[ Quoting <spa...@countryday.net> at 04:07 on Mar  7 in "RE: fermat primes 
an..." ]
> > I would recommend that dnssec-keygen starts ignoring the "-e" parameter 
> > that everyone has put in their scripts to prevent exponent 3 keys, who are 
> > not getting keys with exponent 4294967296 + 1 (F5)
> 
> > Alternatively, if this is done on purpose, I guess we should all migrate 
> > the 64 bit machines :)
> 
> This is interesting, if I correctly understand your point, but it appears 
> that dnssec-keygen computes F5 differently than you do in your example in 
> http://code.google.com/p/go/issues/detail?can=2&start=0&num=100&q=&colspec=ID%20Status%20Stars%20Priority%20Owner%20Reporter%20Summary&groupby=&sort=&id=3161.
> 
> In your example:
>       pubkey := new(rsa.PublicKey)
>       pubkey.N = big.NewInt(0)
>       pubkey.E = 4294967296 + 1
> which results in 32-bit integer overflow.
> 
> In bind-9.9.0/lib/dns/opensslrsa_link.c, starting at line 750:
>       if (exp == 0) {
>               /* RSA_F4 0x10001 */
>               BN_set_bit(e, 0);
>               BN_set_bit(e, 16);
>       } else {
>               /* F5 0x100000001 */
>               BN_set_bit(e, 0);
>               BN_set_bit(e, 32);
>       }

Its not about integer overflow, it's about the fact that F5
does not add to the security, but does use up a lot of CPU cycles.

grtz Miek

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to