On 03/27/14 13:56, Nicholas Weaver wrote:


So why the hell do the real operators of DNSSEC that matters, notably com and 
., use 1024b RSA keys?

And don't give me that key-roll BS: Give me an out of date key for . and a MitM 
position, and I can basically create a false world for many DNSSEC-validating 
devices by also providing bogus time data with a MitM on NTP...


[Did not read all the discussion.]

Suppose I agree with the rationales for keys larger than 1024. Under some relatively paranoid assumptions in the threat model, they make sense.

Turning to the solution space, why not 1280 or 1459? Then increase by ever smaller jumps every two years.

Is it possible that the whole IT security community is social-engineered into thinking that anything below 2048 is inadequate for any purpose. Because the larger the RSA key size recommendations, the less severe the relative ECC performance cost on digital signature verification operations. Thus the ECC promoters have an in interest in the underlying expert community wisdom.

-- Thierry Moreau

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to