> e.g. as other OS vendors follow suit and SHA-1 support
> disappears from crypto libraries.

As described by Mark Andrews, one thing that made the Redhat situation more
complex is that they didn't just remove SHA1 signing support, they modified
openssl to return bogus RSA valdation results at runtime. Which requires
very specific detection techniques on the side of validation software. So
the SHA1 support is there, it is just made unreliable.

Going beyond Redhat, BGP is still using MD5. That's not going away.
NSEC3 uses SHA1 that is also not going away soon, Git uses SHA1. So the
risk of SHA1 getting removed from crypto libraries is extremely small.
Even NIST, which recommends against using SHA1 in signing has carved out
exceptions.

So maybe we can wait until implementors speak up that is hard to support
those old algorithms?

> There are other reasons to deprecate SHA-1 in DNSSEC than mathematical
> concern about the use of that particular digest algorithm in the
> protocol. Problems with SHA-1 definitively exist in other places,
> in protocols that are in much more widespread use than DNSSEC. For
> example, a message that says "stop using SHA-1" might be more
> effective at fixing TLS implementations than a message that says
> "stop using SHA-1 unless you are using it in one of the following
> ways, in which case it's totally fine". From the perspective of
> DNSSEC, "stop using SHA-1" might be a much more effective message
> to communicate at the same time that everybody else is saying it
> than ten years later.

There have been quite a number of non-technical arguments used in this
discussion. I'll list a few.

1) It is already broken (because Redhat broke it). It don't see how it is
   better to break it some more.

2) We are late, we should have remove SHA1 support years ago.

3) The above quote, we need to lead the pack and remove SHA1 to help others.
   I find the combination of 2) and 3) quite funny.

4) We need to set an end date. We still have the WKS record which has not seen
   any use for decades and the presentation format is a pain to implement.
   But that one is still there. But we really need to get rid of something
   that is in active use. Maybe we can have a guideline that we first
   deprecate what has been obsolete by decades before we start with
   what is currenly in use?

5) People are using old software. We don't even know if people are old
   software to sign using SHA1. But even then, do we really want go and
   break protocols just to move people to newer software. Is that productive?

6) There are about 140k zones signed using SHA1. That's a small number we
   don't have to care. If find this confusing. The biggest problem we have
   is getting people to sign there zones in the first place (and adding
   transport security). But we have time to just kill 140k signed for
   no technical reasons?

In the end the current draft has a strong negative effect on the direct
and indirect users of about 140k zones. Indirect use might also be if there
are DANE records in those zones and the use of DANE by the sender of an
email will silently stop after a validator lists the domain as insecure.

>From a technical point of view, there is no second preimage attack on SHA1,
it will probably take a quantum computer to perform one. And if that's
the case then we will have to deprecate RSA, rendering the issue moot.

What are the positive points of this draft? Checking a box that there is now
a little bit less SHA1? It doesn't seem to bring any meaningful increase
in security.

The impact on validation software may also be very annoying. Validation 
software will have to default to not support SHA1 in signing to implement
this draft. But no doubt there will be customers who do need SHA1 support.
So there will be a config option. And the config option will be there 
until the end of time. Effectively leading to more complexity.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to