<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.32 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-must-not-sha1-00" category="std">

  <front>
    <title abbrev="MUST NOT DNSSEC with SHA-1">Remove SHA-1 from active use within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>

    <date year="2022" month="August" day="12"/>

    
    
    

    <abstract>


<t>This document retires the use of SHA-1 within DNSSEC</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The security of the SHA-1 algorithm <xref target="RFC3174"/> has been slowly
diminishing over time as various forms of attacks have weakened its
cryptographic underpinning.  DNSSEC <xref target="RFC4033"/> <xref target="RFC4034"/>
<xref target="RFC4035"/> originally made extensive use of SHA-1 as a cryptographic
verification algorithm in RRSIG and Delegation Signer (DS) records,
for example.  Since then, multiple other signing algorithms with
stronger cryptographic strength are now widely available for DS
records (such as SHA-256 <xref target="RFC4509"/>, SHA-384 (<xref target="RFC6605"/>)) and for
DNSKEY and RRSIG records (such as RSASHA256 (<xref target="RFC5702"/>), RSASHA512
(<xref target="RFC5702"/>), ECDSAP256SHA256 <xref target="RFC6605"/>, ECDSAP384SHA384
<xref target="RFC6605"/>, ED25519 <xref target="RFC8080"/>, and ED448 <xref target="RFC8080"/>), the use of
SHA-1 is no longer needed.</t>

<t>This document retires the use of SHA-1 within DNSSEC.</t>

<section anchor="requirements-notation" title="Requirements notation">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
   “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”,
   and “OPTIONAL” in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-sha-1-algorithms-in-dnssec" title="Deprecating SHA-1 algorithms in DNSSEC">

<t>The SHA-1 <xref target="RFC3685"/> algorithm MUST NOT be used when creating DS records.</t>

<t>The RSASHA1 <xref target="RFC4034"/>, DSA-NSEC3-SHA1 <xref target="RFC5155"/>,
and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"/> algorithms MUST NOT be used when
creating DNSKEY and RRSIG records.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document increases the security of the DNSSEC ecosystem by
deprecating algorithms that make use of older algorithms with SHA-1
derived uses.</t>

</section>
<section anchor="operational-considerations" title="Operational Considerations">

<t>Zone owners currently making use of SHA-1 based algorithms should
immediate switch to algorithms with stronger cryptographic strengths,
such as those listed in the introduction.  DNS registries <xref target="RFC8499"/>
should prohibit their clients to upload and publish SHA-1 based DS
records.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>IANA is requested to mark the following Delegation Signer (DS)
Resource Record (RR) digest type algorithms as deprecated:</t>

<t><list style="symbols">
  <t>SHA-1</t>
</list></t>

<t>IANA is requested to mark the following DNS Security Algorithm Numbers
as deprecated:</t>

<t><list style="symbols">
  <t>RSASHA1</t>
  <t>DSA-NSEC3-SHA1</t>
  <t>RSASHA1-NSEC3-SHA1</t>
</list></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC3174" target='https://www.rfc-editor.org/info/rfc3174'>
<front>
<title>US Secure Hash Algorithm 1 (SHA1)</title>
<author initials='D.' surname='Eastlake 3rd' fullname='D. Eastlake 3rd'><organization /></author>
<author initials='P.' surname='Jones' fullname='P. Jones'><organization /></author>
<date year='2001' month='September' />
<abstract><t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3174'/>
<seriesInfo name='DOI' value='10.17487/RFC3174'/>
</reference>



<reference  anchor="RFC3685" target='https://www.rfc-editor.org/info/rfc3685'>
<front>
<title>SIEVE Email Filtering: Spamtest and VirusTest Extensions</title>
<author initials='C.' surname='Daboo' fullname='C. Daboo'><organization /></author>
<date year='2004' month='February' />
<abstract><t>The SIEVE mail filtering language &quot;spamtest&quot; and &quot;virustest&quot; extensions permit users to use simple, portable commands for spam and virus tests on email messages.  Each extension provides a new test using matches against numeric 'scores'.  It is the responsibility of the underlying SIEVE implementation to do the actual checks that result in values returned by the tests. [PROPOSED STANDARD]</t></abstract>
</front>
<seriesInfo name='RFC' value='3685'/>
<seriesInfo name='DOI' value='10.17487/RFC3685'/>
</reference>



<reference  anchor="RFC4033" target='https://www.rfc-editor.org/info/rfc4033'>
<front>
<title>DNS Security Introduction and Requirements</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System.  This document introduces these extensions and describes their capabilities and limitations.  This document also discusses the services that the DNS security extensions do and do not provide.  Last, this document describes the interrelationships between the documents that collectively describe DNSSEC.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4033'/>
<seriesInfo name='DOI' value='10.17487/RFC4033'/>
</reference>



