On 27 Mar 2014, at 22:56, Nicholas Weaver <nwea...@icsi.berkeley.edu> wrote:

> Bits are not precious:  Until a DNS reply hits the fragmentation limit of 
> ~1500B, size-matters-not (tm, Yoda Inc).  
> 
> So why are both root and com and org and, well, just about everyone else 
> using 1024b keys for the actual signing?

Those requirements (for the root zone keys) came from NTIA via NIST:

http://www.ntia.doc.gov/files/ntia/publications/dnssec_requirements_102909.pdf 
(9)(a)(i)

(well, NIST specified a minimum key size, but the implication at the time was 
that that was a safe minimum).

Bear in mind, I guess, that these keys have a publication lifetime that is 
relatively short. The window in which a factoring attack has an opportunity to 
find a result that can be exploited as a compromise is fairly narrow.


Joe

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to