Re: [DNSOP] Questions before adopting must-not-sha1

2024-04-30 Thread Philip Homburg
>Their zone is already made insecure by a number of OS/DNS implementation >combos. Perhaps someone with RIPE Atlas credits can run a check like the >equivalent of "dig dnskey nic.kpn +dnssec" to see how many endusers >already get insecure answers for this? This reads as Redhat strong-arming the

Re: [DNSOP] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Mark Andrews
If we go ahead with this these two sentences Validating resolvers MUST treat RRSIG records created from DNSKEY records using these algorithms as insecure. If no other RRSIG records of accepted cryptographic algorithms are available, the validating resolver MUST

Re: [DNSOP] Questions before adopting must-not-sha1

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Paul Hoffman wrote: Until someone can show that a reduction in collision resistance can lead to a reduction in real-world security for DNSSEC, we can wait for "MUST NOT validate", possibly forever. There is no good reason for this group to say to a zone operator who

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Paul Hoffman wrote: Is that something within the realm of ICANN? Perhaps the DNS Tech Day ? You ask those questions sounding as if ICANN staff had not already done so. Why not share the data if you have some? This is the list of TLDs affected: apple. brand TLD beats.

[DNSOP] Questions before adopting must-not-sha1

2024-04-30 Thread Paul Hoffman
On Apr 30, 2024, at 16:20, Wes Hardaker wrote: > 3. The whole discussion, IMHO, is side-stepping the real issue: if not > now, then when? IE, do we never put something at MUST NOT? Is there a > usage threshold? Is it "must be zero"? Is it "known to be broken and > everyone must have a flag

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Wes Hardaker
Paul Hoffman writes: > This cull-because-of-low usage thread incorrectly assumes that the DNS > is flat instead of a hierarchy. A few points: 1. I only pointed at data that people were asking for. I did not state my personal opinion. 2. I published the drafts based on desires by people to

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Hoffman
On Apr 30, 2024, at 16:00, Paul Wouters wrote: > > On Apr 30, 2024, at 18:42, Paul Hoffman wrote: >> >> This cull-because-of-low usage thread incorrectly assumes that the DNS is >> flat instead of a hierarchy. The last I saw, there are 14 TLDs who use >> RSASHA1. Advancing this draft as-is

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Apr 30, 2024, at 18:42, Paul Hoffman wrote: > > This cull-because-of-low usage thread incorrectly assumes that the DNS is > flat instead of a hierarchy. The last I saw, there are 14 TLDs who use > RSASHA1. Advancing this draft as-is means that all of the zones under those > TLDs would be

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Joe Abley
On 1 May 2024, at 00:42, Paul Hoffman wrote: > This cull-because-of-low usage thread incorrectly assumes that the DNS is > flat instead of a hierarchy. The last I saw, there are 14 TLDs who use > RSASHA1. Advancing this draft as-is means that all of the zones under those > TLDs would be

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Hoffman
This cull-because-of-low usage thread incorrectly assumes that the DNS is flat instead of a hierarchy. The last I saw, there are 14 TLDs who use RSASHA1. Advancing this draft as-is means that all of the zones under those TLDs would be completely wiped out as well. Or maybe that's what the WG

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Wes Hardaker
Paul Wouters writes: > Perhaps Viktor can share his updated numbers with us. Viktor's daily scanning numbers are host on our USC/ISI server at: https://stats.dnssec-tools.org/#/?dnssec_param_tab=0 Click on "DNSSEC Parameter Trends" followed by "KSK algorithm", etc. KSK usage (click on the

Re: [DNSOP] Comments on draft-hardaker-dnsop-must-not-ecc-gost-00

2024-04-30 Thread Wes Hardaker
S Moonesamy writes: > I took a quick look at draft-hardaker-dnsop-must-not-ecc-gost-00. > The Introduction Section states that the security of the ECC-GOST > algorithm has been slowly diminishing over time as various forms of > attacks have weakened its cryptographic underpinning. There isn't

Re: [DNSOP] The DNSOP WG has placed draft-hardaker-dnsop-rfc8624-bis in state "Candidate for WG Adoption"

