In article <2914db1a-f7a3-4f1b-a2f0-da054b447...@icann.org> you write:
>If we can determine when something in the realm of "almost all" DNSEC signing 
>with algorithms that use SHA-1 is
>done, then it is reasonable for the WG to propose that software that validates 
>DNSSEC can stop doing so.

FWIW, the 2007 DKIM spec said that RSA keys SHOULD be at least 1024
bits but allowed 512 bits as what we intended as a short transition.
In fact, vast amounts of mail continued to have 512 bit signatures and
ignored all the pleas and warnings until 2012 when Google told the
world that they'd stop validating 512 bit signatures.  At that point
in about a week, everyone fixed their signers to use 1024.

The people who run DNS servers and the ones who run mail servers are often
not the same, but I don't see any reason to think DNS operators are any
less lazy.

What this tells me is that the IETF cannot make credible threats of
this kind, so don't try.  People will stop signing with SHA-1 when
large DNSSEC consumers stop accepting it.  Comcast, perhaps.
-- 
Regards,
John Levine, jo...@taugh.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. https://jl.ly

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to