Yoav Nir via Datatracker <nore...@ietf.org> writes: > In the introduction, we have "DNSSEC [RFC9364] originally made extensive use > of > SHA-1 as a cryptographic verification algorithm ... Since then, multiple other > signing algorithms with stronger cryptographic strength are now widely > available..." > > RFC 9364 is from 2023. The algorithms in question (like SHA-256) did not pop > up > "since then". The extensive use of SHA-1 has been since RFC 3110 from 2001. I > believe that should be the referenced document.
That's a good point. I changed it to double-reference: DNSSEC [RFC9364] originally [RFC3110]... > The other issue is with the security considerations section. It says, "This > document reduces the risk that a zone cannot be validated due to lack of SHA-1 > support in a validator". To me, that's an operational consideration - don't > use this because many validations don't support it. The security consideration > should be that RSA signatures with the SHA-1 has are no longer considered > secure (already stated in the introduction), and that is why validators are > dropping it and why you implementer should also drop it. Also a good point. How is this as a replacement: This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1 signatures since they are no longer considered to be secure. -- Wes Hardaker USC/ISI _______________________________________________ DNSOP mailing list -- dnsop@ietf.org To unsubscribe send an email to dnsop-le...@ietf.org