2024-04-30 Thread Wes Hardaker
Bob Harold writes: > I support this. Hi Bob, Thanks for the support and the bugs. Inline below: > It sounds like future updates will be separate RFC documents, so it seems odd > to say > 'this document' in 1.3.  Perhaps "future documents" ?  (I assume this text > was just > copied from the

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Hoffman
The people arguing for adoption seem to have two major arguments: 1) we should punish zones that sign with old algorithms by making compliant resolvers treat them as insecure 2) we should make it impossible for zones to sign or re-sign with old algorithms #1 affects resolvers, in particular the

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Philip Homburg wrote: - FIPS - PCI-DSS - BSI - OWASP - SOC2 - PKI-industry & CAB/Forum - TLS, IPsec/IKE, OpenPGP, SMIME, et all at IETF. - All the cryptographers including CFRG The problem is that none if them did an impact analysis for this draft. I phrase it the other

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Philip Homburg
>- FIPS >- PCI-DSS >- BSI >- OWASP >- SOC2 >- PKI-industry & CAB/Forum >- TLS, IPsec/IKE, OpenPGP, SMIME, et all at IETF. >- All the cryptographers including CFRG The problem is that none if them did an impact analysis for this draft. Yes of course, in isolation it is good to move away from

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Mark Andrews
And that doesn’t fail in RH with the tighter crypto. -- Mark Andrews > On 1 May 2024, at 00:46, Paul Wouters wrote: > > On Wed, 1 May 2024, Mark Andrews wrote: > >> One got servfail because validators where not aware that support was ripped >> away underneath it. Validators started to

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Mark Andrews
The validators where not returning BOGUS. They where returning unknown error. Both errors resulted in servfail. Once we knew what RH had done one could go from compile time testing of support to runtime testing of support. The DNSSEC RFC’s already told developers how to handle this.

[DNSOP] You, yes you, could be chair of the (proposed) Deleg WG…

2024-04-30 Thread Warren Kumari
Hi there all, I'm sending this to multiple lists, so you might get multiple copies… As mentioned during the Deleg BoF, we are casting a wide net for chairs for the (proposed) Deleg WG. The DNS is "core plumbing" for the Internet. It is also one of the very few protocols which has scaled

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Wed, 1 May 2024, Mark Andrews wrote: One got servfail because validators where not aware that support was ripped away underneath it. Validators started to get errors that where totally unexpected. Performing runtime testing of algorithm support addressed that by allowing the validator to

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Philip Homburg wrote: So what happens instead is that software is patched to return insecure if SHA1 is not avaiable for signing and that is of course very risky. has been patched, yes. The problem arguably is that DNS moved WAY slower that the industry as a whole to get

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Mark Andrews
One got servfail because validators where not aware that support was ripped away underneath it. Validators started to get errors that where totally unexpected. Performing runtime testing of algorithm support addressed that by allowing the validator to skip the unsupported algorithm. -- Mark

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Mark Andrews wrote: They DO NOT disable SHA1. They disable RSASHA1. The distinction is important. NSEC3 works fine on them. There were issues with NSEC3's use of SHA1 as well. I am failing to find the reports on this now unfortunately. Paul

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Philip Homburg
>It will also prevent ServFails when the system crypto SHA1 for >authentication and signature purposes is blocked, and the DNS software >sees this as a failure and returns BOGUS. I am not sure how many DNS >implementations are now probing SHA1 and on failure put it in the >"unsupported algorithm"

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Paul Wouters
On Tue, 30 Apr 2024, Philip Homburg wrote: The advise is split between producing SHA1 signatures and consuming SHA1 signatures, and those timings do not have to be identical. That said, a number of OSes have already forced the issue by failing SHA1 as cryptographic operation (RHEL, CentOS,

Re: [DNSOP] [Ext] Call for Adoption: draft-hardaker-dnsop-rfc8624-bis, must-not-sha1, must-not-ecc-gost

2024-04-30 Thread Philip Homburg
>The advise is split between producing SHA1 signatures and consuming SHA1 >signatures, and those timings do not have to be identical. > >That said, a number of OSes have already forced the issue by failing >SHA1 as cryptographic operation (RHEL, CentOS, Fedora, maybe more). So >right now, if you