On Mon, Oct 01, 2018 at 08:06:25PM -0700, Diane Trout wrote:
> On Mon, 2018-10-01 at 20:23 +0200, Lee Garrett wrote:
> > Hi,
> > 
> > Any update on this bug? dnssec-trigger will be autoremoved due to
> > this bug
> > tomorrow. I'd like to see it in buster, though.
> 
> 
> 
> Ooops I forgot, Also does this bug impact unbound? I tried checking the
> unbound maintainer scripts and they're not doing anything to handle
> this case
> 
> What's 
> sudo -s openssl x509 \
>   -in /etc/dnssec-trigger/dnssec_trigger_control.pem  -text | \
>   grep 'Public-Key'
> 
> Look like on an effected system?

I can't tell you for certain anymore, since I regenerated the key, but
I ran a similar command at the time and it was 1536-bit.

> On mine is 3072, and I don't seem to be impacted.
> 
> I'm guessing I can use that to determine if I need to regenerate the
> key

Yes, that would be fine.  Anything smaller than 2048 bits would require
regeneration.

> The other option is to just delete the key and regenerate it on the
> specific version upgrade.

If you're relying on the keygen target, note that as of the time I filed
this bug report, it wrote the keys into the wrong location.  I haven't
checked if it's been fixed.
-- 
brian m. carlson: Houston, Texas, US
OpenPGP: https://keybase.io/bk2204

Attachment: signature.asc
Description: PGP signature

Reply via email to