<reference  anchor="RFC4034" target='https://www.rfc-editor.org/info/rfc4034'>
<front>
<title>Resource Records for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS.  This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records.  The purpose and format of each resource record is described in detail, and an example of each resource record is given. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4034'/>
<seriesInfo name='DOI' value='10.17487/RFC4034'/>
</reference>



<reference  anchor="RFC4035" target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='R.' surname='Austein' fullname='R. Austein'><organization /></author>
<author initials='M.' surname='Larson' fullname='M. Larson'><organization /></author>
<author initials='D.' surname='Massey' fullname='D. Massey'><organization /></author>
<author initials='S.' surname='Rose' fullname='S. Rose'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference  anchor="RFC4509" target='https://www.rfc-editor.org/info/rfc4509'>
<front>
<title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
<author initials='W.' surname='Hardaker' fullname='W. Hardaker'><organization /></author>
<date year='2006' month='May' />
<abstract><t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs).  DS records, when stored in a parent zone, point to DNSKEYs in a child zone.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4509'/>
<seriesInfo name='DOI' value='10.17487/RFC4509'/>
</reference>



<reference  anchor="RFC5155" target='https://www.rfc-editor.org/info/rfc5155'>
<front>
<title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
<author initials='B.' surname='Laurie' fullname='B. Laurie'><organization /></author>
<author initials='G.' surname='Sisson' fullname='G. Sisson'><organization /></author>
<author initials='R.' surname='Arends' fullname='R. Arends'><organization /></author>
<author initials='D.' surname='Blacka' fullname='D. Blacka'><organization /></author>
<date year='2008' month='March' />
<abstract><t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence.  However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5155'/>
<seriesInfo name='DOI' value='10.17487/RFC5155'/>
</reference>



<reference  anchor="RFC5702" target='https://www.rfc-editor.org/info/rfc5702'>
<front>
<title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
<author initials='J.' surname='Jansen' fullname='J. Jansen'><organization /></author>
<date year='2009' month='October' />
<abstract><t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035).  [STANDARDS TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5702'/>
<seriesInfo name='DOI' value='10.17487/RFC5702'/>
</reference>



<reference  anchor="RFC6605" target='https://www.rfc-editor.org/info/rfc6605'>
<front>
<title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='W.C.A.' surname='Wijngaards' fullname='W.C.A. Wijngaards'><organization /></author>
<date year='2012' month='April' />
<abstract><t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC).  It lists curves of different sizes and uses the SHA-2 family of hashes for signatures.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6605'/>
<seriesInfo name='DOI' value='10.17487/RFC6605'/>
</reference>



<reference  anchor="RFC8080" target='https://www.rfc-editor.org/info/rfc8080'>
<front>
<title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
<author initials='O.' surname='Sury' fullname='O. Sury'><organization /></author>
<author initials='R.' surname='Edmonds' fullname='R. Edmonds'><organization /></author>
<date year='2017' month='February' />
<abstract><t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC).  It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t></abstract>
</front>
<seriesInfo name='RFC' value='8080'/>
<seriesInfo name='DOI' value='10.17487/RFC8080'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC8499" target='https://www.rfc-editor.org/info/rfc8499'>
<front>
<title>DNS Terminology</title>
<author initials='P.' surname='Hoffman' fullname='P. Hoffman'><organization /></author>
<author initials='A.' surname='Sullivan' fullname='A. Sullivan'><organization /></author>
<author initials='K.' surname='Fujiwara' fullname='K. Fujiwara'><organization /></author>
<date year='2019' month='January' />
<abstract><t>The Domain Name System (DNS) is defined in literally dozens of different RFCs.  The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined.  This document gives current definitions for many of the terms used in the DNS in a single document.</t><t>This document obsoletes RFC 7719 and updates RFC 2308.</t></abstract>
</front>
<seriesInfo name='BCP' value='219'/>
<seriesInfo name='RFC' value='8499'/>
<seriesInfo name='DOI' value='10.17487/RFC8499'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>


<section anchor="acknowledgments" title="Acknowledgments">

<t>TBD</t>

</section>
<section anchor="current-algorithm-usage-levels" title="Current algorithm usage levels">

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>[RFC Editor: please delete this section upon publication]</t>

</section>
<section anchor="github-version-of-this-document" title="Github Version of this document">

