On Apr 1, 2014, at 5:39 AM, Olafur Gudmundsson <o...@ogud.com> wrote:
> 
> Doing these big jumps is the wrong thing to do, increasing the key size 
> increases three things:
>       time to generate signatures  
>       bits on the wire
>       verification time. 
> 
> I care more about verification time than bits on the wire (as I think that is 
> a red herring).
> Signing time increase is a self inflicted wound so that is immaterial. 
> 
>                  sign    verify    sign/s verify/s
> rsa 1024 bits 0.000256s 0.000016s   3902.8  62233.2
> rsa 2048 bits 0.001722s 0.000053s    580.7  18852.8
> rsa 4096 bits 0.012506s 0.000199s     80.0   5016.8
> 
> Thus doubling the key size decreases the verification performance by roughly 
> by about 70%. 
> 
> KSK's verification times affect the time to traverse the DNS tree, thus 
> If 1024 is too short 1280 is fine for now
> If 2048 is too short 2400 bit key is much harder to break thus it should be 
> fine. 
> 
> just a plea for key use policy sanity not picking on Bill in any way.

NO!  FUCK THAT SHIT.  Seriously.

There is far far far too much worrying about "performance" of crypto, in cases 
like this where the performance just doesn't matter!

Yes, you can only do 18K verifies per CPU per second for 2048b keys.  Cry me a 
river.  Bite the bullet, go to 2048 bits NOW, especially since the servers do 
NOT have resistance to roll-back-the-clock attacks.



In a major cluster validating recursive resolver, like what Comcast runs with 
Nominum or Google uses with Public DNS, the question is not how many verifies 
it can do per second per CPU core, but how many verifies it needs to do per 
second per CPU core.

And at the same time, this is a problem we already know how to parallelize, and 
which is obscenely parallel, and which also caches...

Lets assume a typical day of 1 billion external lookups for a major ISP 
centralized resolver, and that all are verified.  Thats less 1 CPU core-day to 
validate every DNSSEC lookup that day at 2048b keys.  

And yeah, DNS is peaky, but that's also why this task is being run on a cluster 
already, and each cluster node has a lot of CPUs.


--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to