<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-sha1-09" category="std" consensus="true" submissionType="IETF" updates="4034, 5155" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with SHA-1">Deprecating the use of SHA-1 in DNSSEC signature algorithms</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="June" day="03"/>

    
    
    

    <abstract>


<?line 48?>

<t>This document deprecates the use of the RSASHA1 and RSASHA1-NSEC3-SHA1
algorithms for the creation of DNS Public Key (DNSKEY) and Resource
Record Signature (RRSIG) records.</t>

<t>It updates RFC4034 and RFC5155 as it deprecates the use of these algorithms.</t>



    </abstract>



  </front>

  <middle>


<?line 56?>

<section anchor="introduction"><name>Introduction</name>

<t>The security of the protection provided by the SHA-1 algorithm <xref target="RFC3174"/> has been slowly diminishing
over time as various forms of attacks have weakened its cryptographic
underpinning.  DNSSEC <xref target="RFC9364"/> originally <xref target="RFC3110"/> made extensive use
of SHA-1, for example as a
cryptographic hash algorithm in RRSIG and Delegation Signer (DS)
records.  Since then, multiple other algorithms with
stronger cryptographic strength have become widely available for DS records 
and for Resource Record Signature (DNSKEY) and DNS Public Key (RRSIG) records <xref target="RFC4034"/>. 
Operators are encouraged to consider switching to one of the recommended algorithms 
listed in the <xref target="DNSKEY-IANA"/> and <xref target="DS-IANA"/> tables, respectively.
Further, support for validating SHA-1 based signatures has been
removed from some systems. As a result, SHA-1 as part of a signature algorithm 
is no longer fully interoperable
in the context of DNSSEC. As adequate alternatives exist, the use of SHA-1 is
no longer advisable.</t>

<t>This document thus further deprecates the use of RSASHA1 and
RSASHA1-NSEC3-SHA1 for DNS Security Algorithms.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-sha-1-from-dnssec-signatures-and-delegation-rrs"><name>Deprecating SHA-1 from DNSSEC Signatures and Delegation RRs</name>

<t>The RSASHA1 <xref target="RFC4034"></xref> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"></xref> algorithms MUST NOT
be used when creating DS records.  Validating resolvers MUST treat RSASHA1
and RSASHA1-NSEC3-SHA1 DS records as insecure.  If no other DS records of
accepted cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The RSASHA1 <xref target="RFC4034"></xref> and RSASHA1-NSEC3-SHA1 <xref target="RFC5155"></xref> algorithms MUST NOT be
used when creating DNSKEY and RRSIG records.  Validating resolver implementations
(<xref target="RFC9499"></xref> section 10) MUST continue to support validation using these
algorithms as they are diminishing in use but still actively in use for some
domains as of this publication.  Because of RSASHA1 and RSASHA1-NSEC3-SHA1's
non-zero use, deployed validating resolvers MAY be configured to continue
to validate RRSIG records that use these algorithms.  Validating
resolvers deployed in more security strict environments MAY treat
these RRSIG records as an unsupported algorithm.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document deprecates the use of RSASHA1 and RSASHA1-NSEC3-SHA1 for
DNSSEC Delegation and DNSSEC signing since these algorithms are no
longer considered to be secure.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of SHA-1 based algorithms should
immediately roll to algorithms with stronger cryptographic algorithms,
such as the recommended algorithms in the <xref target="DNSKEY-IANA"></xref> and <xref target="DS-IANA"></xref> tables.</t>

<t>Operators should take care when deploying software packages and
operating systems that may have already removed support for the SHA-1
algorithm.  In these situations software may need to be manually built
and deployed by an operator to continue supporting the required levels
indicated by the "Use for DNSSEC Validation" and "Implement for DNSSEC
Validation" columns, which this document is not changing.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>[Note to IANA, to be removed by the RFC Editor: the registry fields
listed above will be created by draft-ietf-dnsop-rfc8624-bis.]</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation" field of the
"Digest Algorithms" registry <xref target="DS-IANA"/> <xref target="I-D.ietf-dnsop-rfc8624-bis"/> 
for SHA-1 (1) to MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Signing" column of the
DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/>
<xref target="I-D.ietf-dnsop-rfc8624-bis"/> to MUST NOT
for the RSASHA1 (5) and RSASHA1-NSEC3-SHA1 (7) algorithms.</t>

<t>All other columns should remain as currently specified.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC3110">
  <front>
    <title>RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="May" year="2001"/>
    <abstract>
      <t>This document describes how to produce RSA/SHA1 SIG resource records (RRs) in Section 3 and, so as to completely replace RFC 2537, describes how to produce RSA KEY RRs in Section 2. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3110"/>
  <seriesInfo name="DOI" value="10.17487/RFC3110"/>
</reference>
<reference anchor="RFC3174">
  <front>
    <title>US Secure Hash Algorithm 1 (SHA1)</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <author fullname="P. Jones" initials="P." surname="Jones"/>
    <date month="September" year="2001"/>
    <abstract>
      <t>The purpose of this document is to make the SHA-1 (Secure Hash Algorithm 1) hash algorithm conveniently available to the Internet community. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3174"/>
  <seriesInfo name="DOI" value="10.17487/RFC3174"/>
</reference>
<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>
<reference anchor="RFC5155">
  <front>
    <title>DNS Security (DNSSEC) Hashed Authenticated Denial of Existence</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="G. Sisson" initials="G." surname="Sisson"/>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="D. Blacka" initials="D." surname="Blacka"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>The Domain Name System Security (DNSSEC) Extensions introduced the NSEC resource record (RR) for authenticated denial of existence. This document introduces an alternative resource record, NSEC3, which similarly provides authenticated denial of existence. However, it also provides measures against zone enumeration and permits gradual expansion of delegation-centric zones. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5155"/>
  <seriesInfo name="DOI" value="10.17487/RFC5155"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor="I-D.ietf-dnsop-rfc8624-bis">
   <front>
      <title>DNSSEC Cryptographic Algorithm Recommendation Update Process</title>
      <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         <organization>USC/ISI</organization>
      </author>
      <author fullname="Warren Kumari" initials="W." surname="Kumari">
         <organization>Google</organization>
      </author>
      <date day="21" month="May" year="2025"/>
      <abstract>
	 <t>   The DNSSEC protocol makes use of various cryptographic algorithms to
   provide authentication of DNS data and proof of non-existence.  To
   ensure interoperability between DNS resolvers and DNS authoritative
   servers, it is necessary to specify both a set of algorithm
   implementation requirements and usage guidelines to ensure that there
   is at least one algorithm that all implementations support.  This
   document replaces and obsoletes RFC8624 and moves the canonical
   source of algorithm implementation requirements and usage guidance
   for DNSSEC from RFC8624 to an IANA registry.  This is done both to
   allow the list of requirements to be more easily updated, and to
   allow the list to be more easily referenced.  Future extensions to
   this registry can be made under new, incremental update RFCs.  This
   document also incorporates the revised IANA DNSSEC considerations
   from RFC9157.

   The document does not change the status (MUST, MAY, RECOMMENDED,
   etc.) of the algorithms listed in RFC8624; that is the work of future
   documents.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-dnsop-rfc8624-bis-11"/>
   
</reference>



    </references>




<?line 140?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following
IETF participants in helping produce this document: Mark Andrews,
Steve Crocker, Peter Dickson, Thomas Graf, Paul Hoffman, Russ Housley, Shumon
Huque, Barry Leiba, S Moonesamy, Yoav Nir, Florian Obser, Peter
Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski, and the many
members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