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAB929mIAA51X224bNxB951cMnBcH8MqSbTm2XlrFclOjvqSSnSANgoLa
pbSsdsktybUrBP73HpK7ujlBij5IpniZGc6cczhOkoQ56QoxoL2xKPWjoMmv
w6RHM6NL4qmTmKmtoCfpcqlodDuZXF7sMT6dGvE4oJuHyT3d3t03C2FbtMAy
nSpewnBm+MwlOTcZXwiTZMrqKilr6xKlXWJz3ku6XZZyJ+baLAdkXcZkZQbk
DDYddbvn3SPGrOMq+5MXWsHkUlhWyQF9djo9IKuNM2JmMVqWcQDnJa8qqeZf
GOO1y7UZMKIEHyKp7IA+dujXJqQwGWP9KOz2tDbzAT1MLg6vJldhQpRcFgOS
ws1+bu9kO0o4xpQ2JfcZ867Gv1wc9XrnzfC49+akHZ6e9ZvhSff4eD08WQ9X
G/rd1kK/129n+2+6R83w9LTbzp51z7oDxqSa7YRxdnIOI4wlSUJ8ap1BWRm7
z6X1aapLoRwZ4aTB3V0ey61nDQ626h5tlDLLCsHYK7pSzuisBkq08hYFWZHW
RrqlN+BtRSO8QGVhqKSvX5tkPD9Tzi1NhVBkC/1ULFkmS6mkhbs5AYiGnCwF
YdMjN1LXlvzFrLfMnePpwsIC0PkkUAIlMpLOstQsK6fnhle5TKlWmTAAgYLJ
DrUYDTH41COGdox4WDvuYx7hzqXiRbGkkmeCxD9OKNuSYZUdBMdpyydD4HIm
gWbkZOPiyOF4PLl6R0AxjUQh5nHHRM4Vrro/mrxGEVJtMnvAcFF45GVVCIQ9
kSoVPpvqgMq6cBLTpPHbkMVpn66VHxsKBrIYrebYsJ0PTAs1B0O5EaT0EzZn
Alfkj8A0n8Ks9zyasCYS2rd1mvtb+use9U+bfAGVz88HYfL47IT2w6yH4vPz
69fhhrDDkO7fLj+Fn/HqL6yOJ0PY8HajCQ9smDhoFvq9I7azcHkxmgzf40Rz
bsNzu4iIsIhvtr04Our3e+fxhOeKn/SxXY5OTs42p+FmTQMWCw2uKE1FTKoS
IhNZ5/9xCMdevaKx+LvGZn/OW3Y8Ugj64lm0EEt6Cqna8wK7dxD/eqH14/Hl
7w9X48uRH8PD9fVqEHd4M/h993DdbPGj9eGLu5uby9tRPO+1e2fqZvgp2vDZ
2bt7f391dzu83vMQdlsX9ihyGhzGkgPRkADQEHXNhE2NnIqMBbWltxfvqXcS
c+xFMRDvJ5/wqARPAdvenVaAY/yJNAKZVSW4acyAjpTySjpeQOLhx+b6SRGI
IHxWQSuE4JkHRuwIj6UNEbtfCVOUIwgyglhzdfWoTUMhsxAQqCSi6dGkRXIn
2opo7W2KyQF2DZNbuDtO1mtew7HGAiXioe/s2Yz8m+GwdTjfoVmHfE4mrSBf
aOgX5DAgze5iFxIDe7ZB766KN8IJu3ZpnShpCrXeSPZGsC7nDpK5WFFAF3C6
K1BtiwCtfMSFsNWGCt5VTYC8eBHwH3j5CfXGc0sID0rmgjovfARbfJtyn6UN
l8BJXaCpKEuRSfQZZBEEJAjg3Q3sB8oJcW7FCz0FnBbSetAHbgQerB7E+OCg
GnNsMRKpbTCP5xivTYyJKqNzOZXOH5fwWsggCYisrgrNs1DXqp7CT751vbVK
h8xdDW+HL1IWJlFmA7URIU7YLblZhGBnusDDGyD0zfeIjYXVtcHbMw6OaH88
fk2ZnMMUuWUlNpMXWB8RITJ0G0lT4v8eA3K1AutwxcXbupyi4uyl/YZAGG1T
bb20ORk6lym6Bp+sYbrA61eIbB4EGGR4O/LzFxFWG1JQWz5HkcWjKGwke8MF
m/LQVvgC/iVSB0rQB7lw/v2sF7l+VDKUbquhzOU8L/BxkWYNiv3FCr0MPASG
225nI7k6oIvlzlV2cHiIVtjZDvpo8DRxWhe2gzb1EJ3Q1ErntfAzcEaXmUQ4
A0K7AMTASwF9jhKOg6HadYWvgK7YsHzxWXgHp/WUPiDtfk/QgA2tYOxjLgux
8xZgHLotuEGudOUnD9CSQbCVF65HKZ5EBlVH97nAgM0k1NxLN4rZXmwePHdS
XR62rfXhj/97YOxfyV2B8sYMAAA=

-->

</rfc>

