Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNSKEY support #2

Open
Habbie opened this issue Oct 16, 2017 · 3 comments
Open

DNSKEY support #2

Habbie opened this issue Oct 16, 2017 · 3 comments

Comments

@Habbie
Copy link

Habbie commented Oct 16, 2017

I did some very rough work to verify that the DNSKEYs for the root zone and the TLDs are not affected. Unless I made a mistake in my testing, none of them are affected.

It might be nice to add DNSKEY support to roca directly - however I do not have time to work on this right now, so I'm leaving the rough work here in case some enterprising soul wants to pick it up. I suggest labeling this issue with #hacktoberfest.

Script: https://gist.github.com/Habbie/23ef81ac9c4fed95720fe1970adddf23

Usage:

$ dig dnskey powerdns.com | grep DNSKEY | grep -v '^;' | ./convert-dnskey.py  > powerdns.out
awk '{print $1}' < powerdns.out > powerdns.out.txt
python roca/detect.py  powerdns.out.txt

Then, if detect actually detects anything, grep for the modulus in powerdns.out to find the affected DNSKEY.

@ph4r05
Copy link
Member

ph4r05 commented Oct 16, 2017

thanks for suggestion! will check that

@Habbie
Copy link
Author

Habbie commented Nov 4, 2017

The script+twoliner above has now been verified to indeed recognize a vulnerable key.

@ph4r05
Copy link
Member

ph4r05 commented Nov 5, 2017

Thanks for the check. I am also a bit busy now so I won't get to that.

One option is to add this twoliner check to the README.

Another option is to create a new detection file, add it to entry_points in setup.py according to the contribution guidelines.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants