Subject: | Failure to validate signatures made by long keys |
I've run across problems with software that is depending on Net::DNS::SEC v0.16 that I've
traced to failure to verify signatures generated by RSA/SHA256 and RSA/SHA512 keys if the
keylength is > 3000 bits. My perl is 5.10.0
I.e. "dnssec-keygen -a rsasha512 -b 3000 ..." generates a key for which signatures can be
validated, while "dnssec-keygen -a rsasha512 -b 3001 ..." generates signatures that are not
validatable by Net::DNS::SEC
As both RSA/SHA256 and RSA/SHA512 specify a key length up to 4096 this is clearly a bug
somewhere.
I apologize for the somewhat less than precise report. I have logs and error messages on a
disk that's unfortunately presently missing among the rest of my luggage. When I get time I'll
try to recreate the problem exactly (or hopefully my luggage finds me ;-)).
Johan