Skip to main content

Deprecating the use of SHA-1 in DNSSEC signature algorithms
draft-ietf-dnsop-must-not-sha1-09

Yes

Erik Kline

No Objection

Andy Newton
Gorry Fairhurst
Jim Guichard
Mahesh Jethanandani

Note: This ballot was opened for revision 04 and is now closed.

Deb Cooley
Yes
Comment (2025-05-16 for -06) Not sent
Thanks to Yoav Nir for their secdir reviews.
Erik Kline
Yes
Mohamed Boucadair
(was Discuss) Yes
Comment (2025-05-22 for -08) Sent for earlier
Hi Wes/Warren,

Thank you for the discussion and for taking care of the comments raised in my initial ballot [1].

-08 has still a stale normative reference to draft-ietf-dnsop-algorithm-update. Wes already merged the PR to fix that [2]. I trust that to be in -09.

Cheers,
Med

[1] https://mailarchive.ietf.org/arch/msg/dnsop/eUM1DT_ttH6dy4VAvS7sf17OYKg/

[2] https://github.com/ietf-wg-dnsop/draft-ietf-dnsop-must-not-sha1/commit/984686b876eca148ee0dcd43911f2813392cbc79
Paul Wouters
(was Discuss) Yes
Comment (2025-05-26 for -08) Sent
Thanks for addressing my DISCUSS points and some of my comments. I have updated my ballot to Yes.

I'll leave the one comment here below that didn't get incorporated in some way :)


In the Operational Considerations, one could add a sentence about the difference of not supporting SHA-1 versus
having a system that does not support SHA-1. The first results in an insecure validation, which is okay. The second
can result in ServFail, which is not okay. Something along the lines of:

      When not supporting or disabling SHA-1, care should be given by implementers that the DNS software itself is made
      aware not to consume SHA-1. For example, disabling SHA-1 at the Operating System level could result in SHA-1 cryptographic
      failures within the DNS system, which would result in those zones failing, instead of the zones being treated as unsigned/insecure
Éric Vyncke
Yes
Comment (2025-03-31 for -04) Not sent
This document is part of a group of 3 I-D. I suggest to start
reviewing draft-ietf-dnsop-rfc8624-bis first.
Andy Newton
No Objection
Gorry Fairhurst
No Objection
Gunter Van de Velde
No Objection
Comment (2025-05-20 for -06) Sent
Thanks for this write up. It reads and explains the reasoning well. 

The idnits tool spawns some messages.
 
I have a single idnit observation on this draft. 

74	   RRSIG and Delegation Signer (DS) records, for example.  Since then,
75	   multiple other algorithms with stronger cryptographic strength are
76	   now widely available for DS records and for DNSKEY and RRSIG records.
77	   Readers are encouraged to consider switching to one of the
78	   recommended algorithms listed in the [DNSKEY-IANA] and [DS-IANA]
79	   tables, respectively. 

GV> I am not that familiar with DNSSEC and had to lookup DNSKEY and RRSIG records reference.
Could a reference (rfc4034) be explicitly added for these? Potentially when more familiar with these technologies it is obvious and are well known records through.


Be well,
G/
Jim Guichard
No Objection
Ketan Talaulikar
No Objection
Comment (2025-05-16 for -06) Sent
Thanks to the authors and the WG for this document.

Even though there is no "historic" element in the context of this document as it was for ECC-GOST document, please check/consider if any of those approaches (that I provided in my comments on the ECC-GOST document) are applicable for this document as well.
Mahesh Jethanandani
No Objection
Mike Bishop
No Objection
Comment (2025-05-19 for -06) Sent
Section 1:

The current phrasing of the second sentence in the Introduction suggests that the use of SHA-1 by DNSSEC is an example of its diminishing security; I suspect that's not the intended reading.

CURRENT: DNSSEC [RFC9364] originally [RFC3110] made extensive use of SHA-1 as a cryptographic hash algorithm in RRSIG and Delegation Signer (DS) records, for example.
CONSIDER: DNSSEC [RFC9364] originally [RFC3110] made extensive use of SHA-1, for example as a cryptographic hash algorithm in RRSIG and Delegation Signer (DS) records. 

"are now" => "have become"

Section 2:

"MAY wish to" requires an RFC6919 reference (see https://datatracker.ietf.org/doc/html/rfc6919#section-6) and associated boilerplate. Instead, "MAY" is sufficient here. However, that seems in direct contradiction to the MUST in the first sentence. Is the intended sense here that implementations MUST retain the ability to validate, but SHOULD/MAY disable it by default?
Orie Steele
No Objection
Comment (2025-05-19 for -06) Not sent
Roman Danyliw
No Objection
Comment (2025-05-19 for -06) Sent
Thank you to Behcet Sarikaya for the GENART review.

** Section 1 and 2.

-- Section 1. “Further, support for validating SHA-1 based signatures has been removed from some systems.”

-- Section 2. “Validating resolver implementations MUST continue to support validation using these algorithms as they are diminishing in use but still actively in use for some domains as of this publication.”

Are these text snippets saying that implementation have already chosen to drop SHA-1 support, despite this draft saying it should not be?

** Section 1.
   As adequate
   alternatives exist, the use of SHA-1 is no longer advisable.

Doesn’t Section 2 say something much stronger than “no longer advisable”.  It uses “MUST NOT”.

** Section 3.
   This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1
   signatures since they are no longer considered to be secure.

Isn’t this imprecise? The prior seems to leave wide latitude to validating resolvers to continue to validate SHA1-based signatures.  Maybe

NEW (roughly)
This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1 signatures in new DNSSEC records since these algorithms are no longer considered to be secure.