See our I-D on lifecycle.  It addresses this issue squarely.  I'm about to
to dinner and can't fill in the details.  I'll do so later if someone
hasn't already.

Steve

Sent by a Verified

sender


On Wed, Nov 13, 2024 at 7:04 PM Philip Homburg <pch-dnso...@u-1.phicoh.com>
wrote:

> >Tony Finch has correctly identified in SHA-1 chosen prefix collisions
> >and DNSSEC [3] article that when a single record is usually safe,
> >multiple records might allow creating fake signature even in DNSSEC.
>
> There are two types of attacks on hash functions: collisions and second
> pre-image attacks.
>
> There is no practical 2nd pre-image attack for SHA-1, so we can concentrate
> on collision attacks. A collision attack requires that the victim to
> accepts malcious data from an attacker
>
> There are many, proably even the majority of DNSSEC signed domains,
> where this is not an issue. Attackers cannot influence the contents of a
> zone. In those cases, using SHA-1 is secure.
>
> Obviously we need to move away from SHA-1 as fast as possible. But we do
> those domains a disservice if we treat them as insecure. In
> particular, DANE will stop working if a domain is considered insecure.
>
> We already see the operational impact. People with RedHat systems notice
> that DANE suddenly stops working. They have no clue where is coming from,
> they just see that unbound doesn't set the AD bit.
>
> The solution should be that RedHat provides a way to link with a different
> crypto library that does support RSASHA1.
>
>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-le...@ietf.org
>
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to