On Fri, Nov 28, 2014 at 05:01:56PM -0500, Scott Kitterman wrote:
> I did investigate this and there is a valid reason for this.  There are DNS 
> service providers that limit TXT records to a single 255 character string 
> (even though DNS has no such limit).  2048 bit key records won't fit.

I could understand limiting to 512 byte for the whole packet.
There should be enough space for 2048 bit.  Larger than 512 byte
_should_ work, but I know it breaks all over the place.

That certain other software is broken is a stupid excuse for not
having a sane default.  Please don't let them hold back the rest
of us.

> DKIM is designed to give some minimal level of assurance the message hasn't 
> been modified, as such, it's not likely to be a primary target of someone 
> seeking to factor 1024 bit keys (the same is not true of smaller keys which 
> were successfully factored in the wild a few years ago).
> 
> The generally recommended best practice for DKIM keys is to rotate them 
> regularly to mitigate risks like this.

There are places that do recommended rotating it, but not all of
them do.  But they should be rotated if you use larger keys.

I also don't understand why you think 512 would be bad but 1024
not.  You just need a larger budget.


Kurt


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to