I may not be guru working 10 years on DNS, but I know difference between
algorithm 5 and algorithm 7. I even think why 7 were required to keep
backward compatibility.

What I mean here is NSEC3 hash algorithm:

https://www.iana.org/assignments/dnssec-nsec3-parameters/dnssec-nsec3-parameters.xhtml#dnssec-nsec3-parameters-3

I thought it is not a problem, because it contains multiple iterations.
Yet popular TLD has iterations==0. This is about how hash of name is
created from original Next Hashed Owner Name. No other algorithm for
this is defined.

My conclusion is owner name hash is not security sensitive. But I never
saw that written in and RFC I read. I cannot say I read or know all
relevant drafts. Is it obvious to everyone but me?

This is primary reason why I cannot accept ever failing SHA-1 digest
from crypto library. RHEL7 in FIPS mode failed when MD5 were used. That
helped to catch whatever is using md5, thus might be insecure. This must
not happen with SHA-1, because NSEC3 does not have any equivalent and
cannot work without it. Regardless used key algorithm, unless I am mistaken.

On 3/23/22 19:21, Brian Dickson wrote:
>
>
> On Wed, Mar 23, 2022 at 9:22 AM Petr Menšík <pemen...@redhat.com> wrote:
>
>     Because NSEC3 algorithm still does not have any alternative to
>     SHA-1, hard crypto failure would be blocker for any our DNS
>     products. I haven't heard about it even being considered this way.
>
>
> I think this is a relatively common misconception. (I recently
> discovered that I also misunderstood the situation.)
>
> The first couple of algorithms specifically meant for NSEC3 use were
> basically duplicates of algorithms that were NSEC-only, with new
> algorithm numbers.
> As I understand it, this was to ensure interoperability, in part due
> to earlier implementations which would not be aware of NSEC3. 
> The new algorithms were a way of ensuring only updated software (which
> could be guaranteed based on the algorithms being "new") would be
> expected to understand (i.e. validate) NSEC3.
>
> After that point, all new algorithms are both NSEC and NSEC3.
>
> I believe that means you should be free to update to newer algorithms.
> I would recommend both using Algorithm 13, and potentially moving away
> from NSEC3 unless you have a strong reason for using it.
>
> Or are you talking about what algorithms your software supports, in
> which case this should be simple enough (to allow NSEC3 on newer
> algorithms).
>
> Brian

-- 
Petr Menšík
Software Engineer
Red Hat, http://www.redhat.com/
email: pemen...@redhat.com
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to