On 8/6/2025 18:19, Wes Hardaker wrote:
"StJohns, Michael"<[email protected]> writes:

Are the authors stil sure they want to move forward, and that the language
is clear on what they meant?
The authors have been discussing it and need to review the entire
thread.  As a reminder authors are actually editors, not authors and as
such it's really up to the WG not just the editors.

I hope to get a change/path-forward proposal done shortly (but life got
in the way for me to get it done by today)

Hi Wes -

Let me try this using a somewhat different approach.  E.g. writing what I think you wanted, but in perhaps more pedantic words.


Initial effect:

   The DNSSEC use of SHA1 and algorithms that depend on SHA1 is
   DEPRECATED as of the publication of this document as a Standards
   Track RFC.  This means that SHA1 dependent algorithms SHOULD NOT be
   used in the creation of any DNS resource records.  Publishers of
   DNSSEC records that currently use SHA1  or SHA1 dependent
   algoritihms should make arrangements to transition away those
   algorithms as quickly as possible.  The current DNSSEC algorithms
   affected are: <list of algorithm names and their alg numbers>

Future Effect:

   The DNSSEC use of SHA1 and algorithms that depend on SHA1 is
   PROHIBITED as of the <third? pick one> anniversary of the
   publication of this document as a Standards Track RFC.  This means
   that SHA1 dependent algorithms MUST NOT be used in the creation of
   any DNS resource records after this date and existing records should
   be removed as they expire.

Client processing:

     Validating resolvers MAY be configured to support one of three
   models with respect to the receipt of DEPRECATED or PROHIBITED
   records: Legacy, Deprecated or Strict.

     * Legacy processing treats the deprecated records as fully
       supported.  In otherwords, no change from processing prior to
       the deprecation date.
     * Deprecated processing treats the deprecated records as if they
       were unsupported, with the single exception that a DNSSEC
       delegation into a zone that consists only of SHA1 dependent DS
       records (e.g. no other delegations to the domain using non-SHA1
       algorithms) is treated as if it were a secure delegation to an
       insecure zone.
     * Strict processing treats the deprecated records as if they were
       unsupported.  A zone delegation using only unsupported
       algorithms is treated as Bogus per << ref>>.

   Validating resolvers SHOULD use the "Deprecated" model after the
   publication of this document and before the PROHIBITED milestone,
   and SHOULD use "Prohibited" after the prohibited milestone.



Mikes commentary:

A valid delegation signature (e.g. SHA256EDSA) over an NSEC(3) record that says that there is a secure delegation I believe results in a BOGUS result for subordinate records only signed by unsupported algorithms?  As I read this, you want a soft landing for SHA1 which would turn a Secure delegation into an Insecure delegation if only SHA1 algorithms were uses?

Or am I far off in the weeds?

Later. Mike

_______________________________________________
DNSOP mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to