<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.3.6) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-sha1-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with SHA-1">Deprecating the use of SHA-1 in DNSSEC signature algorithms</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="January" day="21"/>

    
    
    

    <abstract>


<?line 51?>

<t>This document deprecates the use of the RSASHA1 and RSASHA1-NSEC3-SHA1
algorithms for the creation of DNSKEY and RRSIG records.</t>



    </abstract>



  </front>

  <middle>


<?line 56?>

<section anchor="introduction"><name>Introduction</name>

<t>The security of the SHA-1 algorithm <xref target="RFC3174"/> has been slowly diminishing
over time as various forms of attacks have weakened its cryptographic
underpinning.  DNSSEC <xref target="RFC9364"/> originally made extensive use of SHA-1 as a
cryptographic verification algorithm in RRSIG and Delegation Signer (DS)
records, for example.  Since then, multiple other signing algorithms with
stronger cryptographic strength are now widely available for DS records (such
as SHA-256 <xref target="RFC4509"/>, SHA-384 (<xref target="RFC6605"/>)) and for DNSKEY and RRSIG records
(such as RSASHA256 (<xref target="RFC5702"/>), RSASHA512 (<xref target="RFC5702"/>), ECDSAP256SHA256
<xref target="RFC6605"/>, ECDSAP384SHA384 <xref target="RFC6605"/>, ED25519 <xref target="RFC8080"/>, and ED448
<xref target="RFC8080"/>). Further, support for validating SHA-1 based signatures has been
removed from some systems. As a result, SHA-1 is no longer fully interoperable
in the context of DNSSEC. As adequate alternatives exist, the use of SHA-1 is
no longer advisable.</t>

<t>This document thus further deprecates the use of RSASHA1 and
RSASHA1-NSEC3-SHA1 for DNS Security Algorithms.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-rsasha1-and-rsasha1-nsec3-sha1-algorithms-in-dnssec"><name>Deprecating RSASHA1 and RSASHA1-NSEC3-SHA1 algorithms in DNSSEC</name>

<t>The RSASHA1 <xref target="RFC4034"/> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"/> algorithms
MUST NOT be used when creating DNSKEY and RRSIG records.</t>

<t>Validating resolvers MUST continue to support validation using these
algorithms as they are diminishing in use but still actively in use
for some domains as of this publication.  Validating resolvers MAY
treat RRSIG records created from DNSKEY records using these algorithms
as an unsupported algorithm.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document reduces the risk that a zone cannot be validated due
to lack of SHA-1 support in a validator, by guiding signers to choose
a more interoperable signing algorithm.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of SHA-1 based algorithms should
immediately switch to algorithms with stronger cryptographic strengths,
such as those listed in the introduction.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "Use for DNSSEC Delegation" field of the
"Digest Algorithms" registry <xref target="DS-IANA"/> for SHA-1 (1) to MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Signing" column of the
DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/> to MUST NOT
for the RSASHA1 (5) and RSASHA1-NSEC3-SHA1 (7) algorithms.</t>

<t>All other columns should remain as currently specified.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3174">
  <front>
    <title>US Secure Hash Algorithm 1 (SHA1)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="P. Jones" initials="P." surname="Jones"/>
    <date month="September" year="2001"/>
    <abstract>
      <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3174"/>
  <seriesInfo name="DOI" value="10.17487/RFC3174"/>
</reference>
<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>
<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>
<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>
<reference anchor="RFC4509">
  <front>
    <title>Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)</title>
    <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
    <date month="May" year="2006"/>
    <abstract>
      <t>This document specifies how to use the SHA-256 digest type in DNS Delegation Signer (DS) Resource Records (RRs). DS records, when stored in a parent zone, point to DNSKEYs in a child zone. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4509"/>
  <seriesInfo name="DOI" value="10.17487/RFC4509"/>
</reference>
<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>
<reference anchor="RFC5702">
  <front>
    <title>Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="J. Jansen" initials="J." surname="Jansen"/>
    <date month="October" year="2009"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA-256 and RSA/SHA-512 DNSKEY and RRSIG resource records for use in the Domain Name System Security Extensions (RFC 4033, RFC 4034, and RFC 4035). [STANDARDS TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5702"/>
  <seriesInfo name="DOI" value="10.17487/RFC5702"/>
</reference>
<reference anchor="RFC6605">
  <front>
    <title>Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="W.C.A. Wijngaards" initials="W.C.A." surname="Wijngaards"/>
    <date month="April" year="2012"/>
    <abstract>
      <t>This document describes how to specify Elliptic Curve Digital Signature Algorithm (DSA) keys and signatures in DNS Security (DNSSEC). It lists curves of different sizes and uses the SHA-2 family of hashes for signatures. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6605"/>
  <seriesInfo name="DOI" value="10.17487/RFC6605"/>
</reference>
<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>


<?line 119?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following IETF
participants in helping produce this document: Mark Andrews, Steve Crocker,
Russ Housely, Shumon Huque, Paul Hoffman, S Moonesamy, Peter Dickson, Peter
Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski,  and the many members of
the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

