Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

Paul Wouters <paul@nohats.ca> Tue, 30 April 2024 14:04 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 671FDC14F69E for <dnsop@ietfa.amsl.com>; Tue, 30 Apr 2024 07:04:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.731
X-Spam-Level:
X-Spam-Status: No, score=-3.731 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n0y0SB38hIzu for <dnsop@ietfa.amsl.com>; Tue, 30 Apr 2024 07:04:33 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10140C14F691 for <dnsop@ietf.org>; Tue, 30 Apr 2024 07:04:32 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 4VTMQ56G1yzB2g; Tue, 30 Apr 2024 16:04:29 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1714485869; bh=RVhSJhhvjHk3bv+Etf5AOdAgvnt/f8lZrasgI/hgPqc=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=XDL8KXwH8iC65ru5WBfvSCktDPMDkfhueb2Hfu0GuK8FEWKxQ2o2Ha2jyHDHTOsXb DQwEbLVv9l5ZDyZsuhEO0tstLksHT3eFjK+9DiBK3ZKFG6DV3E3mxv5L51dsL/akeA aWJsTES64+LlGH31cfPI+Z94QO0hKyUWNhZae4ss=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id kFEBbj-d5KLY; Tue, 30 Apr 2024 16:04:28 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [193.110.157.194]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 30 Apr 2024 16:04:28 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id F298011DE40D; Tue, 30 Apr 2024 10:04:27 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id EF42511DE40C; Tue, 30 Apr 2024 10:04:27 -0400 (EDT)
Date: Tue, 30 Apr 2024 10:04:27 -0400
From: Paul Wouters <paul@nohats.ca>
To: Philip Homburg <pch-dnsop-5@u-1.phicoh.com>
cc: dnsop@ietf.org
In-Reply-To: <m1s1mGR-0000PPC@stereo.hq.phicoh.net>
Message-ID: <fbce2996-346f-29fa-3534-45eaa142b96e@nohats.ca>
References: <D95A2D1F-1203-4434-B643-DDFB5C24A161@icann.org> <67B93EF4-6B70-402E-9D78-1A079538CA18@strandkip.nl> <m1s1Wur-0000LDC@stereo.hq.phicoh.net> <f0f9c0ce-2911-9b4c-0d60-47c204add2d4@nohats.ca> <m1s1mGR-0000PPC@stereo.hq.phicoh.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/NnBrIopfl7oHh3Zs-Hn6jDULYZk>
Subject: Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Apr 2024 14:04:37 -0000

On Tue, 30 Apr 2024, Philip Homburg wrote:

>> The advise is split between producing SHA1 signatures and consuming SHA1
>> signatures, and those timings do not have to be identical.
>>
>> That said, a number of OSes have already forced the issue by failing
>> SHA1 as cryptographic operation (RHEL, CentOS, Fedora, maybe more). So
>> right now, if you run DNSSEC with SHA1 (which includes NSEC3 using
>> SHA1), your validator might already return it as an insecure zone.
>>
>> I think a MUST NOT for signing with SHA1 is a no-brainer. The timing for
>> MAY on validation should be relatively short (eg 0-2 years?)
>
> What worries me about the draft is the security section. I can understand
> the desire to get rid of old crypto, but as far as I can tell
> this draft will mostly decrease security.

It will also prevent ServFails when the system crypto SHA1 for
authentication and signature purposes is blocked, and the DNS software
sees this as a failure and returns BOGUS. I am not sure how many DNS
implementations are now probing SHA1 and on failure put it in the
"unsupported algorithm" class, to serve it as insecure instead of bogus.

This issue did hit RHEL,CentOS, Fedora.

> We can accept as given that it is easy to find collisions for SHA1. However,
> a second pre-image attack is way off in the future.

I'm not too concerned about that.

> Looking at the signer part, this is not great either. Moving away from SHA1
> requires an algorithm roll-over. DNSSEC is already quite fragile and algorithm
> rolls are worse. So there is a failure risk that is too big ignore.

Yes, this fragility is why there are still zones using SHA1 at all. But
I think software and DNS services have no matured to the point where it
is save to do. Eg bind, opendnssec, knot.

> This draft requires zones that do not have a collision risk to move to a
> different algorithm, at a significant risk, but there is no increase in
> security. So that part is also a net negative for security.

Staying at SHA1 incurs the above risk of SHA1 leading to Bogus/ServFail.

> So it seems that we are asked to adopt a draft that will mostly reduce
> security, not increase it.

It prevents zone outages.

> There might be other arguments for adopting the draft, such a Redhat not
> validating signatures with SHA1 anymore. But those arguments are not
> mentioned in the draft.

I guess these considerations can be added to the draft if the WG wants?

> And if some companies from one country want to shoot themselves in the foot,
> does the rest of the world have to follow?

The IETF and its cryptographic policies are a careful interworking
between market forces, reality and desire. Moving to fast leads to RFCs
being ignored. Moving too slow means RFCs do not encourage
modernization. Every other protocol has left SHA1 behind. It's time for
DNS to follow suit. It's had its "exemption" for a few years already.

Paul