[DNSOP] Re: Questions before adopting must-not-sha1

Steve Crocker <steve@shinkuro.com> Wed, 13 November 2024 16:11 UTC

Return-Path: <steve@shinkuro.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4849FC180B4D for <dnsop@ietfa.amsl.com>; Wed, 13 Nov 2024 08:11:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=shinkuro-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3u_tnIsVTsx5 for <dnsop@ietfa.amsl.com>; Wed, 13 Nov 2024 08:11:00 -0800 (PST)
Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com [IPv6:2607:f8b0:4864:20::1036]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BF573C1DC7FC for <dnsop@ietf.org>; Wed, 13 Nov 2024 08:11:00 -0800 (PST)
Received: by mail-pj1-x1036.google.com with SMTP id 98e67ed59e1d1-2e9e377aeadso1939718a91.1 for <dnsop@ietf.org>; Wed, 13 Nov 2024 08:11:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shinkuro-com.20230601.gappssmtp.com; s=20230601; t=1731514260; x=1732119060; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=4IzBGK/RV1ExFG7h8SMPEE6TAOhoPrljOYSQkMSUEjU=; b=slxGyhs6iitRn0DSsboJSA3cNOFnnQvqC1gYPmPnGjtGlHNfmbJIvosqTjnq8NI3Ox TV2uWUhQKL3ZcixwitVgHm0ivTq8r6llxzJ+S74hZf68XuHsvWCuBg2QAiYIEGp6g6qf YPX7OTA3fDwbtr1Pxmv043adiKwkZsGNMcTR5DgJUSWc0iwNyFtrMLxgVR82o/BQjFHR Bt1XUFtm6LUOYf1kagGiE9QyuBnY92ieBQMkPQkE3sNq5VbIf1cDNFQNtwyIgFrUroBw ZnEtlSSQPO2kKbuPQxzHIeap1ld3hofX73AfGIMgVgOr+RdOzyL3un3jflJuMV+8jaVg rUSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731514260; x=1732119060; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=4IzBGK/RV1ExFG7h8SMPEE6TAOhoPrljOYSQkMSUEjU=; b=vbNnV/NqmP1xu/OUIYvbDIRezT6SPihe9JVg1WJadI+f4GY4zobtT2lRbQQB6S+ae5 7LjadgLnJ/j5oIcJY85IRJVxkQS5eFaCWfKqMhlSFoGiEhiNH8v4egk06wQT+sHoN3A6 r66okdl2QPLxpm0SSevwHOQ3bHK4a8bKRfxOK7HVGtH/jCWv4E1c23A036kP87MrYeIb Jz3dif2wdRMM0oYCVvQxeAnO8W7lBgxophxwgr29w43re2PAOHbNzDOKWJy7CpeUiBGb PdEJ2VhA/gVvX6Q+Ut63XJ5RwB5vpwhXQNmqcjyOjmSQms9WRsuZgW7sFqUWmc/vj5Ok aleQ==
X-Gm-Message-State: AOJu0YwNybwjoN1YULB49QqFuwSJhzfz6ULa6V2XVNSBQXHAJBddoKqt IITjD7Q4U/NhNAKNs3j2e0BzZTCIGRh7HCroZhARS3efePKlj1EKcREcQXWN7LCQbVWBlFZ9sH/ Q1MVNPDMZdxYVGOxMdpaRD5d7I6G+DI8exYAAkjZscr06rwKJSQY=
X-Google-Smtp-Source: AGHT+IH6+tpxrT2ZyTbBLsBpfqoC5Vyc8hlCd5GXan+h4sYC4UptbplH094uppK65ER7R3Gvy6nTdKGsJrqiTzGrLp8=
X-Received: by 2002:a17:90a:e7c3:b0:2e2:b462:1d21 with SMTP id 98e67ed59e1d1-2e9f2c74a38mr4036377a91.10.1731514259807; Wed, 13 Nov 2024 08:10:59 -0800 (PST)
MIME-Version: 1.0
References: <D95A2D1F-1203-4434-B643-DDFB5C24A161@icann.org> <67B93EF4-6B70-402E-9D78-1A079538CA18@strandkip.nl> <m1s1Wur-0000LDC@stereo.hq.phicoh.net> <f0f9c0ce-2911-9b4c-0d60-47c204add2d4@nohats.ca> <DB9D1C93-95D1-4B76-AD74-4C60433D479A@icann.org> <7dd5f090-b8b7-ea5e-82f2-d622298c7299@nohats.ca> <ybl7cgejxcr.fsf@wd.hardakers.net> <4907A4B7-1EAE-460D-91E8-4F7D292C7302@icann.org> <ybl34r2jv3n.fsf@wd.hardakers.net> <0334D9C1-F066-460A-893B-C4075FD0BE07@icann.org> <0e5914c7-d3fa-443c-8099-1b5bad39a50e@redhat.com> <m1tBFqG-0000LkC@stereo.hq.phicoh.net>
In-Reply-To: <m1tBFqG-0000LkC@stereo.hq.phicoh.net>
From: Steve Crocker <steve@shinkuro.com>
Date: Wed, 13 Nov 2024 19:10:48 +0300
Message-ID: <CABf5zvLLqfPDJk9dbVP-Qsg2T06Kr3BvfqJ3obf+R44SqZwRNA@mail.gmail.com>
To: Philip Homburg <pch-dnsop-6@u-1.phicoh.com>
Content-Type: multipart/alternative; boundary="000000000000613ec90626cd9421"
Message-ID-Hash: NBY23B7ZLAV52HBMMQIOQ5RUHMDHEVCD
X-Message-ID-Hash: NBY23B7ZLAV52HBMMQIOQ5RUHMDHEVCD
X-MailFrom: steve@shinkuro.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: dnsop@ietf.org, Petr Menšík <pemensik@redhat.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Questions before adopting must-not-sha1
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/oMeAo9CfwJtOAg3LETpDO9AVHyM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

See our I-D on lifecycle.  It addresses this issue squarely.  I'm about to
to dinner and can't fill in the details.  I'll do so later if someone
hasn't already.

Steve

Sent by a Verified

sender


On Wed, Nov 13, 2024 at 7:04 PM Philip Homburg <pch-dnsop-6@u-1.phicoh.com>
wrote:

> >Tony Finch has correctly identified in SHA-1 chosen prefix collisions
> >and DNSSEC [3] article that when a single record is usually safe,
> >multiple records might allow creating fake signature even in DNSSEC.
>
> There are two types of attacks on hash functions: collisions and second
> pre-image attacks.
>
> There is no practical 2nd pre-image attack for SHA-1, so we can concentrate
> on collision attacks. A collision attack requires that the victim to
> accepts malcious data from an attacker
>
> There are many, proably even the majority of DNSSEC signed domains,
> where this is not an issue. Attackers cannot influence the contents of a
> zone. In those cases, using SHA-1 is secure.
>
> Obviously we need to move away from SHA-1 as fast as possible. But we do
> those domains a disservice if we treat them as insecure. In
> particular, DANE will stop working if a domain is considered insecure.
>
> We already see the operational impact. People with RedHat systems notice
> that DANE suddenly stops working. They have no clue where is coming from,
> they just see that unbound doesn't set the AD bit.
>
> The solution should be that RedHat provides a way to link with a different
> crypto library that does support RSASHA1.
>
>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-leave@ietf.org
>