This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: ccc3100c-0fdd-4a5e-9908-c10107291860
Cloud Provider: gcp
Framework: Terraform
Severity: Medium
Category: Encryption
Learn More
Description
DNSSEC should not use the RSASHA1 algorithm, which is considered weak and vulnerable to cryptographic attacks. If a dnssec_config
block contains a default_key_specs
attribute with algorithm = "rsasha1"
, attackers may be able to exploit known weaknesses in the algorithm to forge DNS records, potentially redirecting users to malicious sites or causing other security issues. Instead, use a stronger algorithm such as rsasha256
:
dnssec_config {
default_key_specs {
algorithm = "rsasha256"
}
}
Compliant Code Examples
resource "google_dns_managed_zone" "negative1" {
name = "example-zone"
dns_name = "example-${random_id.rnd.hex}.com."
description = "Example DNS zone"
labels = {
foo = "bar"
}
dnssec_config {
default_key_specs{
algorithm = "rsasha256"
}
}
}
Non-Compliant Code Examples
resource "google_dns_managed_zone" "positive1" {
name = "example-zone"
dns_name = "example-${random_id.rnd.hex}.com."
description = "Example DNS zone"
labels = {
foo = "bar"
}
dnssec_config {
default_key_specs{
algorithm = "rsasha1"
}
}
}