ac69dbdbe7cb23e5b514b56664c5d3d6’)] ns: ar:>
Answer in FIPS mode:
<dns_reply rcode=0 q: an:[(‘MX’, ‘ietf.org’, 0, ‘BOGUS’, 4274224824212L, (0, ‘mail.ietf.org’))]
<dns_reply rcode=0 q: an:[(‘A’, ‘mail.ietf.org’, 0, ‘BOGUS’, 4274224824212L, ‘4.31.198.44’)] ns: ar:>
We appreciate any inputs on how we can verify 1024 key sizes signature verification in FIPS mode.
Thanks,
rafiq
(attachments)
![]()
