Hi - apologies, I wasn't paying attention as I thought this would have been a simple and clean document.

Mukund's note made me take a quick look a this.  I think the document is incomplete or ambiguous.

Please add a reference to RFC 4035.

Please add a sentence or two that says something like "Insecure, with respect to DNSSEC,  has the meaning given to it per [RFC4035], section 4.3." if that's what you mean by "insecure".  I'm not sure if you meant that or Bogus.

Should a SHA1 signature over a DS record be treated differently than a signature over other records?  E.g. Is a SHA1 signature in a signed zone over a DS record bogus, or can it be treated as if it weren't present?   If the latter, is the subordinate zone securely insecure, or bogus?


The RSASHA1 [RFC4034] and RSASHA1-NSEC3-SHA1 [RFC5155] algorithms
    MUST NOT be used when creating DS records.  \
This is fine.  But instead perhaps.:

   The RSASHA1, and RSASHA-NSEC3-SHA1 algorithms MUST NOT be used when
   creating DS records; authoritative servers MUST NOT serve DS RRSets
   containing these records; validating resolvers MUST (SHOULD??)
   ignore these records (as if unsupported) when present in a DS RRSet.

Validating resolvers MUST
    treat RSASHA1 and RSASHA1-NSEC3-SHA1 DS records as insecure.
This paragraph should probably only talk about the signing side of the problem - remove this or move below?  Also records aren't secure or insecure, RRSets and validations results are secure or insecure.  A DS RRSet containing both SHA1 and non SHA1 delegations signed by a non-SHA1 algorithm is secure (assuming a chain of trust) for example.
  If no
    other DS records of accepted cryptographic algorithms are available,
    the DNS records below the delegation point MUST be treated as
    insecure.
Same comment on moving - part of the resolver part.  Move this to the end.  Also - pedantic - records are not secure or insecure, RRSets are.  Or delegations.  "The delegation referred to by the DS record MUST (SHOULD?? per configuration in a validating resolver) be treated as a delegation to an insecure zone".  If we treat this as if the DS RRSet contained only unsupported algorithms, would this be the same result?

If I remember correctly, a securely insecure delegation is formed by signing the appropriate NSEC(3) record and indicating that there is no DS record set for the delegation point.  In the case you're talking about, the parent DS record(s) will continue to indicate the presence of  DNSKEYs, but the algorithm field would indicate only SHA1 DNSKEYs.  Do you mean that this should be treated as if the DS  RRSet was not present and that the NSEC(3) records indicated as such?  You can't treat this as an empty DS RRSet I think.  My suggestion above clarifies this.



    The RSASHA1 [RFC4034] and RSASHA1-NSEC3-SHA1 [RFC5155] algorithms
    MUST NOT be used when creating DNSKEY and RRSIG records.
repetitive/redundant?  There's also the transition thing.  SHOULD NOT from publication, MUST NOT from publication + 2 years?  For all of DNSKEY, DS and RRSIG.

  Validating
    resolver implementations ([RFC9499] section 10) MUST continue to
    support validation using these algorithms as they are diminishing in
    use but still actively in use for some domains as of this
    publication.  Because of RSASHA1 and RSASHA1-NSEC3-SHA1's non-zero
    use, deployed validating resolvers MAY be configured to continue to
    validate RRSIG records that use these algorithms.  Validating
    resolvers deployed in more security strict environments MAY treat
    these RRSIG records as an unsupported algorithm.
I think this is OK, but I don't quite understand (same as Mukund I think)  the interactions between DS records and DNSKEY/RRSIG records different treatment specified here.

Later, Mike



On 8/3/2025 03:42, Mukund Sivaraman wrote:
2.  Deprecating SHA-1 from DNSSEC Signatures and Delegation RRs
[snip]

    Validating resolvers MUST
    treat RSASHA1 and RSASHA1-NSEC3-SHA1 DS records as insecure.  If no
    other DS records of accepted cryptographic algorithms are available,
    the DNS records below the delegation point MUST be treated as
    insecure.
[snip]

    Validating
    resolver implementations ([RFC9499] section 10) MUST continue to
    support validation using these algorithms as they are diminishing in
    use but still actively in use for some domains as of this
    publication.  Because of RSASHA1 and RSASHA1-NSEC3-SHA1's non-zero
    use, deployed validating resolvers MAY be configured to continue to
    validate RRSIG records that use these algorithms.  Validating
    resolvers deployed in more security strict environments MAY treat
    these RRSIG records as an unsupported algorithm.
Do the above two paragraphs not contradict each other on whether
validation should be performed for RSASHA1 and RSASHA1-NSEC3-SHA1?

E.g., if a DS RRset exists with a single DS RR with Algorithm=RSASHA1
mapping to a DNSKEY in the child zone with Algorithm=RSASHA1, must the
child zone be considered insecure, or could validation be attempted with
RSASHA1?

                Mukund

_______________________________________________
DNSOP mailing list [email protected]
To unsubscribe send an email [email protected]

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to