[DNSOP] Re: Questions before adopting must-not-sha1

Paul Wouters <paul@nohats.ca> Mon, 18 November 2024 14:37 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D222C151707 for <dnsop@ietfa.amsl.com>; Mon, 18 Nov 2024 06:37:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.739
X-Spam-Level:
X-Spam-Status: No, score=-3.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7yzIdx9668yd for <dnsop@ietfa.amsl.com>; Mon, 18 Nov 2024 06:37:45 -0800 (PST)
Received: from mx.nohats.ca (mx.nohats.ca [193.110.157.85]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 296EAC14F5F5 for <dnsop@ietf.org>; Mon, 18 Nov 2024 06:37:45 -0800 (PST)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4XsVbC168ZzChR; Mon, 18 Nov 2024 15:37:43 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1731940663; bh=BsIa4yLQDDoV+pzmHPRqhV0vHM1YHRXdbLG1zxol1XI=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=qLXKu/Los5D5VhXXsEkD7VUkDTXCpAzCuI/AqNQnUHhxD96xd/+2rKgoEuPPMmkm0 M/QCYt1LTKCQ8oYnbHERISYAJzWZ1WmJzC/0TsYpBIwb/QrhmjYR9X41Hbe7T6kSUE XvInygrERKGXYYg7FJrXyrJzqCRZRkhdDsrsquiM=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id hf2Xh69Eth6S; Mon, 18 Nov 2024 15:37:42 +0100 (CET)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Mon, 18 Nov 2024 15:37:42 +0100 (CET)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 0FE1E1418CE7; Mon, 18 Nov 2024 09:37:41 -0500 (EST)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 0AA5B1418CE6; Mon, 18 Nov 2024 09:37:41 -0500 (EST)
Date: Mon, 18 Nov 2024 09:37:40 -0500
From: Paul Wouters <paul@nohats.ca>
To: Philip Homburg <pch-dnsop-6@u-1.phicoh.com>
In-Reply-To: <m1tCgx2-0000LZC@stereo.hq.phicoh.net>
Message-ID: <ff43e5c5-ad80-b618-24fe-ffec6d128630@nohats.ca>
References: <D95A2D1F-1203-4434-B643-DDFB5C24A161@icann.org> <67B93EF4-6B70-402E-9D78-1A079538CA18@strandkip.nl> <m1s1Wur-0000LDC@stereo.hq.phicoh.net> <f0f9c0ce-2911-9b4c-0d60-47c204add2d4@nohats.ca> <DB9D1C93-95D1-4B76-AD74-4C60433D479A@icann.org> <7dd5f090-b8b7-ea5e-82f2-d622298c7299@nohats.ca> <ybl7cgejxcr.fsf@wd.hardakers.net> <4907A4B7-1EAE-460D-91E8-4F7D292C7302@icann.org> <ybl34r2jv3n.fsf@wd.hardakers.net> <0334D9C1-F066-460A-893B-C4075FD0BE07@icann.org> <0e5914c7-d3fa-443c-8099-1b5bad39a50e@redhat.com> <m1tBFqG-0000LkC@stereo.hq.phicoh.net> <929e319c-7797-45ac-bdae-ed76d7659e23@redhat.com> <m1tCgx2-0000LZC@stereo.hq.phicoh.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-ID-Hash: RYHXQJDI7O3G5MCP52K6S5IE3LZ27X32
X-Message-ID-Hash: RYHXQJDI7O3G5MCP52K6S5IE3LZ27X32
X-MailFrom: paul@nohats.ca
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: dnsop@ietf.org, Petr Menšík <pemensik@redhat.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Questions before adopting must-not-sha1
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/45bFFfgIRdf6bYLK_tZQiqPcO0Q>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

On Sun, 17 Nov 2024, Philip Homburg wrote:

[indeed a bit offtopic]

>> Use OPENSSL_CONF environment to point to conf file containing:
>>
>> .include = /etc/ssl/openssl.cnf
>> [evp_properties]
>> rh-allow-sha1-signatures = yes
>>
>> That is all needed to get SHA1 verification in DNSSEC back, without
>> accepting SHA1 in TLS connections at the same time. Cool, eh?
>
> At the risk of going off-topic, it seems that Red Hat is shipping packages
> with unbound is compiled without support for RSASHA1. So this trick is
> unlikely help.

Correct, it is now compiled using --disable-sha1. I think it would be
better to enable this again, assuming unbound now has proper code to
detect if sha1 is failing or not during runtime. Then the
crypto-policies can be used to enable this again. If this was a
dedicated container/host, it could simply use:

update-crypto-policies --set LEGACY

It seems "sha1_in_dnssec" has been obsoleted. I do not know what this
was done, I think it was a perfectly fine method to create a crypto
policy submodule only enabling sha1 for DNSSEC.

Paul