Forum Discussion
BIGIP BIND for CVE-2022-38177
- Nov 23, 2022
If you don't have BIG-IP DNS provisioned then BIND should not be provisioned for end-user access.
If it is enabled then you can use the ZoneRunner interface to make the modification to the configuration. https://support.f5.com/csp/article/K6963
I believe DNS Cache/DNS Express don't rely on BIND (they are built into TMM) so should not be vulnerable to this issue.
Hi SolarJeans ,
For 15.1.x OS version following ciphers will get impacted , see the last column for 256 or 384
when you will disable
disable-algorithms "." {
"ECDSAP256SHA256";
"ECDSAP384SHA384";
};
If any of the keys using these CIPHERS will cause error till the key validation time not expired based on ttl.
https://support.f5.com/csp/article/K86554600
| ECDHE-ECDSA-AES128-GCM-SHA256 (0xc02b) | 128 | TLS1.2 | ECDHE | ECDSA | AES-GCM | SHA256 |
| ECDHE-ECDSA-AES128-SHA (0xc009) | 128 | TLS1, TLS1.1, TLS1.2 | ECDHE | ECDSA | AES | SHA |
| ECDHE-ECDSA-AES128-SHA256 (0xc023) | 128 | TLS1.2 | ECDHE | ECDSA | AES | SHA256 |
| ECDHE-ECDSA-AES256-GCM-SHA384 (0xc02c) | 256 | TLS1.2 | ECDHE | ECDSA | AES-GCM | SHA384 |
| ECDHE-ECDSA-AES256-SHA (0xc00a) | 256 | TLS1, TLS1.1, TLS1.2 | ECDHE | ECDSA | AES | SHA |
| ECDHE-ECDSA-AES256-SHA384 (0xc024) | 256 | TLS1.2 | ECDHE | ECDSA | AES | SHA384 |
| ECDHE-ECDSA-CHACHA20-POLY1305-SHA256 (0xcca9) | 256 | TLS1.2 | ECDHE | ECDSA | CHACHA20-POLY1305 | NULL |
| ECDH-ECDSA-AES128-GCM-SHA256 (0xc02d) | 128 | TLS1.2 | ECDH | ECDSA | AES-GCM | SHA256 |
| ECDH-ECDSA-AES128-SHA (0xc004) | 128 | TLS1, TLS1.1, TLS1.2 | ECDH | ECDSA | AES | SHA |
| ECDH-ECDSA-AES128-SHA256 (0xc025) | 128 | TLS1.2 | ECDH | ECDSA | AES | SHA256 |
| ECDH-ECDSA-AES256-GCM-SHA384 (0xc02e) | 256 | TLS1.2 | ECDH | ECDSA | AES-GCM | SHA384 |
| ECDH-ECDSA-AES256-SHA (0xc005) | 256 | TLS1, TLS1.1, TLS1.2 | ECDH | ECDSA | AES | SHA |
| ECDH-ECDSA-AES256-SHA384 (0xc026) | 256 | TLS1.2 | ECDH | ECDSA | AES | SHA384 |
You can refer
K55150974: ECDSA algorithm is currently not supported for DNSSEC in DNS cache
https://support.f5.com/csp/article/K55150974
https://support.f5.com/csp/article/K55150974
https://support.f5.com/csp/article/K54424313
you can also refer
Zone Signing Key
Navigate to: DNS ›› Delivery : Keys : DNSSEC Key List
https://f5-agility-labs-dns.readthedocs.io/en/repo_cleanup/class2/module4/lab1.html
You can also see
signature-valid-period
Hello,
Thanks for your explanation.
If only LTM or LC provisioned, how can I disable the algorithm in BIND?
I check the KB and named.conf is configure in DNS module.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com