<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-sha1-07" category="std" consensus="true" submissionType="IETF" updates="4034, 5155" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with SHA-1">Deprecating the use of SHA-1 in DNSSEC signature algorithms</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="May" day="20"/>

    
    
    

    <abstract>


<?line 55?>

<t>This document deprecates the use of the RSASHA1 and RSASHA1-NSEC3-SHA1
algorithms for the creation of DNS Public Key (DNSKEY) and Resource
Record Signature (RRSIG) records.</t>

<t>It updates RFC4034 and RFC5155 as it deprecates the use of these algorithms.</t>



    </abstract>



  </front>

  <middle>


<?line 63?>

<section anchor="introduction"><name>Introduction</name>

<t>The security of the protection provided by the SHA-1 algorithm <xref target="RFC3174"/> has been slowly diminishing
over time as various forms of attacks have weakened its cryptographic
underpinning.  DNSSEC <xref target="RFC9364"/> originally <xref target="RFC3110"/> made extensive use
of SHA-1 as a
cryptographic hash algorithm in RRSIG and Delegation Signer (DS)
records, for example.  Since then, multiple other algorithms with
stronger cryptographic strength have become widely available for DS records 
and for Resource Record Signature (DNSKEY) and DNS Public Key (RRSIG) records <xref target="RFC4034"/>. 
Operators are encouraged to consider switching to one of the recommended algorithms 
listed in the <xref target="DNSKEY-IANA"/> and <xref target="DS-IANA"/> tables, respectively.
Further, support for validating SHA-1 based signatures has been
removed from some systems. As a result, SHA-1 is no longer fully interoperable
in the context of DNSSEC. As adequate alternatives exist, the use of SHA-1 is
no longer advisable.</t>

<t>This document thus further deprecates the use of RSASHA1 and
RSASHA1-NSEC3-SHA1 for DNS Security Algorithms.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-rsasha1-and-rsasha1-nsec3-sha1-algorithms-in-dnssec"><name>Deprecating RSASHA1 and RSASHA1-NSEC3-SHA1 algorithms in DNSSEC</name>

<t>The RSASHA1 <xref target="RFC4034"/> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"/> algorithms
MUST NOT be used when creating DNSKEY and RRSIG records.</t>

<t>Validating resolver implementations (<xref target="RFC9499"/> section 10) 
MUST continue to support
validation using these algorithms as they are diminishing in use but
still actively in use for some domains as of this publication.
Because of RSASHA1 and RSASHA1-NSEC3-SHA1's non-zero use, deployed
validating resolvers MAY be configured to continue to validate RRSIG
records that use these algorithms.  Validating resolvers deployed in
more security strict environments MAY treat these RRSIG
records as an unsupported algorithm.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1 for
DNSSEC Delegation and DNSSEC signing since these algorithms are no
longer considered to be secure.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of SHA-1 based algorithms should
immediately switch to algorithms with stronger cryptographic algorithms,
such as the recommended algorithms in the <xref target="DNSKEY-IANA"></xref> and <xref target="DS-IANA"></xref> tables.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>[Note to IANA, to be removed by the RFC Editor: the registry fields
listed above will be created by draft-ietf-dnsop-rfc8624-bis.]</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation" field of the
"Digest Algorithms" registry <xref target="DS-IANA"/> <xref target="draft-ietf-dnsop-algorithm-update"/> 
for SHA-1 (1) to MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Signing" column of the
DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/>
<xref target="draft-ietf-dnsop-algorithm-update"/> to MUST NOT
for the RSASHA1 (5) and RSASHA1-NSEC3-SHA1 (7) algorithms.</t>

<t>All other columns should remain as currently specified.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3110">
  <front>
    <title>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="May" year="2001"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA1 SIG resource records (RRs) in Section 3 and, so as to completely replace RFC 2537, describes how to produce RSA KEY RRs in Section 2. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3110"/>
  <seriesInfo name="DOI" value="10.17487/RFC3110"/>
</reference>
<reference anchor="RFC3174">
  <front>
    <title>US Secure Hash Algorithm 1 (SHA1)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="P. Jones" initials="P." surname="Jones"/>
    <date month="September" year="2001"/>
    <abstract>
      <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3174"/>
  <seriesInfo name="DOI" value="10.17487/RFC3174"/>
</reference>
<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>
<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="draft-ietf-dnsop-algorithm-update" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-algorithm-update">
  <front>
    <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
    <author initials="K." surname="W." fullname="Kumari, W.">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>




<?line 136?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following
IETF participants in helping produce this document: Mark Andrews,
Steve Crocker, Peter Dickson, Thomas Graf, Paul Hoffman, Russ Housley, Shumon
Huque, Barry Leiba, S Moonesamy, Yoav Nir, Florian Obser, Peter
Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski, and the many
members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

