Re: [DNSOP] on staleness of code points and code (mentions MD5 commentary from IETF98)

Philip Homburg <> Tue, 28 March 2017 10:38 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 0DD8E1294D1 for <>; Tue, 28 Mar 2017 03:38:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id skIAMpe2WMUX for <>; Tue, 28 Mar 2017 03:38:00 -0700 (PDT)
Received: from ( [IPv6:2001:888:1044:10:2a0:c9ff:fe9f:17a9]) by (Postfix) with ESMTP id C8DC6129353 for <>; Tue, 28 Mar 2017 03:37:59 -0700 (PDT)
Received: from (localhost [::ffff:]) by with esmtp (Smail #130) id m1csoVf-0000FDC; Tue, 28 Mar 2017 12:37:55 +0200
Message-Id: <>
Cc: Tony Finch <>
From: Philip Homburg <>
References: <> <> <>
In-reply-to: Your message of "Tue, 28 Mar 2017 11:01:01 +0100 ." <>
Date: Tue, 28 Mar 2017 12:37:54 +0200
Archived-At: <>
Subject: Re: [DNSOP] on staleness of code points and code (mentions MD5 commentary from IETF98)
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 28 Mar 2017 10:38:02 -0000

In your letter dated Tue, 28 Mar 2017 11:01:01 +0100 you wrote:
>Evan Hunt <> wrote:
>> MD5 is known to be breakable, but it's not *as* breakable that hasn't been
>> signed, or a resolver that hasn't turned on validation.
>It features Postscript, PDF/JPEG, and GIF MD5 quines (where the MD5 hash
>of the document appears in the text of the document itself) and is itself
>an MD5 quine in two different ways (PDF and NES ROM polyglot).

What makes it bad in the case of DNSSEC is that in various ways DNSSEC
validators indicate to the user that a result is validated without also 
reporting the algorithm(s) used.

So for any piece of client code that takes a security decision based on that
data, allowing weak algorithms or parameters means that either all of DNSSEC
should be treated as insecure, or potentially insecure configurations are
without warning treated as secure.

So if would be best if a validator that implements MD5 would still return 
NXDOMAIN is validation fails, but would keep the AD-bit clear even if validation
passes for a domain signed using MD5.