Forum Discussion
BIGIP BIND for CVE-2022-38177
- Nov 24, 2022
If you don't have BIG-IP DNS provisioned then BIND should not be provisioned for end-user access.
If it is enabled then you can use the ZoneRunner interface to make the modification to the configuration. https://support.f5.com/csp/article/K6963
I believe DNS Cache/DNS Express don't rely on BIND (they are built into TMM) so should not be vulnerable to this issue.
Hello F5_Design_Engineer
My version is 15.1.6 so there is no patch which can fix it.
And we would like to do mitigation in this situation, which is disabled the algorithms.
Hi SolarJeans ,
For 15.1.x OS version following ciphers will get impacted , see the last column for 256 or 384
when you will disable
disable-algorithms "." {
"ECDSAP256SHA256";
"ECDSAP384SHA384";
};
If any of the keys using these CIPHERS will cause error till the key validation time not expired based on ttl.
https://support.f5.com/csp/article/K86554600
ECDHE-ECDSA-AES128-GCM-SHA256 (0xc02b) | 128 | TLS1.2 | ECDHE | ECDSA | AES-GCM | SHA256 |
ECDHE-ECDSA-AES128-SHA (0xc009) | 128 | TLS1, TLS1.1, TLS1.2 | ECDHE | ECDSA | AES | SHA |
ECDHE-ECDSA-AES128-SHA256 (0xc023) | 128 | TLS1.2 | ECDHE | ECDSA | AES | SHA256 |
ECDHE-ECDSA-AES256-GCM-SHA384 (0xc02c) | 256 | TLS1.2 | ECDHE | ECDSA | AES-GCM | SHA384 |
ECDHE-ECDSA-AES256-SHA (0xc00a) | 256 | TLS1, TLS1.1, TLS1.2 | ECDHE | ECDSA | AES | SHA |
ECDHE-ECDSA-AES256-SHA384 (0xc024) | 256 | TLS1.2 | ECDHE | ECDSA | AES | SHA384 |
ECDHE-ECDSA-CHACHA20-POLY1305-SHA256 (0xcca9) | 256 | TLS1.2 | ECDHE | ECDSA | CHACHA20-POLY1305 | NULL |
ECDH-ECDSA-AES128-GCM-SHA256 (0xc02d) | 128 | TLS1.2 | ECDH | ECDSA | AES-GCM | SHA256 |
ECDH-ECDSA-AES128-SHA (0xc004) | 128 | TLS1, TLS1.1, TLS1.2 | ECDH | ECDSA | AES | SHA |
ECDH-ECDSA-AES128-SHA256 (0xc025) | 128 | TLS1.2 | ECDH | ECDSA | AES | SHA256 |
ECDH-ECDSA-AES256-GCM-SHA384 (0xc02e) | 256 | TLS1.2 | ECDH | ECDSA | AES-GCM | SHA384 |
ECDH-ECDSA-AES256-SHA (0xc005) | 256 | TLS1, TLS1.1, TLS1.2 | ECDH | ECDSA | AES | SHA |
ECDH-ECDSA-AES256-SHA384 (0xc026) | 256 | TLS1.2 | ECDH | ECDSA | AES | SHA384 |
You can refer
K55150974: ECDSA algorithm is currently not supported for DNSSEC in DNS cache
https://support.f5.com/csp/article/K55150974
https://support.f5.com/csp/article/K55150974
https://support.f5.com/csp/article/K54424313
you can also refer
Zone Signing Key
Navigate to: DNS ›› Delivery : Keys : DNSSEC Key List
https://f5-agility-labs-dns.readthedocs.io/en/repo_cleanup/class2/module4/lab1.html
You can also see
signature-valid-period
- SolarJeansNov 23, 2022Cirrus
Hello,
Thanks for your explanation.
If only LTM or LC provisioned, how can I disable the algorithm in BIND?
I check the KB and named.conf is configure in DNS module.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com