On Fri, Mar 28, 2014 at 9:50 AM, Joe Abley <jab...@hopcount.ca> wrote:

>
> On 28 Mar 2014, at 9:06, Phillip Hallam-Baker <hal...@gmail.com> wrote:
>
> > Therefore ICANN needs to sign the root zone with 2048 before we consider
> it signed. End of story.
>
> Small point of clarity: the only key that ICANN maintains is the 2048 bit
> KSK, and the only signatures ICANN makes with it are over the DNSKEY RRSet.
> The 1024 bit ZSKs and signatures made by those keys are handled exclusively
> by the Root Zone Maintainer (Verisign).
>
> It's not clear to me that any changes would be required at ICANN to
> accommodate 2048 bit ZSKs. As I recall, every KSR that is submitted for
> processing at a ceremony is carefully tested in dry runs before the date
> anyway, so even the existing QA could continue unchanged.
>

VeriSign is acting on ICANN's instructions. Burt Kaliski knows how to set
an RSA key length. If they take the decision the change will be made.

The root is signed using the ZSK which is 1024 bit. Ergo it is fair to say
that the root signatures are defective.

This is not an issue of hindsight. We have been phasing out 1024 bit certs
in the WebPKI since long before the Snowden disclosure. And unlike DNSSEC
we had the excuse of a very large legacy deployment to contend with.

The RSA768 break was the signal that RSA1024 was no longer to be considered
safe. When RSA 1536 is broken it will be time to go to the ECC schemes.

The reason that I can't see any ongoing risk from RSA1024 after we complete
the transition is that I expect sensible applications will (1) simply
discard RSA1024 bit signatures as invalid and (2) discard any signature
that purports to have been made before the time that the code was compiled.


I suggest that we adopt the following strategy:

1) Have some form of formal communication from the IETF to ICANN notifying
them that the RSA1024 signing is insecure.

2) Consider ways to avoid having future security requirements being
constantly compromised by the limit of one 1500 byte response packet on
UDP.


A more research oriented approach is that sites deploying DNSSEC create or
have issued an X.509v3 cert for their KSK and publish that in their zone.
That can then be used as a local trust anchor within the local network. It
can also be enrolled in Certificate Transparency.

One conclusion that should be drawn from the RSA1024 fiasco is that ICANN
is not in the business of cryptography and the current institutional
relationships are unsatisfactory. VeriSign is more than competent to make
the right decision. But the responsibility and decision power is split so
they don't actually have decision making power, nor does the IETF.


-- 
Website: http://hallambaker.com/
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to